<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1921 to 1935.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/events/legal-issues-on-cloud-computing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/technology-in-government-and-topics-in-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cyberscholars-working-group-mit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/whatever-happened-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/insafnational-convention-on-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/events/legal-issues-on-cloud-computing">
    <title>Legal Issues pertaining to Cloud Computing</title>
    <link>https://cis-india.org/events/legal-issues-on-cloud-computing</link>
    <description>
        &lt;b&gt;The Law and Technology Society of National Law School of India University, Bangalore is organizing the 6th edition of its flagship conference ‘Consilience’ on December 14 and 15, 2013 at NLSIU Campus, Bangalore. The Centre for Internet and Society is supporting this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Conference will see some of the best lawyers, jurists and industry leaders in India speak on different issues surrounding the theme. The Conference is co- branded with ‘&lt;a class="external-link" href="https://www.salesforce.com/crm/what-is-crm/"&gt;Salesforce.com&lt;/a&gt;’, ‘International Technology Law Association’ and the Centre for Internet and Society &lt;span&gt; (&lt;a href="http://www.cis-india.org/"&gt;http://www.cis-india.org/&lt;/a&gt;). Apart  from making an effective contribution towards greater understanding of  the subject, the Conference will lead to a recommendatory policy paper  to the government of India.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Key speakers for the Conference include: &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Senapathy (Kris)  Gopalakrishnan (Co-Founder and Executive Vice Chairman, Infosys &amp;amp; President, CII )&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Pavan Duggal (Advocate, Supreme Court)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Abhishek Malhotra (Founding Partner, TMT Law Practice)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Azmul Haque (Partner, Shook Lin &amp;amp; Bok, Singapore)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Chris Edwards (Senior Associate, DLA Piper, Singapore)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Prof. Rahul De (IIM Bangalore)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Pamela Kumar (Chair, Cloud Computing Innovation Council of India) &lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Suhaan Mukherji (Expert advisor, Office of Adviser to the Prime Minister of India on Public Information Infrastructure and Innovations)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Registrations for the Conference are open and fee for the same is as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Students: Rs. 500/-&lt;/li&gt;
&lt;li&gt;Professionals: Rs. 750/-&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Please find attached the concept note, programme schedule and speakers’ profiles. &lt;span&gt;To register, visit &lt;a href="http://www.consilience.co.in/index.php/consilience-2013/register-for-the-conference"&gt;http://www.consilience.co.in/index.php/consilience-2013/register-for-the-conference&lt;/a&gt;. &lt;span&gt;For any other queries, please write to &lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="mailto:ltech.nls@gmail.com"&gt;ltech.nls@gmail.com&lt;/a&gt; .&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;or contact&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Shivam Singla (Ph: +91-9916708701)&lt;/li&gt;
&lt;li&gt;Ayushi Sutaria (Ph: +91-8123925725)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Conference Programme&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Saturday, December 14th, 2013&lt;/strong&gt;&lt;br /&gt;Venue: Conference Hall, Academic Block, NLSIU&lt;/p&gt;
&lt;table class="listing vertical"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;08.30&lt;br /&gt;09.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Breakfast and Registration&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.45&lt;br /&gt;10.00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inauguration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00&lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;Keynote Address&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30&lt;br /&gt;12.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 1: INTRODUCTION TO CLOUD COMPUTING&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How does cloud computing work? - An overview of the basic technical features &lt;/li&gt;
&lt;li&gt;The current legal regime related to cloud computing in India- Main issues and challenges&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Lunch&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15&lt;br /&gt;15.15&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 2: THE RELATION BETWEEN PARTIES TO CLOUD COMPUTING- USERS, INTERMEDIARIES &lt;br /&gt;AND GOVERNMENT BODIES&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal obligations of the intermediaries towards (i) the government and (ii) the users&lt;/li&gt;
&lt;li&gt;Cyber security concerns&lt;/li&gt;
&lt;li&gt;Standards of data protection&lt;/li&gt;
&lt;li&gt;Government's surveillance powers and privacy issues&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Tea Break&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.30&lt;br /&gt;17.30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 3: REGULATION AND MONITORING OF DATA CONTENT&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Current data control monitoring systems by intermediaries&lt;/li&gt;
&lt;li&gt;Data ownership and intellectual property issues- Possible threats and need for regulation&lt;/li&gt;
&lt;li&gt;Sensitive or critical data- Security concerns relating to their storage&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;High Tea/Networking Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Sunday, December 15th, 2013&lt;/strong&gt;&lt;br /&gt;Venue: Conference Hall, Academic Block, NLSIU&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09.00&lt;br /&gt;10.00&lt;/td&gt;
&lt;td&gt;Breakfast and Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00&lt;br /&gt;12.00&lt;/td&gt;
&lt;td&gt;SESSION 4: THE INTERNATIONAL PERSPECTIVE ON CLOUD COMPUTING&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Jurisdiction and choice of law issues- how do we counter the confusion?&lt;/li&gt;
&lt;li&gt;International laws applicable to cloud computing&lt;/li&gt;
&lt;li&gt;Need for a comprehensive international framework to simplify the situation?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Tea Break&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15&lt;br /&gt;14.15&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 5: COMPARATIVE ANALYSIS WITH LEGAL FRAMEWORKS IN OTHER COUNTRIES&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal frameworks in UK and Singapore &lt;/li&gt;
&lt;li&gt;Beneficial features of these legal regimes and their suitability in the Indian context &lt;/li&gt;
&lt;li&gt;Lessons to be learnt for India&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Lunch&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;br /&gt;17.00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 6: THE WAY FORWARD – SUGGESTIONS AND RECOMMENDATIONS&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Overview of the important challenges and suggestions&lt;/li&gt;
&lt;li&gt;Possible Policy and Legislative steps to improve the Cloud Computing regime in India&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;High Tea/Networking Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt;
&lt;li&gt;Click to read the &lt;a href="https://cis-india.org/internet-governance/blog/sub-tracks.pdf" class="internal-link"&gt;sub tracks&lt;/a&gt; for discussion&lt;/li&gt;
&lt;li&gt;Access the &lt;a href="https://cis-india.org/internet-governance/blog/consilience-speakers-profiles.pdf" class="internal-link"&gt;speakers' profiles here&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/legal-issues-on-cloud-computing'&gt;https://cis-india.org/events/legal-issues-on-cloud-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2022-02-07T15:29:00Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective">
    <title>CPDP 2014 Reforming Data Protection: The Global Perspective</title>
    <link>https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective</link>
    <description>
        &lt;b&gt;Already in its 7th edition, the annual Computer Privacy and Data Protection conference (organised by CPDP) is being held in Brussels from January 22 to 24, 2014. Malavika Jayaram will be speaking at this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The Centre for Internet and Society is &lt;a class="external-link" href="http://www.cpdpconferences.org/wednesday22january2014.html"&gt;one of the sponsors&lt;/a&gt; for this event. Click &lt;a class="external-link" href="http://www.cpdpconferences.org/wednesday22january2014.html"&gt;here&lt;/a&gt; to read the full programme.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CPDP is a &lt;b&gt;non-profit platform&lt;/b&gt; originally founded in 2007 by research groups from the Vrije Universiteit Brussel, the Université de Namur and Tilburg University, which has now grown significantly and incorporates a consortium of 21 conference partners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CPDP offers the &lt;b&gt;cutting edge in legal, regulatory, academic and technological development in privacy and data protection&lt;/b&gt;. In an atmosphere of independence and mutual respect, CPDP gathers academics, lawyers, practitioners, policy-makers, computer scientists and civil society from all over the world to exchange ideas and discuss the latest emerging issues and trends. This unique multidisciplinary formula has served to make CPDP &lt;b&gt;one of the leading data protection and privacy conferences in Europe and around the world&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CPDP2014 has become &lt;b&gt;truly global&lt;/b&gt;: it is co-organized by conference partners from Europe and the United States, and devotes panels to Latin-America and India. Moreover, CPDP is reaching out to the Asia-Pacific with speakers coming from all over the region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The progressive growth of CPDP will culminate in an unprecedented 7&lt;sup&gt;th&lt;/sup&gt; edition. A terrific programme will include &lt;b&gt;more than 60 panels&lt;/b&gt; held over three consecutive days. The panels will focus on key issues that cover &lt;b&gt;all current debates&lt;/b&gt;: The data protection reform in the European Union, PRISM, big data, cybercrime, data retention, cloud computing, enforcement by Data Protection Authorities, biometrics, e-health, privacy by design, and much, much more. In addition, there will be a day event on the ethical issues of data collection on minorities, and the use of technology to advance the status of Roma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CPDP will offer valuable contributions from the &lt;b&gt;leading names in the field&lt;/b&gt;, including key &lt;b&gt;representatives from all the major European institutions&lt;/b&gt; - the European Commission, the European Parliament, the European Data Protection Supervisor, and the Council of Europe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the well-known classic &lt;b&gt;Pecha Kucha&lt;/b&gt; side event, there will be several &lt;b&gt;public debates&lt;/b&gt; held in the evenings – both in Dutch and English.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CDP2014 will continue to pay particular attention to &lt;b&gt;high-level and innovative research from PhD Students and outstanding junior researchers &lt;/b&gt;by organizing sessions completely devoted to their work. CPDP2014 will also remain home to several &lt;b&gt;award ceremonies,&lt;/b&gt; such as the award for the best Multidisciplinary Privacy Paper and the EPIC International Champion of Freedom Award.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether you are involved in the Conference as a sponsor, supporter, partner or participant or not, CPDP2014 welcomes you to join the event and contribute to the debate on emerging privacy and data protection issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For up to date information, registration and the programme, please visit &lt;a href="http://www.cpdpconferences.org/"&gt;http://www.cpdpconferences.org/&lt;/a&gt; and follow CPDP on Facebook (cpdpconferences) and Twitter (@cpdpconferences).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you have any questions please contact: &lt;a href="mailto:info@cpdpconferences.org"&gt;info@cpdpconferences.org&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective'&gt;https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-11T03:39:50Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/technology-in-government-and-topics-in-privacy">
    <title>Technology in Government and Topics in Privacy</title>
    <link>https://cis-india.org/news/technology-in-government-and-topics-in-privacy</link>
    <description>
        &lt;b&gt;Malavika Jayaram is a speaker at an event organized by Data Privacy Lab at CGIS Cafe, Cambridge Street, Harvard University Campus. She will speak on Biometrics in Beta – India's Identity Experiment on December 9, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Technology in Government (TIG) and Topics in Privacy (TIP) consist of weekly discussions and brainstorming sessions on all aspects of privacy (TIP) and uses of technology to assess and solve societal, political, and government problems (TIG). Discussions are often inspired by a real-world problems being faced by the lead discussant, who may be from industry, government, or academia. Practice talks and presentations on specific techniques and topics are also common.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Abstract of the Talk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India's identity juggernaut - the Unique Identity (UID) project that has registered around 450 million people and is yet to be fully realized - is already the world's largest biometrics identity scheme. Based on the premise that centralized de-duplication and authentication will establish uniqueness and eliminate fraud, it is hailed as a game changer and a silver bullet that will solve myriad problems and improve welfare delivery, yet its conception and architecture raise significant concerns. In addition to the UID project, there is a slew of "Big Brother" systems that together form a matrix of identity and surveillance schemes: the UID is intended as a common identifier across this matrix as well as other public and private databases. Indian authorities frame Big Data as a panacea for fraud, corruption and abuse, without apprehending the further fraud, corruption and abuse that joined up databases can themselves engender. The creation of a privacy-invading technology layer not simply as a barrier to online participation but to social participation writ large is not fully appreciated by policy makers. Malavika will provide an overview of the identity landscape including the implications for privacy and free speech, and more broadly, democracy and openness.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Malavika Jayaram&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Malavika is a Fellow at the Berkman Center for Internet and Society at Harvard, focusing on privacy, identity and free expression, especially in the context of India's biometric ID project. A Fellow at the Centre for Internet and Society, Bangalore, she is the author of the India chapter for the Data Protection &amp;amp; Privacy volume in the Getting the Deal Done series. She is one of 10 Indian lawyers in The International Who's Who of Internet e-Commerce &amp;amp; Data Protection Lawyers directory. In August 2013, she was voted one of India's leading lawyers - one of only 8 women to be featured in the "40 under 45" survey conducted by Law Business Research, London. In a different life, she spent 8 years in London, practicing law with global law firm Allen &amp;amp; Overy in the Communications, Media &amp;amp; Technology group, and as VP and Technology Counsel at Citigroup. During 2012-2013, She was a Visiting Scholar at the Annenberg School for Communication, University of Pennsylvania.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to read more on the event originally &lt;a class="external-link" href="http://dataprivacylab.org/TIP/index.html#talk10"&gt;published by Data Privacy Lab here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/technology-in-government-and-topics-in-privacy'&gt;https://cis-india.org/news/technology-in-government-and-topics-in-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-27T10:20:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cyberscholars-working-group-mit">
    <title>Cyberscholars Working Group at MIT</title>
    <link>https://cis-india.org/news/cyberscholars-working-group-mit</link>
    <description>
        &lt;b&gt;Malavika Jayaram is giving a talk on Biometrics or Bust - India’s Identity Crisis at this event organised by Berkman Center for Internet &amp; Society on December 12 at 6.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read the original &lt;a class="external-link" href="https://cyber.law.harvard.edu/events/cyberscholars/12/mit"&gt;published by Harvard University here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Cyberscholar Working Group is a forum for fellows and affiliates of MIT, Yale Law School Information Society Project, Columbia University, and the Berkman Center for Internet &amp;amp; Society at Harvard University to discuss their ongoing research. Each session is focused on the peer review and discussion of current projects submitted by a presenter. Meeting alternatively at Harvard, MIT, Yale, the working group aims to expand the shared knowledge of young scholars by bringing together these preeminent centers of thought on issues confronting the information age. Discussion sessions are designed to facilitate advancements in the individual research of presenters and in turn encourage exposure among the participants to the multi-disciplinary features of the issues addressed by their own work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This month's presentations include:&lt;br /&gt; &lt;b&gt;(1) "Lines of Control: Networks of Imperialism and Independence in India (1840-1947)"&lt;/b&gt;&lt;br /&gt;Abstract: This paper examines the history of communications networks in India and the relationship between communications and second-order networks. It draws attention to the wave of colonial network development that took place in India between 1840 and 1948. During these years, Britain constructed a series shipping, rail and telegraph networks to achieve a set of military and commercial goals. This paper studies how first- and second-order networks developed, and the intended and unintended effects of these networks on Indiaʼs economics, politics, and identity. The paper draws on economic and social studies of colonial communications networks in India, original reports by British officials and the Colonial Office, and the literature focusing on the role of technology in British imperialism. It shows how Indiaʼs colonial communication networks, built to augment and extend British control over the subcontinent, became conduits for Indian resistance and nationalism.&lt;br /&gt;Keywords: shipping, telegraph, railroads, imperialism, nationalism, network theory, India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Colin Agur &lt;/b&gt;is a PhD candidate at Columbia University and Visiting Fellow at Yale Law School's Information Society Project. His research examines India's telecommunications, focusing on mobile network formation and second-order effects of network growth. He spent the 2012-13 academic year in Delhi and Chennai, conducting document analysis, interviews with industry figures and participant observation related to mobile phone usage. He has published articles about Indian media and culture in Harvard's Nieman Lab, the Journal of Asian and African Studies and Journalism (forthcoming), and about telecommunications history in Information and Culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(2) Big Data Dramas in the 1960s and 1970s&lt;/b&gt;&lt;br /&gt;Abstract: The recent frenzy in discussing NSA activities and the collecting of Big Data show a widespread critical concern for the current practice of gathering and using personal data. These concerns have their history. In my presentation, I track the beginnings of a growing public awareness and sensitivity towards the societal handling of personal data. I argue that the early computerization phase during the 1960s and 1970s played a crucial role in discussing these issues. Media reports, popular books, scientific publications, and political hearings all of a sudden began – often in quite different ways – to address and question contemporary practices of collecting, sharing, and storing of personal data. Their authors explored and negotiated all kind of societal settings where personal data played a significant role at that time. There have been concerns about these issues with personal data before, but – as I will show in my presentation – not on this broad societal level and to this extent as in the late 1960s and early 1970s. I argue that during that time, the usage of personal data became a highly controversial matter not only of public, but also of private interest.My inquiry examines how the term “data“ and in particular the collection of personal data became loaded with cultural and emotional significance in scientific and media discussions in the 1960s and 1970s in the United States and in Germany. Furthermore, it explores how the early computerization affected our societal handling of data long before the personal computer entered our private lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Julia Fleischhack&lt;/b&gt; is a visiting postdoctoral research fellow in the program in Science, Technology, and Society at the Massachusetts Institute of Technology. She holds a PhD in anthropology from Zürich University. Her current research is on data centers from the private sector and funded by the Fritz Thyssen foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(3) Biometrics or Bust - India’s Identity Crisis&lt;/b&gt;&lt;br /&gt;Abstract: India's identity juggernaut - the Unique Identity (UID) project that has registered around 500 million people and is yet to be fully realized - is already the world's largest ever biometrics identity scheme. Grounded in the premise that centralized de-duplication and authentication will uniquely identify people and eliminate fraud, it is hailed as a game changer and a silver bullet that will solve myriad socio-economic problems, yet its conception and architecture raise significant concerns. Its implementation as a techno-utopian project in a legal vacuum, despite the potential for abuse and exclusion, give pause to the much-vaunted claims of transforming welfare delivery and galvanizing financial inclusion. I will provide an overview of the identity project and highlight some of the key implications for privacy and free speech, and more broadly, democracy and openness. I will also unpack some of the narratives being constructed, describe the current public discourse and legal developments, and locate the project within the broader surveillance state and database nation that India is morphing into.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Malavika Jayaram&lt;/b&gt; is a Fellow at the Berkman Center for Internet and Society at Harvard, focusing on privacy, identity and free expression. A Fellow at the Centre for Internet and Society, Bangalore, she is one of 10 Indian lawyers in The International Who's Who of Internet e-Commerce &amp;amp; Data Protection directory. In August 2013, she was voted one of India's leading lawyers - one of only 8 women to be featured in the "40 under 45" survey conducted by Law Business Research, London.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cyberscholars-working-group-mit'&gt;https://cis-india.org/news/cyberscholars-working-group-mit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-01-09T06:41:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/whatever-happened-to-privacy">
    <title>"Whatever happened to Privacy?" - International Activism Conference</title>
    <link>https://cis-india.org/news/whatever-happened-to-privacy</link>
    <description>
        &lt;b&gt;Maria Xynou gave a keynote speech and participated as a panelist on the "Suspect Societies" panel. The event was organized by Heinrich Boell Foundation in Berlin on December 5 and 6, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;"Whatever happened to privacy" brought together international activists on focal topics and combined bar camp style work sessions and political round tables with a classic public event, It focussed on an issue which has far reaching consequences for politically active people across the world - the issue of privacy and surveillance. The revelations around the NSA and GCHQ as well as other countries secret service digital surveillance activities have spurred political debate. This debate was intensified at "Whatever happened to Privacy?" formulating political demands, developing action strategies and debating questions such as:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;What cultural and political value does privacy have today?&lt;/li&gt;
&lt;li&gt;What are the societal implications of the wide spread "I have nothing to hide" attitude?&lt;/li&gt;
&lt;li&gt;What political actions are necessary to protect citizens from mass surveillance and what tools exist for people to secure their communications, movements and lives?&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;For video and more info, &lt;a class="external-link" href="http://www.boell.de/en/whatever-happened-privacy"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/whatever-happened-to-privacy'&gt;https://cis-india.org/news/whatever-happened-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-03T05:56:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues">
    <title>India for UN body to resolve internet governance issues</title>
    <link>https://cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues</link>
    <description>
        &lt;b&gt;Multi-stakeholder or multi-lateral - two words encapsulating diametrically opposite views on internet governance stands at the heart of a raging debate across the globe.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-12-05/internet/44806628_1_critical-internet-resources-enhanced-cooperation-internet-governance-issues"&gt;published in the Times of India&lt;/a&gt; on December 5, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;At the Working Group on Enhanced Cooperation (WGEC) meeting in Geneva last month, India suggested forming a multi-lateral UN body to co-ordinate on internet governance issues. And several activists feel that is not the right way forward.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Multi-stakeholder control over the world wide web means parties other than governments, which include the tech community, academia, businesses and civil society. In a multi-lateral arrangement, only the governments will be the decision-makers and every other stakeholder barring the state, is relegated to a purely advisory role. Simply put, the choice is between total state control over the internet or a more democratic set-up where other sections of society are also represented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Civil society and businesses are concerned that being relegated to an advisory role rather than a decision-making one could lead to disregarding or dumping their inputs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Everyone must have a seat at the table," says Rajan Mathews, director general of the Cellular Operators Association of India (COAI). "If you are designing a new model, it is important that it is as inclusive as possible. That will create better decisions. It will also discourage back-door bargaining between governments," says Anja Kovacs of the Internet Democracy Project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The internet architecture has always been controlled by the US. The demand for a more democratised set-up, where other countries also have a voice, started in early 2000s. In 2005, a consensus document, Tunis Agenda, had been signed under the aegis of the UN. It laid out much of the terms of the debate around internet governance, including the focus on enhanced cooperation and the need for a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, India put forward a detailed proposal for a multi-lateral UN body that was widely criticised by activists and business bodies at home. In Geneva this November, India's answer to a question on implementing "enhanced cooperation" in a WGEC questionnaire, went like this: "A suitable multilateral, transparent and democratic mechanism must be created where governments, on an equal footing, may carry out their roles and responsibilities in international public policy issues pertaining to the Internet and public policy issues pertaining to coordination and management of critical Internet resources, in consultation with all other stakeholders."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay Kumar of the Department of Electronics and Communication Technology (DeitY), was a part of the delegation representing India at Geneva. The DeitY falls under the union ministry of communication and information technology. Kumar told TOI, that while there is a relook at the 2011 proposal, India has been following the Tunis Agenda when it comes to enhanced cooperation between different countries and other stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nonetheless, Parminder Jeet Singh of the NGO IT for Change has supported the government position at the WGEC meeting. The two other civil society bodies from India at Geneva wanted a multi-stakeholder model. Singh feels that the proposal may have an important role to play at a later stage when "real political talk shapes up". "We don't agree that a Google or an IT for Change should vote in the decision-making about actual public policies. We understand the fear (behind such an arrangement) but we prefer that public policy decisions at global level remain with governments as they are legitimate representatives of the people," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Sunil Abraham, executive director of the Center for Internet and Society, warns against the governmental tendency to centralize and for being opaque. He also feels that a single model, whether multilateral or multi-stakeholder, will not work. Every model must change with every issue being brought to the table, he says. "For instance, something like controlling child pornography, will need one kind of model to deal with. The same won't work when dealing with hate speech," Abraham points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists are hoping that the Brazil global multi-stakeholder meeting in April next year will take the issue of democratised internet governance forward.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues'&gt;https://cis-india.org/news/times-of-india-december-5-2013-kim-arora-india-for-un-body-to-resolve-internet-governance-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T08:51:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice">
    <title>International View of the State-of-the-Art of Cryptography and Security and its Use in Practice (IV)</title>
    <link>https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice</link>
    <description>
        &lt;b&gt;Building on the workshop in Dagstuhl in June-July 2011 (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice), Beijing  (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice  II), and Athens (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice  III) that set the stage for discussions on cryptography among a group of key researchers from Europe, Asia, and North America, the  one day workshop in Bangalore, following AsiaCrypt 2013  will again bring together internationally recognized scientists to discuss direction and development in  theoretical and applied cryptography and surrounding societal issues. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;There will be four focus areas:&lt;/p&gt;
&lt;ul style="list-style-type: disc; text-align: justify; "&gt;
&lt;li&gt;Real-life cryptography&lt;/li&gt;
&lt;li&gt;Standardization&lt;/li&gt;
&lt;li&gt;Regulatory requirements&lt;/li&gt;
&lt;li&gt;Innovative use cases for cryptography&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Each focus area will be anchored in an invited talk               and/or panel, but the emphasis will be on discussion. The               participants will address broad research directions in               encryption and secure computation and their applications               in cloud computing, smart grid, mobile and embedded               computing, hardware, software, and network security. They               will also examine non-technical issues surrounding               deployment and adoption of new security technologies using               encryption, such as privacy or economic consideration.               Approaches and projects in different countries will be               discussed, in order to increase awareness of the R&amp;amp;D               activities internationally and continue to for a strong               community of research and practice and in order to               generate new ideas in this field.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the workshop will cover a broad spectrum of               issues from the list presented below with a specific focus               that will be announced shortly. The topics of               interest include (but are not limited to) the following               subjects:&lt;/p&gt;
&lt;ul style="list-style-type: disc; text-align: justify; "&gt;
&lt;li&gt; Secret versus public ciphers&lt;/li&gt;
&lt;li&gt; Cipher and algorithm development process&lt;/li&gt;
&lt;li&gt; Algorithms maturity and review&lt;/li&gt;
&lt;li&gt; Lightweight cryptography&lt;/li&gt;
&lt;li&gt; New requirements for cryptography for novel                 applications&lt;/li&gt;
&lt;li&gt; Cipher implementation and interoperability&lt;/li&gt;
&lt;li&gt; Standardization&lt;/li&gt;
&lt;li&gt; Regulatory initiatives&lt;/li&gt;
&lt;li&gt; Privacy enhancing cryptography&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;8:15 a.m.&lt;/td&gt;
&lt;td&gt;Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8:30 a.m.&lt;/td&gt;
&lt;td&gt;Opening statement (Organizers)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8:40 a.m.&lt;/td&gt;
&lt;td&gt;Opening keynote (TBD)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:10 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel 1 and discussion: Advances in cryptography; new use cases, Participants:  Dan Bernstein (University of Illinois at Chicago), Tanja Lange (Eindhoven), Veni Madhavan (ERNET), others TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 a.m.&lt;/td&gt;
&lt;td&gt;Coffee break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel II and  discussion: Regulatory environment and standardization: Sunil Abraham (India CIS), Kazue Sako (NEC), Claire Vishik (Intel), others TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 a.m.&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.30 p.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel 3 and discussion: Implementation and interoperability for new environments (e.g., smart grid, Internet of things): Reji Kumar (Smart Grid India), other TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.00 p.m.&lt;/td&gt;
&lt;td&gt;Coffee break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.30 p.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel IV and discussion: Privacy, social networking, ubiquitous connectivity and cryptography: Rene Peralta (NIST), Kumar Ranganathan, others TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.00 p.m.&lt;/td&gt;
&lt;td&gt;Thoughts and next workshop&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.20 p.m.&lt;/td&gt;
&lt;td&gt;Closing statements (Organizers)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.30 p.m.&lt;/td&gt;
&lt;td&gt;Adjourn&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="list-style-type: disc; text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice'&gt;https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T09:05:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time">
    <title>Card transactions with Aadhaar validation need more time: experts</title>
    <link>https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time</link>
    <description>
        &lt;b&gt;Cost and supply implications are seen by experts as the main hurdles in implementing the RBI directive. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Kirti V. Rao and Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Politics/f0P6jklKaCVt5rP6RKBHbJ/Card-transactions-with-Aadhaar-validation-need-more-time-ex.html"&gt;published in Livemint&lt;/a&gt; on December 5, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Reserve Bank of India’s (RBI’s) move to introduce a new card payment infrastructure able to authenticate transactions using Aadhaar unique identity number-linked biometrics may take some time to implement as it has cost and supply implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“All new card present infrastructure has to be enabled for both EMV chip and PIN and Aadhaar (biometric validation) acceptance,” RBI said in a notification on 26 November.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Europay MasterCard Visa, or EMV, chip and PIN authentication involves card information stored in a chip that is accessible through a PIN or personal identification number, which replaces a cardholder’s signature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, all card infrastructure in India such as automated teller machines (ATMs) and point-of-sales (PoS) machines are moving towards full compliance with the global EMV standard that requires reading integrated circuit cards to authenticate credit and debit card transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although all transactions through debit cards are now required to be authenticated by PIN, validating financial transactions by using the biometric Aadhaar identity number database is yet to gain traction. Such a service is expected to begin in May.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not all experts are in favour of the central bank’s move to use biometrics data to authenticate transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a terrible idea. Biometrics should never be used as authentication factor since it cannot be revoked when it is compromised,” said Sunil Abraham, executive director of Bangalore-based think-tank Centre for Internet and Society. “Digital signatures and its variations like the EMV chip are the right way to proceed.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A banker did not fully agree with Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pulak Sinha, general manager (payment solutions) at State Bank of India, said: “In our experience, there is a need for biometric authentication in certain geographical segments in the country. Our bank has used biometric authentication for financial inclusion initiatives and has found it very useful. Having said that, each bank is the best judge as to which technology is more relevant for their customers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sinha added, “Also changing new infrastructure to accept all types of technologies has its own challenges as well as financial implications. Again, business cases need to be built and when people get additional services they may have to pay.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are cost implications if the RBI directive is to be implemented, according to Rajiv Kaul, chief executive of CMS Info Systems Pvt. Ltd, which runs two cash management companies and has recently received an order from SBI to deploy 8,000 cash machines across the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Some of the ATM infrastructure currently installed have some of the capabilities for EMV chip cards, but even as they are hardware-equipped, software will need to be upgraded,” Kaul said. “For biometric compliance, both hardware and software will need to be installed, which will result in extra cost. So, for the short term, from the biometric perspective, the cost will go up.”&lt;br /&gt;Some experts hold that the notification provides a chance to assess the as-yet-untested Aadhaar-linked biometrics model where the EMV model may be hard to implement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“RBI has been pragmatic in mandating it incrementally as it is giving Aadhaar a runway to evolve in terms of operations, use cases, risk, technology standards, dispute resolution and get these things in order,” Uttam Nayak, group country manager, India and South Asia at Visa Consolidated Support Services (India) Pvt. Ltd, told Mint on 26 November. “Because Aadhaar is tokenless and doesn’t need a card, it has great potential for inclusion.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometrics-enabled cash and PoS machines will require additional expenditure as they need high-speed Internet connectivity to transmit biometrics data, Rajeev Chandrasekhar, member of the upper house of Parliament, said in a letter to RBI governor Raghuram Rajan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The hardware and software cost of upgrading a single unit with biometrics hardware is not very much but changing the entire ecosystem would have costs,” acknowledged SBI’s Sinha. “When people get additional services they will have to pay.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A high percentage of the population is still unbanked. The opportunity (to reach people through biometric validation and Aadhaar) is too tempting for the acquirers (banks and others using PoS devices) to not take this up,” said Robin Roy, associate director of financial services at consultancy firm PricewaterhouseCoopers Pvt. Ltd.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether there would be enough suppliers of machines to implement the directive is also a concern, some experts said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time'&gt;https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T06:25:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/insafnational-convention-on-crisis">
    <title>INSAF National Convention on Crisis of Capitalism and brazen onslaught on DEMOCRACY </title>
    <link>https://cis-india.org/news/insafnational-convention-on-crisis</link>
    <description>
        &lt;b&gt;Snehashish Ghosh is participating in this event as a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Ever since the Neo-liberal agenda began to unfold 22 years back, the democratic spaces within Indian polity have been squeezing continuously and the present scenario of run up to 2014 elections is reflecting the state of disarray in parliamentary democracy. The mainstream discourse appears to have deliberately failed in bringing out the intrinsic relationship between ‘capitalism’; its ‘crisis’ and ‘democracy’ to the core of analyzing and understanding the present amnesia in political process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The characteristics of crony, fictitious, lumpen and speculative Capital that is on the driving seat of contemporary phase of capitalism are mirrored in the operational levels of parliamentary democracy - from governance to electoral process- in the form of corporate influences on policies and decision making, rampant corruption at the pinnacle of power, control of money and muscle-power in politics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is, therefore, important to bring out the correlation between the ensuing crisis in global capitalism - including in India - and the impending crisis in our democracy - to the fore. The divergence in the requirements of the neo-liberal phase of capitalism and ‘democracy’ as its analogous political system seems to be the key in explaining the despair engulfing Indian polity at present. The attempts to transform ‘Democracies’ into ‘Corporatocracies’ that we see today, also emanate from this despondency alone.&lt;br /&gt;&lt;br /&gt;Last two decades have also seen the institution of ‘State’ posturing itself more and more aggressively against its own people in order to fulfill its obligations to international financial &amp;amp; trade institutions so to serve the interest of global capital. In such a course, it has extensively resorted to adopt the instrument of ‘fabricating’ cases against the voices of opposition to the interests of the global capital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the instrument of ‘fabrication’ is not new to the ‘State Craft’ but this time it is being used in a targeted and selective manner. Not only the existing criminal laws have been used for this purpose but new laws like UAPA and various state ‘security laws’ were created during this period to meet this requirement.&lt;br /&gt;&lt;br /&gt;The ‘Indian State’ is also proceeding feverishly to create a surveillance state through various means of ‘electronic surveillance’ using cutting edge technologies to track mobile phones, internet usage, emails etc. at home while colluding with U.S. military and security establishment internationally against other nations. The business of creating and sharing of its citizen’s databases (both demographic &amp;amp; biometrics etc) has been promoted by Indian establishment by subverting the Constitution, existing norms of parliamentary democracy and citizens’ rights.&lt;br /&gt;&lt;br /&gt;It is in this context that INSAF has decided to hold its two day National Convention 2013.&lt;/p&gt;
&lt;h3 align="LEFT"&gt;Programme Schedule&lt;/h3&gt;
&lt;p align="LEFT"&gt;&lt;b&gt;Day 1: Crisis of Capitalism and brazen onslaught on DEMOCRACY&lt;/b&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10.00 &lt;br /&gt;10.30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea/Coffee&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 &lt;br /&gt;11.00 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Introduction by Anil Chaudhary&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 &lt;br /&gt;13.00 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inaugural address by eminent writer and journalist P. Sainath Chaired by Justice Rajinder Sachar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00 &lt;br /&gt;14.30&lt;/td&gt;
&lt;td&gt;Lunch&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.30 &lt;br /&gt; 17.30  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;Panel Discussion:&lt;/p&gt;
Prof. Vibhuti Patel (Director, Centre for Study of Social Exclusion and Inclusive Policy, SNDT Women's University, Mumbai)&lt;br /&gt;Prof. Achin Vanaik (Former Dean of Social Sciences, Delhi University)&lt;br /&gt;Prof. Ramesh Dixit (Lucknow, UP)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Day 2: Surveillance state and perils of DEMOCRACY&lt;/b&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10.00&lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Panel Discussion&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr. Usha Ramanathan (Law researcher and activist, New Delhi)&lt;br /&gt;Prabir Purkayastha (Delhi Science Forum)&lt;br /&gt;Ms. Subi Chaturvedi (Asstt. Prof. of Journalism Communication, Lady Shri Ram College for Women, Delhi Univ. Founder Hon. Managing Trustee, Media For Change)&lt;br /&gt;Snehashish Ghosh (Centre for Internet &amp;amp; Society)&lt;br /&gt;Chaired by Ms. Kalyani Menon-Sen (Feminist activist &amp;amp; researcher)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;br /&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00 &lt;br /&gt;16.30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Panel Discussion: Suppressing dissent: Stifling NGOs via FCRA&lt;br /&gt;Kabir Dixit (Advocate, Supreme Court of India) &lt;br /&gt;Mathew Cherian (Chairperson, Credibility Alliance)&lt;br /&gt;Chaired by Sanjay Parikh (Human Rights activist and Advocate, Supreme Court of India)&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.30&lt;br /&gt;17.00&lt;/td&gt;
&lt;td&gt;Tea/Coffee&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/insafnational-convention-on-crisis'&gt;https://cis-india.org/news/insafnational-convention-on-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T10:18:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote">
    <title>A Three-Way Race Draws Delhi’s Young, and Everyone Else, Out to Vote</title>
    <link>https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote</link>
    <description>
        &lt;b&gt;The polling stations were supposed to close at 5:30 p.m. on Wednesday, just after sunset. But with thousands still waiting in the dark to cast their vote in the state assembly elections, the Delhi Election Commission decided to extend the voting until 6:30 p.m. Then to 7:30 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Betwa Sharma was &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/12/04/a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote/?_r=1"&gt;published in the New York Times&lt;/a&gt; on December 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Finally, the Election Commission said it would wait until 9:30 p.m. to close the polls. At the polling station in the New Delhi district, those waiting in line agreed that a relatively warm winter evening was helping to draw people out to vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though no official data on voter turnout had been released by 9 p.m., it was clear that voters were coming out in unprecedented numbers for this year’s Delhi state elections. Analysts were predicting that this election would break the previous voter turnout record of 61.75 percent in 1993.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike in the past, this year’s contest featured a potential spoiler in the Aam Aadmi, or Common Man, Party. Its leader, the firebrand anticorruption activist Arvind Kejriwal, was battling to dethrone the state’s longtime chief minister, Sheila Dikshit of the Congress Party, and siphon votes from the other establishment choice, the Bharatiya Janata Party, or B.J.P. (Exit polls by the &lt;a href="http://zeenews.india.com/assembly-elections-2013/delhi-polls/delhi-exit-polls-live-bjp-biggest-winner-aap-plays-spoilsport-for-congress_894372.html"&gt;local media&lt;/a&gt; on Wednesday night were showing that the B.J.P. was likely to win the most seats in the state assembly.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The prospect of upending the political status quo brought out young voters like 23-year-old Hina Kousar, although she had to put up a fight with her family to cast her vote for the Aam Aadmi Party. Her mother lectured her on how governments don’t care about people, but that didn’t deter Ms. Kousar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“They have the wrong mentality, and young people should change it,” she said. “My granny is 70 years old and I told her to vote.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many of the youthful voters turned voting into a social activity, both in person and online. At one polling station, most people cast their votes quietly and left, but many of the young voters came with their friends. They talked animatedly about their choices while leaving the polling stations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others called their families to say they had voted. Some clicked photos of each other on their smartphones and posted the images on their Facebook pages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In less than a year, Mr. Kejriwal, 45, and his party has pasted itself quite literally on city’s consciousness with aggressive campaigns and posters of brooms, symbolizing sweeping away the old order. And that’s why he got Ms. Kousar’s vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The most important thing is that he has promised to remove corruption. The money that is going into Swiss banks is our money. The rising market prices are because of it,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several voters between the ages of 20 to 25 who were interviewed by India Ink said they were backing Mr. Kejriwal, who represented a change from the three-term winner Ms. Dikshit. The B.J.P. had no star state candidate that appealed to them, even though its prime ministerial candidate, Narendra Modi, engaged with students at Delhi University earlier this year and is extremely active on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides corruption, several young voters, both male and female, said that ensuring women’s safety had to be a priority for any Delhi government.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Another Kejriwal voter, Kavita, a 27-year-old teacher who goes by one name, said that Ms. Dikshit’s government hadn’t effectively improved women’s safety after the gang rape of a physiotherapy student one year ago. “I don’t feel the difference,” she said. “I still feel unsafe on the streets, so let’s see what some new leaders can do to change this.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abhilash Sasidharan, 26, after he cast his vote at a polling booth in New Delhi on Wednesday.Betwa Sharma Abhilash Sasidharan, 26, after he cast his vote at a polling booth in New Delhi on Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another Kejriwal supporter, Abhilash Sasidharan, 27, said a safe environment for women is “absolutely” the most important thing to him, but the software engineer also was moved that Mr. Kejriwal had left his lucrative job as a revenue service officer to join politics.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Kavita.png" alt="Kavita" class="image-inline" title="Kavita" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="caption"&gt;Kavita, 27, after she cast her vote at a polling booth in New Delhi on Wednesday.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;“I don’t have the courage to step into dirty politics, but he does and I want to support that,” he said. “Look, Congress has had 15 years, so why not see if someone can do better, and all these parties should feel a threat to do better.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all young people are buying Mr. Kejriwal’s promises of sweeping change. Shiv Raj Syal, 20, called them “flowery and too good to believe,” as he cast his vote for Ms. Dikshit. “He is just very new at this and I don’t think it’s wise to hand over the running of a national capital to a party with no experience,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chief minister had focused on development, the college student said, making Delhi a hub for foreign brands and corporates, and transforming it into an international city.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Abhilash.png" title="Abhilash" height="215" width="161" alt="Abhilash" class="image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;Abhilash Sasidharan, 26, after he cast his vote at a polling booth in New Delhi on Wednesday.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Despite the appearance of a robust youth presence at the polls on Wednesday, analysts are waiting on the Election Commission’s numbers before declaring this election cycle the year of the youth vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sanjay Kumar, an election analyst from the Center for the Study of Developing Societies in Delhi, said that as of July, only 68 percent of eligible voters between the ages of 18 and 21 had registered to vote, far lower than the 86 percent average of other demographics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;V.S. Sampath, the chief election commissioner in India, said that youth participation in the electoral process had been a priority in recent years, and several efforts including visiting universities and colleges had been made to register them, which had resulted in a “significant increase.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, Mr. Sampath said, 119,000 voters between the ages of 18 and 19 were on the electoral rolls in Delhi, which accounted for 0.93 percent of total Delhi voters, but now the numbers had gone up to 405,000, or 3.4 percent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Election observers have also pointed out that the hype about social media, especially Twitter, becoming a tool for political expression and organization for the youth has not necessarily translated into a surge in voting in that demographic of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The political debates on social media could translate into votes by the next elections, according to Sunil Abraham from the Centere of Internet and Society in Bangalore, who describes the Internet penetration as “limited,” and social media use even smaller and dominated by the economic elite.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Abraham, however, said social media is influencing the political discourse, not by motivating voters, but by influencing the coverage in mainstream media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relative to the country’s population, he added, social media users had a “disproportionate influence on discourse.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the young voters who spoke to India Ink said that at least for them, social media did play a role in drawing them into politics this year. Mr. Syal, the Congress voter, for instance, said that he had posted a message on his Facebook wall criticizing some of Mr. Kejriwal’s claims, which drew 50 comments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And Mr. Sasidharan, the Aam Aadmi Party supporter, posted on Facebook a photo of him holding up his finger stained with ink, showing that he voted, immediately after coming out of the polling station. “I hope that it inspires more people to come and vote,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote'&gt;https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T07:03:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one">
    <title>When the virtual world wakes up the real one</title>
    <link>https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one</link>
    <description>
        &lt;b&gt;The unprecedented wave of voices speaking up against sexual harassment in recent times has as much to do with technology as the determination to seek justice. From Twitter to Tumblr, and blogs to pastebin, the internet's anonymity, reach and speed allow small, personal stories of abuse to swell into big stories.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Malini Nair was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-11-24/deep-focus/44411700_1_social-web-sexual-harassment-editor-tarun-tejpal"&gt;published in the Times of India&lt;/a&gt; on November 24. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The outrage over the Tehelka case started with a post on pastebin, an  anonymous document sharing site, on Wednesday evening. It contained the  email managing editor Shoma Chaudhury had sent to the Tehelka staff with  editor Tarun Tejpal's "atonement" letter appended below. A few hours  later, the story had ballooned into a heated debate, and the outpouring  forced what was being dismissed as an "internal matter" to be treated as  a criminal case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The two &lt;a href="http://timesofindia.indiatimes.com/topic/Women"&gt;women&lt;/a&gt; who recently spoke up against harassment at the hands of a retired  Supreme Court judge also used Facebook and the blogosphere to tell their  stories, ensuring that the real world was actually moved into taking  action. "The social web's biggest comfort is that we are no longer  alone," says Nishant Shah, director, Research at the Centre for Internet  and Society, Bangalore. "No matter what has happened to us, it has  happened to somebody else. The possibility of finding credulous and  empathetic audiences who but share our pain, understand it, and respond  to it is unprecedented." Retweets and comments have often been described  as the digital equivalent of holding hands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah's pick of web  campaigns that highlighted the problems include Blank Noise which calls  women to talk of small, everyday stories of harassment, the Pink Chaddi  drive and Why We Need Feminism, a web venture across American  universities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other reason why the net encourages victims of  abuse who might otherwise have stayed quiet to speak out is its  "pseudonymity", as Shah terms it. In societies where there is shame  attached to talking about sexual assault, the online space saves women  from having to put themselves out in the "physical space" while ensuring  that the perpetrator is exposed, he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A plus for  social web is that it gets other victims to speak up as well, gathering  force and magnitude in the process. This happened in the instance of the  legal interns. Another instance that surfaced just a month ago was of  two American women science bloggers Danielle Lee and Monica Byrne. When  Lee refused to write a piece for free for Biology Online, she was called  "urban whore" by an enraged editor. She blogged about it and the  ensuing storm over social media got her huge support. After Lee's  expose, Byrne blogged about an acutely sexual conversation a powerful  science writer inflicted on her. The outrage this provoked abated only  after he made amends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an article in Gender and Culture blog project puts it: "( The digital world provided) a &lt;a href="http://timesofindia.indiatimes.com/topic/Forum"&gt;forum&lt;/a&gt; for these victims to document their abuse, and a courtroom where the  abusers have been judged and found guilty by public opinion".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of  course there are problems with the internet's version of justice — it  tends to play judge, jury and executioner with giddy recklessness. In  the Tehelka case, the first questionable moment came when the survivor's  email was tweeted and re-tweeted with no concern for her requests for  anonymity. "The problem with Twitter and Facebook is the incredible and  gross violations of privacy of the survivor. And otherwise responsible  adults join lynch mobs calling either the &lt;a href="http://timesofindia.indiatimes.com/topic/Survivor"&gt;survivor&lt;/a&gt; or the accused names, making ridiculous allegations, desperately  looking for an easy narrative to hang everything on," says author Nisha  Susan, who led the Pink Chaddi campaign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentator Santosh Desai says that it is tough to choose between an  unbridled but powerful social web and one that is cautious and governed  by norms. "Earlier, there were receivers and broadcasters who were few  and governed by licenses and a code of behaviour. Now everyone is a  broadcaster, everyone is a circulator and everyone is an aggregator.  Having no oversight here could be problematic," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Susan says communities need to go beyond social media in such situations. "It should also be a time for us to reflect. On what we would do in such a situation, how we could perhaps prevent it, on the sense of entitlement powerful men have all over the world, on the awful pressures young women face. We should all be reflecting. Instead we are just re-tweeting."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one'&gt;https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-30T09:35:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello">
    <title>I Just Pinged to Say Hello</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello</link>
    <description>
        &lt;b&gt;A host of social networks find us more connected than ever before, but leave us groping for words in the digital space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's article was &lt;a class="external-link" href="http://www.indianexpress.com/news/i-just-pinged-to-say-hello/1198448/0"&gt;published in the Indian Express&lt;/a&gt; on November 24, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I am making a list of all the platforms that I use to connect with the large networks that I belong to. Here goes: I use Yahoo! Messenger to talk to my friends in east Asia. Most of my work meetings happen on Skype and Google Hangout. A lot of friendly chatter fills up my Facebook Messenger. Twitter is always available for a little back-chat and bitching. On the phone, I use Viber to make VoIP calls and WhatsApp is the space for unending conversations spread across days. And these are just the spaces for real-time conversation. Across all these platforms, something strange is happening. As I stay connected all the time, I am facing a phenomenon where we have run out of things to say, but not the desire to talk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I had these three conversations today on three different instant-messaging platforms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Person 1 (on WhatsApp): Hi.&lt;br /&gt;&lt;br /&gt;Me: Hey, good to hear from you. How are you doing?&lt;br /&gt;&lt;br /&gt;Person 1: Good.&lt;br /&gt;&lt;br /&gt;Me (after considerable silence): So what's up?&lt;br /&gt;&lt;br /&gt;Person 1: Nothing.&lt;br /&gt;&lt;br /&gt;End of conversation.&lt;br /&gt;&lt;br /&gt;Person 2 (On an incoming video call on Skype): Hey, you there?&lt;br /&gt;&lt;br /&gt;Me: Yeah. What time is it for you right now?&lt;br /&gt;&lt;br /&gt;Person 2: It is 10 at night.&lt;br /&gt;&lt;br /&gt;Me: Oh! That is late. How come you are calling me so late?&lt;br /&gt;&lt;br /&gt;Person 2: Oh, I saw you online.&lt;br /&gt;&lt;br /&gt;Me: Ok….. *eyes raised in question mark*&lt;br /&gt;&lt;br /&gt;Person 2: So, that's it. I am going to sleep soon.&lt;br /&gt;&lt;br /&gt;Me: Ok…. Er…goodnight.&lt;br /&gt;&lt;br /&gt;Person2: Goodnight.&lt;br /&gt;&lt;br /&gt;We hang up.&lt;br /&gt;&lt;br /&gt;Person 3 (pinging me on Facebook): Hey, you are in the US right now?&lt;br /&gt;&lt;br /&gt;Me: Yes. I am attending a conference here.&lt;br /&gt;&lt;br /&gt;Person 3: Cool!&lt;br /&gt;&lt;br /&gt;Me: Umm… yeah, it is.&lt;br /&gt;&lt;br /&gt;Person 3: emoticon of a Facebook 'like'. Have fun. Bye.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially I was irritated at the futility of these pings that are bewildering in their lack of content. I dismissed it as one of those things, but I realise that there is a pattern here. Our lives are so particularly open and documented, such minute details of what we do, where we are and who we are with, is now available for the rest of the world to consume, making most of the conversations seeking information, redundant. If you know me on my social media networks, you already know most of the basic things that you would want to know about me. And it goes without saying that no matter how close and connected we are, we are not necessarily in a state where we want to talk all the time. The more distributed our lives are, the more diminished is the need for personal communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the habit or the urge to ping, buzz, DM or chat has not caught up with this interaction deficit. So, we still seem to reach out, using a variety of platforms just to say hello, even when there is nothing to say. I call this the 'Always On' syndrome. We live in a world where being online all the time has become a ubiquitous reality. Even when we are asleep, or busy in a meeting, or just mentally disconnected from the online spaces, our avatars are still awake. They interact with others. And when they feel too lonely, they reach out and send that empty ping — just to confirm that they are not alone. That on the other side of the glowing screen is somebody else who is going to connect back, and to reassure you that we are all together in this state of being alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This empty ping has now become a signifier, loaded with meaning. The need for human connection has been distributed, but it does not compensate our need for one-on-one contact. In the early days of the cell phone, when incoming calls were still being charged, the missed call, without any content, was a code between friends and lovers. It had messages about where to meet, when to meet, or sometimes, just that you were missing somebody. The empty ping is the latest avatar of the missed call — in a world where we are always online but not always connected, when we are constantly together, but also spatially and emotionally alone, the ping remains that human touch in the digital space that reassures us that on the other side of that seductive interface and the buzzing gadget, is somebody we can say hello to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello'&gt;https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T08:36:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2013-bulletin">
    <title>November 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/november-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of November 2013 can be accessed below. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) welcomes you to the eleventh issue of its newsletter (November) for the year 2013:&lt;/p&gt;
&lt;h2&gt;Highlights&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS is pleased to announce the second "Institute on Internet and Society" to be held in Yashada, Pune from February 11 to 17, 2014. Any members from the civil society (students, research scholars, academicians, scientists, legal professionals, etc.) who engage in issues concerning Internet and Society are encouraged to apply.&lt;/li&gt;
&lt;li&gt;The National Resource Kit team is pleased to bring you its research for the states of Tripura, Nagaland and Chattisgarh.&lt;/li&gt;
&lt;li&gt;CIS-A2K team signed a memorandum of understanding (MoU) with Christ University in Bangalore to introduce Wikipedia in classrooms. &lt;/li&gt;
&lt;li&gt;The Access to Knowledge narrative report capturing the work done by CIS-A2K team in the first ten months of the grant along with its strategy for the next 1 year is published.&lt;/li&gt;
&lt;li&gt;Last month we organised the Seventh Privacy Round-table in collaboration with FICCI, DSCI, and Privacy International in Delhi. The developments are captured in a report by Elonnai Hickok.&lt;/li&gt;
&lt;li&gt;Along with Wikimedia India and Acharya Narendra Dev College, we organised the Relaunch of Creative Commons in India. Dr. Shashi Tharoor was the chief guest.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of our project (under a grant from the Hans Foundation) on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India, we bring you draft chapters for the states of Madhya Pradesh and Arunachal Pradesh, and the union territory of Daman and Diu. With this we have completed compilation of draft chapters for 27 states and 5 union territories. Feedback and comments are invited from readers for the following chapters:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► National Resource Kit Chapter&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Tripura Chapter (by CLPR, November 13, 2013): &lt;a href="http://bit.ly/1bCFPwq"&gt;http://bit.ly/1bCFPwq&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;The Nagaland Chapter (by CLPR, November 13, 2013): &lt;a href="http://bit.ly/1cmKzq0"&gt;http://bit.ly/1cmKzq0&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;The Chattisgarh Chapter (by Anandhi Viswanathan, November 30, 2013): &lt;a href="http://bit.ly/1cSczSt"&gt;http://bit.ly/1cSczSt&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;All of these are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Other Accessibility Update&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Events Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;E-Accessibility Workshop 2013 (organised by Directorate of Information Technology, Government of Maharashtra, Mahaonline Limited and National Internet Exchange of India, November 19-20, 2013): &lt;a href="http://bit.ly/1cQ0wd8"&gt;http://bit.ly/1cQ0wd8&lt;/a&gt;. CIS was one of the trainer organisations for the event.&lt;/li&gt;
&lt;li&gt;National Conference on Harnessing Technology for the Empowerment for Persons with Visual Impairments (organized by NAB Centre for Blind Women &amp;amp; Disability Studies, Indian Islamic Cultural Centre, New Delhi, November 19, 2013). Dr. Nirmita Narasimhan participated as a speaker: &lt;a href="http://bit.ly/IzLOty"&gt;http://bit.ly/IzLOty&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers and human rights, and critically examines Open Government Data, Open Access to Scholarly Literature, and Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following has been done under grant from the Wikimedia Foundation (&lt;a href="http://bit.ly/SPqFOl"&gt;http://bit.ly/SPqFOl&lt;/a&gt;). As part this project (&lt;a href="http://bit.ly/X80ELd"&gt;http://bit.ly/X80ELd&lt;/a&gt;), we held 8 workshops, signed a MoU with Christ University for teaching Wikipedia to students, published a detailed narrative report of activities done during the initial period of the Wikimedia grant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Articles&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;ಅಂತರ್ಜಾಲದಲ್ಲಿ ನೆಟ್ಟ ಸಸಿಗೆ ಈಗ ಹತ್ತು ವರ್ಷ (by Dr. U.B. Pavanaja, Kannada Prabha, November 1, 2013): &lt;a href="http://bit.ly/17LOw4O"&gt;http://bit.ly/17LOw4O&lt;/a&gt;. The article highlights 10 years of Kannada Wikipedia, the current status of the Kannada Wikipedia vis-a-vis number of articles, number of editors, active editors, and page views per month.&lt;/li&gt;
&lt;li&gt;Train The Trainer Programme for Wikipedians (by Subhashish Panigrahi, DNA, November 14, 2013): &lt;a href="http://bit.ly/1ehr8kz"&gt;http://bit.ly/1ehr8kz&lt;/a&gt;. The article was edited by Rohini Lakshane of DNA. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Announcement&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS Signs MoU with Christ University, Bangalore (November 20, 2013): The Access to Knowledge team signed a MoU as part of which CIS-A2K and Christ University will impart Wikipedia education in Indian classrooms: &lt;a href="http://bit.ly/1ehr8kz"&gt;http://bit.ly/1ehr8kz&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Report&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS-A2K Narrative Report (September 2012 – June 2013) (by T. Vishnu Vardhan, Nitika Tandon and Subhashish Panigrahi, November 29, 2013): &lt;a href="http://bit.ly/1dFyjpO"&gt;http://bit.ly/1dFyjpO&lt;/a&gt;. The report throws some light on the CIS-A2K program strategy in the next one year.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Note: A couple of the below blog entries were carried in the Access to Knowledge newsletter last month&lt;/i&gt;.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Konkani Vishwakosh Digitization Project (by Nitika Tandon, November 13, 2013): &lt;a href="http://bit.ly/1dodyuK"&gt;http://bit.ly/1dodyuK&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Konkani Vishwakosh Under CC-BY-SA (by Nitika Tandon, November 13, 2013): &lt;a href="http://bit.ly/1cm9wBH"&gt;http://bit.ly/1cm9wBH&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Train the Trainer Program (by Subhashish Panigrahi, November 18, 2013): &lt;a href="http://bit.ly/18hjw0n"&gt;http://bit.ly/18hjw0n&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Event Co-organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Relaunch of Creative Commons India (co-organised by Wikimedia India, Acharya Narendra Dev College and CIS, India Islamic Cultural Centre, November 12, 2013): &lt;a href="http://bit.ly/HPxrAO"&gt;http://bit.ly/HPxrAO&lt;/a&gt;. Dr. Shashi Tharoor, Minister of State for Human Resource Development was the chief guest at the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Wikipedia Orientation Programme for MA Students (Christ University, Bangalore, November 12, 2013): &lt;a href="http://bit.ly/ItxAtu"&gt;http://bit.ly/ItxAtu&lt;/a&gt;. Syed Muzammiluddin was the trainer. Twenty students participated. &lt;/li&gt;
&lt;li&gt;Wikipedia Orientation Programme for the Second Language Students (Christ University, Bangalore, November 12, 13, 16 and 19, 2013): &lt;a href="http://bit.ly/1bxsOYF"&gt;http://bit.ly/1bxsOYF&lt;/a&gt;. T. Vishnu Vardhan, Syed Muzammiluddin and Dr. U.B.Pavanaja were the trainers. About 1200 second language students participated in the programme. &lt;/li&gt;
&lt;li&gt;Documentation and Wikipedia Contribution — A One Day Workshop (Kalinga Institute of Social Studies, Bhubaneswar, November 14, 2013). The workshop was conducted by Subhashish Panigrahi: &lt;a href="http://bit.ly/1fSvl1v"&gt;http://bit.ly/1fSvl1v&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Documentation and Wikipedia Workshop (Kalinga School of Management, Bhubaneswar, November 16, 2013): &lt;a href="http://bit.ly/Imf0DV"&gt;http://bit.ly/Imf0DV&lt;/a&gt;. Subhashish Panigrahi conducted the workshop. &lt;/li&gt;
&lt;li&gt;Konknni Wikipedia Workshop (organised by Dalgado Konknni Akademi and CIS-A2K, Goa Central State Library, November 16 and 17, 2013): &lt;a href="http://bit.ly/1fSwiH5"&gt;http://bit.ly/1fSwiH5&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Tenth Anniversary of Wikipedia (H N Multimedia Hall, National College, Basavanagudi, Bangalore, November 17, 2013): &lt;a href="http://bit.ly/1eJ6da9"&gt;http://bit.ly/1eJ6da9&lt;/a&gt;. Dr. U R Ananthamurthy, Prof. G. Venkatasubbiah and Ravi Hegde were the guests of honour. Dr. U.B. Pavanaja conducted the workshop.&lt;/li&gt;
&lt;li&gt;First Phase of Odia Wikipedia Workshop (Indian Institute of Mass Communication, Bhubaneswar, November 18, 2013): &lt;a href="http://bit.ly/18doDer"&gt;http://bit.ly/18doDer&lt;/a&gt;. Subhashish Panigrahi conducted the workshop.&lt;/li&gt;
&lt;li&gt;Konkani Wikipedia Workshop (Nirmala Institute of Education, Goa, November 19, 2013): &lt;a href="http://bit.ly/1fSAUwT"&gt;http://bit.ly/1fSAUwT&lt;/a&gt;. Nitika Tandon conducted the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Event Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Wikimedia Diversity Conference (organized by German Wikipedia Community, GLS Campus, Berlin): &lt;a href="http://bit.ly/Ixr9W8"&gt;http://bit.ly/Ixr9W8&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Media Coverage&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs for the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Kannada Wikipedia and its Tenth Anniversary (RadioCity, November 2, 2013): &lt;a href="http://bit.ly/1dHEwBI"&gt;http://bit.ly/1dHEwBI&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;10th anniversary of Kannada wikipedia (The Times of India, November 15, 2013): &lt;a href="http://bit.ly/IxqDr7"&gt;http://bit.ly/IxqDr7&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Tenth Anniversary of Kannada Wikipedia (Udayavani, November 15, 2013): &lt;a href="http://bit.ly/1aFwqF1"&gt;http://bit.ly/1aFwqF1&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;ಕನ್ನಡ ವಿಕಿಪೀಡಿಯಕ್ಕೆ ಈಗ ದಶಮಾನೋತ್ಸವ. ಅದರ ಪ್ರಯುಕ್ತ ಒಂದು ಆಚರಣೆ (Avadhi Website, November 16, 2013): &lt;a href="http://bit.ly/ImiBSy"&gt;http://bit.ly/ImiBSy&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;ಕನ್ನಡ ವಿಕಿಪೀಡಿಯಗೆ 10, ಬೆಳವಣಿಗೆ ಸಾಲದು : ಪ್ರೊ .ಜಿವಿ (OneindiaKannada, November 17, 2013): &lt;a href="http://bit.ly/1fSAUwT"&gt;http://bit.ly/1fSAUwT&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Tenth Anniversary of Kannada Wikipedia (Vijayavani, November 17, 2013): &lt;a href="http://bit.ly/1b7exSa"&gt;http://bit.ly/1b7exSa&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;ಕನ್ನಡ ವಿಕಿಪೀಡಿಯಕ್ಕೆ ದಶಮಾನೋತ್ಸವ ಸಂಭ್ರಮ (Prajavani, November 18, 2013): &lt;a href="http://bit.ly/1hWtt9v"&gt;http://bit.ly/1hWtt9v&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;ಕನ್ನಡದ ಆನ್‌ಲೈನ್ ವಿಶ್ವಕೋಶ ದುರ್ಬಲ (Vijaya Karnataka, November 19, 2013): &lt;a href="http://bit.ly/1hWtsCy"&gt;http://bit.ly/1hWtsCy&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Panaji: DKA organizes two day Konkani Wikipedia workshop (Daijiworld, November 18, 2013): &lt;a href="http://bit.ly/1inoi03"&gt;http://bit.ly/1inoi03&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Note: The following are not a part of the Wikimedia Grant:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;History of Creative Commons in India (by Priyank Dwivedi, November 13, 2013): &lt;a href="http://bit.ly/17txcH7"&gt;http://bit.ly/17txcH7&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;How Can We Make Open Education Truly Open? (by Dr. Nishant Shah, DML Central, November 22, 2013): &lt;a href="http://bit.ly/1ezsAyj"&gt;http://bit.ly/1ezsAyj&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Conference on e-Governance for India: Opportunities, Challenges and Policy Alternatives (organised by OECD Korea Policy Centre in partnership with the Centre for Good Governance, Hyderabad, November 6-7, 2013): &lt;a href="http://bit.ly/1cGP13c"&gt;http://bit.ly/1cGP13c&lt;/a&gt;. Sunil Abraham was a panelist in the session on OECD Principles on eGovernment and their applicability to the developing world and India. &lt;/li&gt;
&lt;li&gt;Indo-European Conference on the Role of the Patent System in Fostering Innovation and Technology Transfer (organized by European Patent Office, FICCI and European Business &amp;amp; Technology Centre, November 29, 2013, New Delhi). Nehaa Chaudhari participated in this conference.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a project (under a grant from Privacy International and International Development Research Centre (IDRC)) on conducting research on surveillance and freedom of expression (SAFEGUARDS). So far we have organised seven privacy round-tables and drafted the Privacy (Protection) Bill. This month we bring you a report from the seventh privacy round-table held in Delhi, and an analysis on why Facebook is more dangerous than government spying. As part of its project (funded by Citizen Lab, Munk School of Global Affairs, University of Toronto and support from the IDRC) on mapping cyber security actors in South Asia and South East Asia we did an interview with Namita A Malhotra, a researcher and lawyer from Alternative Law Forum. With this we have completed a total of 12 video interviews:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Event Report&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Seventh Privacy Round-table (organised by FICCI, DSCI, Privacy International and CIS, October 19, 2013): &lt;a href="http://bit.ly/187pFOO"&gt;http://bit.ly/187pFOO&lt;/a&gt;. The report was published in the month of November. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Newspaper Columns&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Open Secrets (by Nishant Shah, Indian Express, October 27, 2013): &lt;a href="http://bit.ly/1b5uvK0"&gt;http://bit.ly/1b5uvK0&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;I Just Pinged to Say Hello (by Nishant Shah, Indian Express, November 24, 2013): &lt;a href="http://bit.ly/183H34t"&gt;http://bit.ly/183H34t&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;An Interview with Caspar Bowden (by Maria Xynou, November 6, 2013): &lt;a href="http://bit.ly/17LQqFX"&gt;http://bit.ly/17LQqFX&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;India's Response to WGEC Questionnaire (by Snehashish Ghosh, November 13, 2013): &lt;a href="http://bit.ly/HX0r96"&gt;http://bit.ly/HX0r96&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Why 'Facebook' is More Dangerous than the Government Spying on You (by Maria Xynou, November 19, 2013): &lt;a href="http://bit.ly/HWLFzi"&gt;http://bit.ly/HWLFzi&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;CIS Supports the UN Resolution on “The Right to Privacy in the Digital age” (by Elonnai Hickok, November 30, 2013): &lt;a href="http://bit.ly/1c2A89q"&gt;http://bit.ly/1c2A89q&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;IDEX Impact Assessment Workshop (organised by IDEX, CIS, Bangalore, November 16, 2013): &lt;a href="http://bit.ly/1bxRfFm"&gt;http://bit.ly/1bxRfFm&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;The Evolving Cyber Threat and How to Address It (CIS, Bangalore, November 22, 2013): &lt;a href="http://bit.ly/1cEkUZY"&gt;http://bit.ly/1cEkUZY&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Panel on Privacy, Surveillance &amp;amp; the UID in the post-Snowden era (Institution of Agricultural Technologists, Bangalore, November 30, 2013): &lt;a href="http://bit.ly/1ctSHW3"&gt;http://bit.ly/1ctSHW3&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Chances and Risks of Social Participation (organised by Alexander von Humboldt Institute for Internet and Society and Friedrich Ebert Foundation, Berlin, November 22, 2013). Dr. Nishant Shah gave the keynote: &lt;a href="http://bit.ly/18PcMXN"&gt;http://bit.ly/18PcMXN&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Expert Committee Meeting on Human DNA Profiling Bill (organised by the Ministry of Science &amp;amp; Technology, Government of India, New Delhi). Sunil Abraham participated in the meeting: &lt;a href="http://bit.ly/19CpDbD"&gt;http://bit.ly/19CpDbD&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Upcoming Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Democracy: Big Surveillance - A Talk by Maria Xynou (CIS, Bangalore, December 3, 2013): &lt;a href="http://bit.ly/1j4mzgu"&gt;http://bit.ly/1j4mzgu&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Cyber Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Laird Brown, a strategic planner and writer with core competencies on brand analysis, public relations and resource management and Purba Sarkar who in the past worked as a strategic advisor in the field of SAP Retail are working in this project:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Video Interview&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Part 12: An Interview with Namita A. Malhotra (November 15, 2013): &lt;a href="http://bit.ly/1j8MCjN"&gt;http://bit.ly/1j8MCjN&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Documentary Film&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;First Look: Cyber Security Film (by Purba Sarkar, November 18, 2013): &lt;a href="http://bit.ly/1alHhVu"&gt;http://bit.ly/1alHhVu&lt;/a&gt;. The trailer was presented by Laird Brown recently at the IGF.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Upcoming Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;DesiSec: Episode 1 - Film Release and Screening (December 11, 2013): Screening of the first documentary film on cyber security in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;EC guidelines on social media: Welcome move, but not enough (by Shruti Dhapola, FirstPost, November 1, 2013): &lt;a href="http://bit.ly/1c3fNkt"&gt;http://bit.ly/1c3fNkt&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;NSA leaks helping India become 'Big Brother' state? (British Broadcasting Corporation, November 1, 2013): &lt;a href="http://bit.ly/1b7ftDG"&gt;http://bit.ly/1b7ftDG&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Spy agencies, IB and RAW, put spanner in proposed privacy law (by Nagender Sharma and Aloke Tikku, Hindustan Times, November 2, 2013): &lt;a href="http://bit.ly/1aox4HP"&gt;http://bit.ly/1aox4HP&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;India must support UN's e-snooping move: Human rights activists (by Indu Nandakumar, Economic Times, November 11, 2013): &lt;a href="http://bit.ly/18LrI5s"&gt;http://bit.ly/18LrI5s&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Social media promotions can backfire, too (by Ratna Bhushan and Varuni Khosla, The Times of India, November 11, 2013): &lt;a href="http://bit.ly/1gMj7rg"&gt;http://bit.ly/1gMj7rg&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;YouTube is the answer to what has changed in India (by Moulishree Srivastava, Livemint, November 20, 2013): &lt;a href="http://bit.ly/1fg214A"&gt;http://bit.ly/1fg214A&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;When the virtual world wakes up the real one (by Malini Nair, November 24, 2013): &lt;a href="http://bit.ly/1hovyd3"&gt;http://bit.ly/1hovyd3&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a research project titled “Making Change”. The project will explore new ways of defining, locating, and understanding change in network societies. Having the thought piece 'Whose Change is it Anyway' as an entry point for discussion and reflection, the project will feature profiles, interviews and responses of change-makers to questions around current mechanisms and practices of change in South Asia and South East Asia.:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Making Change&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Methods to Conceive and Condense Social Change (by Denisse Albornoz, November 30, 2013): &lt;a href="http://bit.ly/1ezrBhw"&gt;http://bit.ly/1ezrBhw&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Blank Noise and the Active Citizen Dissonance (by Denisse Albornoz, November 30, 2013): &lt;a href="http://bit.ly/IwOHu9"&gt;http://bit.ly/IwOHu9&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Digitally Enhanced Civil Resistance (by Denisse Albornoz, November 20, 2013): &lt;a href="http://bit.ly/18ndc7p"&gt;http://bit.ly/18ndc7p&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa, a Distinguished Fellow at CIS is a regular columnist with the Business Standard. The articles published on his blog Organizing India Blogspot is mirrored on our website:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Newspaper Column&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Predictability in Infrastructure (by Shyam Ponappa, Business Standard, November 6, 2013 and Observer India Blogspot, November 10, 2013): &lt;a href="http://bit.ly/1dLZ0Fp"&gt;http://bit.ly/1dLZ0Fp&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS in partnership with the Ford Foundation is executing a project to create a knowledge repository on Internet and society. This repository will comprise content targeted primarily at civil society with a view to enabling their informed participation in the Indian Internet and ICT policy space. The repository is available at the Internet Institute website: &lt;a href="http://bit.ly/1iQT2UB"&gt;http://bit.ly/1iQT2UB&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Upcoming Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Institute on Internet and Society (organised by Ford Foundation and CIS, Yashada, Pune, February 11-17, 2014): &lt;a href="http://bit.ly/180mQi9"&gt;http://bit.ly/180mQi9&lt;/a&gt;. The application form is available at &lt;a href="http://internet-institute.in/form"&gt;http://internet-institute.in/form&lt;/a&gt;. Registrations close on December 15, 2013. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Modules&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Internet Engineering Task Force (by Anirudh Sridhar, November 30, 2013). The Internet Engineering Task Force (IETF) is an open standards body with no requirements for membership and does not have a formal membership process either: &lt;a href="http://bit.ly/1c4aOQr"&gt;http://bit.ly/1c4aOQr&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;World Summit on Information Society (WSIS) (by Anirudh Sridhar, November 30, 2013). The World Summit on Information Society was first proposed by the International Telecommunication Union in 1998. The main focus of the WSIS was to address issues related to the global digital divide. However, the scope of the WSIS was broadened later to include internet related public policy issues: &lt;a href="http://bit.ly/186dbnV"&gt;http://bit.ly/186dbnV&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Event Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;From Seemingly Transparent to Definitely Opaque (organised by University of St. Gallen, Switzerland, November 4-7, 2013): &lt;a href="http://bit.ly/19b6IW1"&gt;http://bit.ly/19b6IW1&lt;/a&gt;. Nishant Shah taught this course and also presented on a panel on 'Secrets of Digital Culture'.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/li&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2013-bulletin'&gt;https://cis-india.org/about/newsletters/november-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-01-04T04:38:08Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d">
    <title>CIS Supports the UN Resolution on “The Right to Privacy in the Digital age”.</title>
    <link>https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d</link>
    <description>
        &lt;b&gt;The United Nations adopted the resolution on the right to privacy recently. It recognised privacy as a human right, integral to the right to free expression, and also declared that mass surveillance could have negative impacts on human rights. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On &lt;a class="external-link" href="https://www.un.org/News/Press/docs/2013/gashc4094.doc.htm"&gt;November 26, 2013&lt;/a&gt;, the United Nations adopted a non-binding resolution on &lt;a href="http://www.un.org/ga/search/view_doc.asp?symbol=A/C.3/68/L.45/Rev.1"&gt;The Right to Privacy in the Digital Age&lt;/a&gt;. The resolution was drafted &lt;a href="http://news.idg.no/cw/art.cfm?id=F0537DC8-A06C-E9D5-2EBACEA94829DAC1"&gt;by Brazil and Germany&lt;/a&gt; and expressed concern over the negative impact of surveillance and interception on the exercise of human rights. The resolution was controversial as countries such as the US, the UK, and Canada opposed language that spoke to the right to &lt;a href="http://www.theguardian.com/world/2013/nov/26/un-surveillance-resolution-human-right-privacy"&gt;privacy extending equally to citizens and non-citizens of a country. &lt;/a&gt; The resolution welcomed the report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression that examined the implications of surveillance of communications on the human rights of privacy and freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution made a number of important statements that India, as a member of the United Nations, and as a country in the process of implementing a number of surveillance projects, like the &lt;a href="http://www.indexoncensorship.org/2013/11/india-online-report-freedom-expression-digital-freedom-3/"&gt;Central Monitoring System&lt;/a&gt;, should take cognizance of, including in short:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy is a human right&lt;/b&gt;: Privacy is a human right according to which no one should be subjected to arbitrary or unlawful interference with his or her privacy, family, home, or correspondence. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy is integral to the right to free expression&lt;/b&gt;: an integral component in recognizing the right to freedom of expression. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Unlawful and arbitrary surveillance violates the right to privacy and freedom of expression&lt;/b&gt;: Unlawful and/or arbitrary surveillance, interception, and collection of personal data are intrusive acts that violate the right to privacy and freedom of expression. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Exceptions to privacy and freedom of expression should be in compliance with human rights law:&lt;/b&gt; Public security is a potential exception justifying collection and protection of information, but States must ensure that this is done fully in compliance with international human rights law. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Mass surveillance may have negative implications for human rights: &lt;/b&gt;Domestic and extraterritorial surveillance, interception, and the collection of personal data on a mass scale may have a negative impact on individual human rights. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Equal protection for online and offline privacy:&lt;/b&gt; The right to privacy must be equally protected online and offline.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The resolution further called upon states to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Respect and protect the right to privacy, particularly in the context of digital communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To ensure that relevant legislation is in compliance with international human rights law&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To review national procedures and practices around surveillance to ensure full and effective implementation of obligations under international human rights law.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To establish and maintain effective domestic oversight mechanisms around domestic surveillance capable of ensuring transparency and accountability.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The resolution finally calls upon the UN High Commissioner for Human Rights to present a report with views and recommendations on the protection and promotion of the right to privacy in the context of surveillance to the Human Rights Council at its twenty-seventh session and to the General Assembly at its sixty-ninth session and decides to examine “Human rights questions, including alternative approaches for improving the effective enjoyment of human rights and fundamental freedoms”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UN Resolution on the Right to Privacy in the Digital Age is a welcome step towards an international recognition of privacy as a human right in the context of communications and extra territorial surveillance. The Centre for Internet and Society encourages the Government of India to, as called upon in the Resolution, to review national procedures and practices around surveillance to ensure full and effective implementation of obligations under international human rights law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the UN Resolution on “The Right to Privacy in the Digital Age”, a group of international NGO’s developed the &lt;a href="https://en.necessaryandproportionate.org/TEXT"&gt;Necessary and Proportionate principles&lt;/a&gt; that seek to form a backbone for a response to mass surveillance and provide a framework for governments to assess if domestic surveillance regimes are in compliance with international Human Rights Law. CIS has contributed to the process of developing these principles.  The principles include legality, legitimate aim, necessity, adequacy, proportionality, competent judicial authority, due process, user notification, transparency, public oversight, integrity of communications and systems, safeguards for international cooperation, and safeguards against illegitimate access.  A&lt;a href="https://en.necessaryandproportionate.org/take-action/digiges"&gt; petition&lt;/a&gt; to sign onto the principles and demand an end to mass surveillance is currently underway.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both the Government of India and public of India should take into consideration the UN Resolution and the necessary and proportionate principles to reflect on how India’s surveillance regime and practices can be brought in line with international human rights law and understand where the balance is drawn for necessary and proportionate surveillance, specific to the Indian context.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d'&gt;https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T07:25:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening">
    <title>DesiSec: Episode 1 - Film Release and Screening</title>
    <link>https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec. 
We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!&lt;/b&gt;
        
&lt;div&gt;Early 2013, the Centre for Internet and Society began shooting its first documentary film project.&amp;nbsp;After months of researching and interviewing activists and experts, CIS is thrilled to announce the release of the first documentary film on cybersecurity in India - &lt;strong&gt;DesiSec: Cybersecurity and Civi Society in India&lt;/strong&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Trailer link:&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer"&gt;http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;CIS is hosting a special screening of &lt;strong&gt;DesiSec: Episode 1&lt;/strong&gt; on &lt;strong&gt;11th December, 2013, 6 pm&lt;/strong&gt; and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;We look forward to seeing you there!&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;RSVP:&amp;nbsp;&lt;a href="mailto:purba@cis-india.org" target="_blank"&gt;purba@cis-india.org&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;Venue:&amp;nbsp;http://osm.org/go/yy4fIjrQL?m=&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening'&gt;https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-12-17T08:13:32Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
