<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2121 to 2135.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/businesswire-may-30-2013-inet-bangkok-to-explore-internet-impact-on-thailand-economy-and-society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-local-may-30-2013-sweden-must-raise-its-net-freedom-profile"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/towards-a-global-network-of-internet-and-society-cultures"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/asian-correspondent-chan-myae-khine-may-22-2013-burma-to-host-internet-freedom-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/businesswire-may-30-2013-inet-bangkok-to-explore-internet-impact-on-thailand-economy-and-society">
    <title>INET Bangkok to Explore Internet’s Impact on Thailand’s Economy and Society</title>
    <link>https://cis-india.org/news/businesswire-may-30-2013-inet-bangkok-to-explore-internet-impact-on-thailand-economy-and-society</link>
    <description>
        &lt;b&gt;The Internet Society, in collaboration with the Thailand Internet community, the National Science &amp; Technology Development Agency (NSTDA), and the Ministry of Information &amp; Communication Technology (MICT), will host the INET Bangkok, 7-8 June 2013. The conference will be held at the Queen Sirikit National Convention Center, and will focus on the power of the Internet as a force for economic and social progress. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This post was &lt;a class="external-link" href="http://www.businesswire.com/news/home/20130530006680/en/INET-Bangkok-Explore-Internet%E2%80%99s-Impact-Thailand%E2%80%99s-Economy"&gt;published in BusinessWire&lt;/a&gt; on May 30, 2013. Sunil Abraham is participating in this conference.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;INET Bangkok will bring together Thai Internet stakeholders to engage in        an open discussion on the Internet agenda. This event will specifically        showcase the creative power of the Internet, promote the importance of        participating in the Internet governance process, and share capacity        building efforts to expand Internet access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The INET Bangkok agenda will feature four tracks covering key drivers of        the Internet in Thailand: Technology, Innovation, Society, and the        Future. Noted speakers at the event include H.E. Anudith Nakornthap,        Minister of Information &amp;amp; Communication Technology (MICT); Dr. Thaweesak        “Hugh” Koanantakool, President, National Science and Technology        Development Agency (NSTDA); Paul Wilson, Director General of Asia        Pacific Network Information Centre (APNIC); Dr. Rohan Samarajiva,        Founder of LIRNEasia; Sunil Abraham, Executive Director, The Centre for        Internet and Society; and Dr. Sak Segkhoonthod, President &amp;amp; CEO,        Electronic Government Agency (EGA).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Internet has become a remarkable engine for social development and        economic growth,” said Rajnesh Singh, Internet Society Regional Bureau        Director for Asia-Pacific. “The Internet Society works closely with our        Chapters, members, and regional community organizations to ensure the        Internet continues to evolve as a platform for innovation,        collaboration, creativity, and economic and social development. INET        Bangkok will bring together leading Internet experts to discuss critical        Internet issues for Thailand and across the region.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A highlight of the event will be VIP Gala Dinner on 6 June 2013,        celebrating the 25&lt;sup&gt;th&lt;/sup&gt; anniversary of the .TH group, Thailand’s        ccTLD. For more details and to register, visit &lt;a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;amp;url=http%3A%2F%2Fwww.internetsociety.org%2Finet-bangkok&amp;amp;esheet=50643564&amp;amp;lan=en-US&amp;amp;anchor=http%3A%2F%2Fwww.internetsociety.org%2Finet-bangkok&amp;amp;index=4&amp;amp;md5=c0db83511e81ac360dea6f1b6f400cf3" target="_blank"&gt;http://www.internetsociety.org/inet-bangkok&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;About the Internet Society&lt;/b&gt;&lt;br /&gt;The Internet Society is the trusted independent source for Internet        information and thought leadership from around the world. With its        principled vision and substantial technological foundation, the Internet        Society promotes open dialogue on Internet policy, technology, and        future development among users, companies, governments, and other        organizations. Working with its members and Chapters around the world,        the Internet Society enables the continued evolution and growth of the        Internet for everyone. For more information, visit &lt;a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;amp;url=http%3A%2F%2Fwww.internetsociety.org&amp;amp;esheet=50643564&amp;amp;lan=en-US&amp;amp;anchor=www.internetsociety.org&amp;amp;index=5&amp;amp;md5=cbf5abda7e744dfa5a87b58097572fa8" target="_blank"&gt;www.internetsociety.org&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/businesswire-may-30-2013-inet-bangkok-to-explore-internet-impact-on-thailand-economy-and-society'&gt;https://cis-india.org/news/businesswire-may-30-2013-inet-bangkok-to-explore-internet-impact-on-thailand-economy-and-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-06T06:18:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-local-may-30-2013-sweden-must-raise-its-net-freedom-profile">
    <title>Sweden 'must raise its net freedom profile' </title>
    <link>https://cis-india.org/news/the-local-may-30-2013-sweden-must-raise-its-net-freedom-profile</link>
    <description>
        &lt;b&gt;While promoting internet freedom is a policy priority for Swedish Foreign Minister Carl Bildt, Sweden's efforts remain largely unknown, according a new report that concludes Sweden needs to do more to raise its global profile as a leader on the issue.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by David Landes was &lt;a class="external-link" href="http://www.thelocal.se/48220/20130530/"&gt;published in "The Local"&lt;/a&gt; on May 30, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Last week, Bildt and his colleagues at Sweden's Ministry of Foreign Affairs welcomed hundreds of delegates to the &lt;a href="http://www.thelocal.se/tag/stockholm"&gt;Stockholm&lt;/a&gt; Internet Forum to discuss what Sweden considers one of the "great global issues of the future".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Our aim is clear: to create an international, inclusive platform for constructive discussions on the importance of internet freedom for development," Bildt told conference attendees in Stockholm last week.&lt;br /&gt;&lt;br /&gt;"We will work to connect the unconnected to an open, secure internet that drives innovation and growth, and that contributes to better democracy and the enjoyment of free speech."&lt;br /&gt;&lt;br /&gt;But while Bildt's message was clear to everyone in the audience in Stockholm, a report released on Wednesday suggested that Sweden has so far failed to adequately explain its commitment to internet freedom to a wider audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Sweden does a lot right already, but we are too unknown. We're a small  player. So we need to work with others to raise our profile," &lt;a class="nodec" href="http://www.thelocal.se/tag/united_minds"&gt;United Minds&lt;/a&gt; analyst Paul Alacron, one of the authors of the report, told The Local.&lt;br /&gt; &lt;br /&gt; The report, Freedom and Development on the Internet, was published by  the Swedish Institute, together with the United Minds opinion research  firm, and is designed to give a qualitative view of internet freedom in  six countries, as well as insights into Sweden's perceived importance  for the issue.&lt;br /&gt; &lt;br /&gt; In-depth interviews with 18 internet experts and activists in Russia,  Pakistan, India, China, the United States, and Egypt revealed that there  is a demand for Sweden's expertise on internet freedom, but that  awareness of what Sweden has to offer is limited.&lt;br /&gt; &lt;br /&gt; "If you ask a regular Chinese, most would probably think that the United  States is the best role model [for internet freedom]. Most Chinese  don't know anything about Sweden," one Chinese blogger is quoted as  saying in the report.&lt;br /&gt; &lt;br /&gt; Meanwhile, Pranesh Prakash from the Centre for Internet and Society in  India, said Sweden could better leverage its strong reputation to help  promote internet freedom.&lt;br /&gt; &lt;br /&gt; "If the Americans push an issue, many go against it simply because  they're behind it. If Sweden takes up the same proposal, the chances are  greater that the debate will be about the proposal itself," he said in  the report.&lt;br /&gt; &lt;br /&gt; According to report co-author Javeria Rizvi Kabani of the Swedish  Institute, Sweden has kept a low profile in part due to safety  considerations for activists who have participated in exchange  programmes organized by the Swedish Institute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The safety of those in the of human rights defenders and net activist  networks we've created over the last few years and who have visited  Sweden always comes first. So we've focused on that rather than Sweden's  profile on these issues," she told The Local.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The low-profile approach is nothing new for Sweden, she added.&lt;br /&gt; &lt;br /&gt; "We have been very strong in recent years in foreign aid and supporting  the process of democratization around the world, but unlike other  countries, we haven't put 'brand Sweden' next to that work," Rizvi  Kabani explained.&lt;br /&gt; &lt;br /&gt; While Sweden is generally recognized as a country that promotes  transparency and the freedom of information, the report revealed that  the ongoing case involving Sweden's attempts to extradite WikiLeaks  founder Julian &lt;a class="nodec" href="http://www.thelocal.se/tag/assange"&gt;Assange&lt;/a&gt; has dented some people's belief that Sweden is committed to internet freedom.&lt;br /&gt; &lt;br /&gt; "The trial of Julian Assange makes Sweden's relationship with the issue  of internet freedom complicated," Egyptian journalist Nasry Esmat said  in the report.&lt;br /&gt; &lt;br /&gt; "I'm aware that the accusations against Assange pertain to something  completely different, but that makes Sweden appear like a country that  doesn't support WikiLeaks."&lt;br /&gt; &lt;br /&gt; The report also pointed to a "troublesome development" in some countries  whereby regimes are trying to exert more control over the internet and  the spread of information.&lt;br /&gt; &lt;br /&gt; According to Alacron, such developments, while concerning, are simply  one more argument for why Sweden needs to raise its profile as a staunch  supporter of internet freedom.&lt;br /&gt; &lt;br /&gt; "Sweden has an important role to play. That's very clear," he said.&lt;br /&gt; &lt;br /&gt; "Knowledge and understanding about Sweden may be rather low, but at the  same time there are high expectations for what Sweden can do. The  conditions are ripe, therefore, for Sweden to play an even more  important role in these issues."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-local-may-30-2013-sweden-must-raise-its-net-freedom-profile'&gt;https://cis-india.org/news/the-local-may-30-2013-sweden-must-raise-its-net-freedom-profile&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T09:57:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/towards-a-global-network-of-internet-and-society-cultures">
    <title>Towards a Global Network of Internet and Society Centres</title>
    <link>https://cis-india.org/news/towards-a-global-network-of-internet-and-society-cultures</link>
    <description>
        &lt;b&gt;This event was held in Istanbul by Bilgi University as part of the collaboration on Global Network of Interdisciplinary Internet and Society Research Centres. &lt;/b&gt;
        &lt;p&gt;Chinmayi Arun spoke on the Internet Governance panel at the conference on 'ICT, Law and Innovation: Recent Developments, Challenges, and Lessons Learned'.&lt;/p&gt;
&lt;p&gt;More on the conference &lt;a class="external-link" href="http://www.paylas.com/noc-istanbul-2013-307.htm"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/towards-a-global-network-of-internet-and-society-cultures'&gt;https://cis-india.org/news/towards-a-global-network-of-internet-and-society-cultures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2013-06-05T07:29:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation">
    <title>A Technological Solution to the Challenges of Online Defamation </title>
    <link>https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation</link>
    <description>
        &lt;b&gt;When people are insulted or humiliated on the Internet and decide to take legal action, their cases often follow a similar trajectory.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This blog post written by Eduardo Bertoni was &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2013/05/28/a-technological-solution-to-the-challenges-of-online-defamation/"&gt;published in GlobalVoices&lt;/a&gt; on May 28, 2013. CIS has cross-posted this under the Creative Commons Licence.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Consider this scenario:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A public figure, let’s call her Senator X, enters her name into a search  engine. The results surprise her — some of them make her angry because  they come from Internet sites that she finds offensive. She believes  that her reputation has been damaged by certain content within the  search results and, consequently, that someone should pay for the  personal damages inflicted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Her lawyer recommends appealing to the search engine – the lawyer  believes that the search engine should be held liable for the personal  injury caused by the offensive content, even though the search engine  did not create the content. The Senator is somewhat doubtful about this  approach, as the search engine will also likely serve as a useful tool  for her own self-promotion. After all, not all sites that appear in the  search results are bothersome or offensive. Her lawyer explains that  while results including her name will likely be difficult to find, the  author of the offensive content should also be held liable. At that  point, one option is to request that the search engine block any  offensive sites related to the individual’s name from its searches. Yet  the lawyer knows that this cannot be done without an official petition,  which will require a judge’s intervention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We must go against everyone – authors, search engines – everyone!” the  Senator will likely say. “Come on!” says the lawyer, “let's move  forward.” However, it does not occur to either the Senator or the lawyer  that there may be an alternative approach to that of classic courtroom  litigation. The proposal I make here suggests a change to the standard  approach – a change that requires technology to play an active role in  the solution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who is liable?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The “going against everyone” approach poses a critical question: Who  is legally liable for content that is available online? Authors of  offensive content are typically seen as primarily liable. But should  intermediaries such as search engines also be held liable for content  created by others?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This last question raises a very specific, procedural question: Which  intermediaries will be the subjects of scrutiny and viewed as liable in  these types of situations? To answer this question, we must distinguish  between intermediaries that provide Internet access (e.g. Internet  service providers) and intermediaries that host content or offer content  search functions. But what exactly is an ‘intermediary’? And how do we  evaluate where an intermediary’s responsibility lies? It is also  important to distinguish those intermediaries which simply connect  individuals to the Internet from those that offer different services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What kind of liability might an intermediary carry?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;This brings us to the second step in the legal analysis of these  situations: How do we determine which model we use in defining the  responsibility of an intermediary? Various models have been debated in  the past. Leading concepts include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;strict liability&lt;/i&gt;, under which the intermediary must legally respond to all offensive content&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;subjective liability&lt;/i&gt;, under which the intermediary’s response depends on what it has done and what it was or is aware of&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;conditional liability&lt;/i&gt; – a variation on subjective liability –  under which, if an intermediary was notified or advised that it was  promoting or directing users to illegal content and did nothing in  response, it is legally required to respond to the offensive content.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These three options for determining liability and responses to offensive  online content have been included in certain legislation and have been  used in judicial decisions by judges around the world. But not one of  these three alternatives provides a perfect standard. As a result,  experts continue to search for a definition of liability that will  satisfy those who have a legitimate interest in preventing damages that  result from offensive content online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How are victims compensated?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now let’s return to the example presented earlier. Consider the concept  of Senator X’s “satisfaction.” In these types of situations,  “satisfaction” is typically economic — the victim will sue for a certain  amount of money in “damages”, and she can target anyone involved,  including the intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, in the offline world, alternatives have been found for  victims of defamation: For example, the “right to reply” aims to aid  anyone who feels that his or her reputation or honor has been damaged  and allows individuals to explain their point of view.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We must also ask if the right to reply is or is not contradictory to  freedom of expression. It is critical to recognize that freedom of  expression is a human right recognized by international treaties;  technology should be able to achieve a similar solution to issues of  online defamation without putting freedom of expression at risk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Solving the problem with technology&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an increasingly online world, we have unsuccessfully attempted to  apply traditional judicial solutions to the problems faced by victims  like Senator X. There have been many attempts to apply traditional  standards because lawyers are accustomed to using in them in other  situations. But why not change the approach and use technology to help  “satisfy” the problem?&lt;/p&gt;
&lt;p&gt;The idea of including technology as part of the solution, when it is  also part of the problem, is not new. If we combine the possibilities  that technology offers us today with the older idea of the right to  reply, we could change the broader focus of the discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;My proposal is simple: some intermediaries (like search engines)  should create a tool that allows anyone who feels that he or she is the  victim of defamation and offensive online content to denounce and  criticize the material on the sites where it appears. I believe that for  victims, the ability to say something and to have their voices heard on  the sites where others will come across the information in question  will be much more satisfactory than a trial against the intermediaries,  where the outcome is unknown.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This proposal would also help to limit regulations that impose  liability on intermediaries such as search engines. This is important  because many of the regulations that have been proposed are  technologically impractical. Even when they can be implemented, they  often result in censorship; requirements that force intermediaries to  filter content regularly infringe on rights such as freedom of  expression or access to information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This proposal may not be easy to implement from a technical  standpoint. But I hope it will encourage discussion about the issue,  given that a tool like the one I have proposed, although with different  characteristics, was once part of Google’s search engine (the tool,  “Google Sidewiki” is now discontinued). It should be possible  improve  upon this tool, adapt it, or do something completely new with the  technology it was based on in order to help victims of defamation  clarify their opinions and speak their minds about these issues, instead  of relying on courts to impose censorship requirements on search  engines. This tool could provide much greater satisfaction for victims  and could help prevent the violation of the rights of others online as  well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics may argue that people will not read the disclaimers or  statements written by “defamed” individuals and that the impact and  spread of the offensive content will continue unfettered. But this is a  cultural problem that will not be fixed by placing liability on  intermediaries. As I explained before, the consequences of doing so can  be unpredictable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we continue to rely on traditional regulatory means to solve these  problems, we’ll continue to struggle with the undesirable results they  can produce, chiefly increased controls on information and expression  online. We should instead look to a technological solution as a viable  alternative that cannot and should not be ignored.&lt;i&gt;&lt;br /&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Eduardo Bertoni is the Director of the Center for Studies on Freedom of Expression and Access to Information at Palermo University School of Law in Buenos Aires. He served as the Special Rapporteur for Freedom of Expression to the Organization of American States from 2002-2005.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation'&gt;https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Eduardo Bertoni</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T14:47:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/asian-correspondent-chan-myae-khine-may-22-2013-burma-to-host-internet-freedom-forum">
    <title>Burma to host first Internet freedom forum</title>
    <link>https://cis-india.org/news/asian-correspondent-chan-myae-khine-may-22-2013-burma-to-host-internet-freedom-forum</link>
    <description>
        &lt;b&gt;Myanmar ICT Development Organisation (MIDO) will host “Myanmar Internet Freedom Forum” in Yangon from June 1-2. In the first forum of its kind in Burma, MIDO aims to raise awareness of Internet freedom in a country that has endured decades of media censorship.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Chan Myae Khine's post was &lt;a class="external-link" href="http://asiancorrespondent.com/107935/burma-to-host-first-internet-freedom-forum/"&gt;published in Asian Correspondent&lt;/a&gt; on May 22, 2013. The Centre for Internet and Society will be joining local netizens and organisations for discussion.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a country with a notoriously low Internet penetration rate, MIDO has been conducting Internet and communications technology (ICT) training in cities and remote areas “to empower citizens using ICT to address core development and poverty-reduction goals.” It is involved in BarCamps and government organized forums as well.&lt;br /&gt;&lt;br /&gt;“As our organisation focuses on ICT4D and Internet Policy, Internet freedom is also a vital issue that we look on,” said Htaike Htaike Aung, Program Manager of MIDO.&lt;br /&gt;&lt;br /&gt;The major goal of the Myanmar Internet Freedom Forum is to advocate for Internet freedom in Burma (Myanmar). “As the media and policy makers do not have awareness on Internet Governance Forum and its agenda, the issues have not been addressed and lack media attention,” said MIDO in its proposal submission. “Not having local resources on Internet Governance is also a cause for the lack of advocacy groups and campaigns.”&lt;br /&gt;&lt;br /&gt;MIDO also aims to promote “access” and “digital rights” with a multi-stakeholderism approach involving government, journalists, bloggers, social media activists, netizens and international experts so that all voices are allowed and heard. Various topics such as Cyber Law, Digital Security, E-education and Netizen Empowerment will be discussed during panel discussions and breakout sessions at the event.&lt;br /&gt;&lt;br /&gt;MIDO expects 300 attendees for Day 1 of the forum, when the Center for Internet and Society, the Thai Netizen Network and other regional groups will be joining local netizens and organisations for discussion. “For the government representatives, we’re still trying to get confirmation,” explained Htaike Htaike.&lt;br /&gt;&lt;br /&gt;MIDO will invite about 20 netizens from around the country to join interested participants from Yangon to discuss how to effectively monitor Internet freedom on the second day of the forum. The aim is to establish a network to monitor and report on Internet censorship in Burma. MIDO hopes to publish Internet Censorship Index each year with help of the reports generated from the network.&lt;br /&gt;&lt;br /&gt;With a 7% of Internet penetration rate, this is a problematic area in Burma, though there has been some progress and Internet business opportunities have begun to emerge. The Internet Freedom Forum, as an all-inclusive platform, has potential to bring necessary knowledge to the public, such as awareness of rights when accessing Internet and other privacy issues which are vital for new netizens.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/asian-correspondent-chan-myae-khine-may-22-2013-burma-to-host-internet-freedom-forum'&gt;https://cis-india.org/news/asian-correspondent-chan-myae-khine-may-22-2013-burma-to-host-internet-freedom-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T07:10:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world">
    <title>Comparative Analysis of DNA Profiling Legislations from Across the World</title>
    <link>https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world</link>
    <description>
        &lt;b&gt;With the growing importance of forensic data in law enforcement and research, many countries have recognized the need to regulate the collection and use of forensic data and maintain DNA databases. Across the world around 60 countries maintain DNA databases which are generally regulated by specific legislations. Srinivas Atreya provides a broad overview of the important provisions of four different legislations which can be compared and contrasted with the Indian draft bill.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Efforts to regulate the collection and use of DNA data were started in India in 2007 by the Centre for DNA Fingerprinting and Diagnostics through their draft DNA Profiling Bill. Although the bill has evolved from its original conception, several concerns with regard to human rights and privacy still remain. The draft bill heavily borrows the different aspects related to collection, profiling and use of forensic data from the legislations of the United States, United Kingdom, Canada and Australia.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comparative-analysis-dna-profiling-bill.xlsx" class="internal-link"&gt;&lt;b&gt;Click&lt;/b&gt; to find an overview of a comparative analysis of DNA Profiling Legislations&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world'&gt;https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>atreya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:30:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet">
    <title>CIS highlights changes ushered in by the Internet</title>
    <link>https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet</link>
    <description>
        &lt;b&gt;As part of its fifth anniversary celebrations, the Centre for Internet and Society (CIS) has organised an exhibition showcasing its accomplishments, besides a series of talks by experts on the changes ushered in by the Internet. The exhibition will remain open till Thursday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/cis-highlights-changes-ushered-in-by-the-internet/article4737997.ece"&gt;published in the Hindu&lt;/a&gt; on May 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, a talk will be held at 6 p.m. on “Cyber security, privacy  and surveillance”. Also, Laird Brown, strategic planner and writer, and  Purba Sarkar, associate producer with the cyber security film project,  will make presentations on cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The valedictory will have talks by Kannada writer Chandrashekar Kambar  on “Kannada in modern era”, while member of Kannada Software Committee  U.B. Pavanja will speak on “From palm leaf to tablet”. This will be  followed by a Carnatic music programme by Nirmita Narasimha. The CIS has  also invited the public to be its auditors by displaying its account  books and contracts, which shows how it has spent the Rs. 13.13 crore  received from donors. The exhibition is open from 10 a.m. to 8 p.m.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet'&gt;https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-22T06:06:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts">
    <title>NGO invites public to peruse its accounts</title>
    <link>https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts</link>
    <description>
        &lt;b&gt;Domlur-based The Centre for Internet and Society opens its books for anyone to see and track every rupee of the Rs 13.13 crore it received from donors.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Vandana Kamath was&lt;a class="external-link" href="http://www.bangaloremirror.com/index.aspx?page=article&amp;amp;sectid=10&amp;amp;contentid=201305182013051801054529377725430"&gt; published in the Bangalore Mirror&lt;/a&gt; on May 18, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In an unusual but ‘clean’ way of celebrating its fifth anniversary, a  city-based non-governmental organisation (NGO) has invited the general  public to inspect its books of accounts, check out its list of donors  and view contracts. At a time when several NGOs are under the scanner  for trying to shroud financial transactions in secrecy, The Centre for  Internet and Society (CIS), a non-profit research organisation that  defends consumer rights on the Internet, has upped its policy of  transparency a notch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Located in Domlur and largely patronised by Bangalore’s tech  community, CIS’s books of accounts will be available for public scrutiny  during its fifth anniversary celebrations from May 20 to 23 and will  show how the NGO has spent the Rs 13.13 crore it has received from  donors since its launch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to Bangalore Mirror, CIS executive director Sunil Abraham  admitted that the move was to dispel any lingering doubts on the motives  of his organisation. “These days, many NGOs have been in the news for  misappropriation of donations,” Abraham said. “We want to keep our books  of accounts open to the public. Apart from details like salaries drawn  by each board member, many other details like contractual obligations  with entities, details of donors and official travel expenses by board  members can also be obtained. Anybody can walk into our office and ask  to see the accounts. A photocopy of all the details will also be given  to them at the earliest.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, a recent debate in the Rajya Sabha centred on the lack of  transparency among NGOs receiving contributions from overseas after the  Foreign Contribution Regulation Act (FCRA) was passed in 2010. With 17  donors, a majority of who are from overseas, CIS ensures that every  rupee obtained is well spent and accounted for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have made public a list of donors and their share of  contributions to our society,” Abraham said. “This will give everybody a  clear picture of the funds we receive and where and how it is being  spent.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is primarily funded by the Kusuma Trust, The Wikimedia  Foundation and The Hans Foundation among others. The society was founded  in 2008 and has 17 staff of whom four are based in Delhi and the rest  in Bangalore. The society also has seven distinguished fellows and five  fellows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It conducts policy research programmes on topics like  accessibility, access to knowledge, openness, internet governance and  telecom. The society has churned out 641 research items in five years  that include essays, books and blog entries on the topics. It has also  conducted research on the accessibility of the e-governance system and  has suggested ways to make it more disabled-friendly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its anniversary celebrations, the society will hold a  four-day event in its office starting May 20 that will include an  exhibition showcasing its activities so far. Various artists like Kiran  Subbaiah, Tara Kelton, Navin Thomas and Abhishekh Hazra are expected to  participate and give live demonstrations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts'&gt;https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-21T14:38:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting">
    <title>Report on the 3rd Privacy Round Table meeting</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting</link>
    <description>
        &lt;b&gt;This report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18th May 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In furtherance of Internet Governance multi-stakeholder Initiatives and Dialogue in 2013, the Centre for Internet and Society (CIS) in collaboration with the Federation of Indian Chambers of Commerce and Industry (FICCI), and the Data Security Council of India (DSCI), is holding a series of six multi-stakeholder round table meetings on “privacy” from April 2013 to August 2013. The CIS is undertaking this initiative as part of their work with Privacy International UK on the SAFEGUARD project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the CIS and DSCI were members of the Justice AP Shah Committee which created the “Report of Groups of Experts on Privacy”. The CIS has recently drafted a Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India. The CIS has also volunteered to champion the session/workshops on “privacy” in the meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy, DSCI´s paper on “Strengthening Privacy Protection through Co-regulation” and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;New Delhi Roundtable: 13 April 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: 20 April 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: 18 May 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: 15 June 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: 13 July 2013&lt;/li&gt;
&lt;li&gt;New Delhi Final Roundtable and National Meeting: 17 August 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Following the first two Privacy Round Tables in Delhi and Bangalore, this report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18&lt;/span&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;span&gt; May 2013.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Overview of DSCI´s paper on ´Strengthening Privacy Protection through Co-Regulation´&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table meeting began with an overview of the paper on “Strengthening Privacy Protection through Co-Regulation” by the Data Security Council of India (DSCI). In particular, the DSCI pointed out that although the IT (Amendment) Act 2008 lays down the data protection provisions in the country, it has its limitations in terms of applicability, which is why a comprehensive privacy law is required in India. The DSCI provided a brief overview of the Report of the Group of Experts on Privacy (drafted in the Justice AP Shah Committee) and argued that in light of the UID scheme, NATRGID, DNA profiling and the Central Monitoring System (CMS), privacy concerns have arisen and legislation which would provide safeguards in India is necessary. However, the DSCI emphasized that although they support the enactment of privacy legislation which would safeguard Indians from potential abuse, the economic value of data needs to be taken into account and bureaucratic structures which would hinder the work of businesses should be avoided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI supported the enactment of privacy legislation and highlighted its significance, but also emphasized that such a legal framework should support the economic value of data. The DSCI appeared to favour the enactment of privacy legislation as it would not only oblige the Indian government to protect individuals´ sensitive personal data, but it would also attract more international customers to Indian online companies. That being said, the DSCI argued that it is important to secure a context for privacy based on Indian standards, rather than on global privacy standards, since the applicability of global standards in India has proven to be weak. The privacy bill should cover all dimensions (including, but not limited to, interception and surveillance) and the misuse of data should be legally prevented and prohibited. Yet, strict regulations on the use of data could potentially have a negative effect on companies’ competitive advantage in the market, which is why the DSCI proposed a co-regulatory framework – if not self-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular, the DSCI argued that companies should be obliged to provide security assurances to their customers and that regulation should not restrict the way they handle customers´ data, especially since customers &lt;i&gt;choose &lt;/i&gt;to use a specific service in every case. This argument was countered by a participant who argued that in many cases, customers may not have alternative choices for services and that the issue of “choice” and consent is complicated. Thus it was argued that companies should comply with regulations which restrict the manner with which they handle customers´ data. Another participant argued that a significant amount of data is collected without users´ consent (such as through cookies) and that in most cases, companies are not accountable in regards to how they use the data, who they share it with or how long they retain it. Another participant who also countered the co-regulatory framework suggested by the DSCI argued that regulations are required for smartphones, especially since there is currently very low accountability as to how SMS data is being used or shared. Other participants also argued that, in every case, individual consent should be acquired prior to the collection, processing, retention, and disclosure of data and that that individual should have the right to access his/her data and make possible corrections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI firmly supported its position on co-regulation by arguing that not only would companies provide security assurances to customers, but that they would also be accountable to the Privacy Commissioner through the provision of a detailed report on how they handle their customers´ data. Furthermore, the DSCI pointed out that in the U.S. and in Europe, companies provide privacy policies and security assurances and that this is considered to be adequate. Given the immense economic value of data in the Digital Age and the severe effects regulation would have on the market, the DSCI argued that co-regulation is the best solution to ensure that both individuals´ right to privacy and the market are protected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on co-regulation proceeded with a debate on what type of sanctions should be applied to those who do not comply with privacy regulations. However, a participant argued that if a self-regulatory model was enforced and companies did not comply with privacy principles, the question of what would happen to individuals´ data would still remain. It was argued that neither self-regulation nor co-regulation provides any assurances to the individual in regards to how his/her data is protected and that once data is breached, there is very little that can be done to eliminate the damage. In particular, the participant argued that self-regulation and co-regulation provide very few assurances that data will not be illegally disclosed and breached. The DSCI responded to this argument by stating that in the case of a data breach, the both the Privacy Commissioner and the individual in question would have to be informed and that this issue would be further investigated. Other participants agreed that co-regulation should not be an option and argued that the way co-regulation would benefit the public has not been adequately proven.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI countered the above arguments by stating that the industry is in a better position to understand privacy issues than the government due to the various products that it produces. Industries also have better outreach than the Indian government and could enhance awareness to both other companies and individuals in terms of data protection, which is why the code of practice should be created by the industry and validated by the government. This argument was countered by a participant who stated that if the industry decides to participate in the enforcement process, this would potentially create a situation of conflict of interest and could be challenged by the courts in the future. The participant argued that an industry with a self-regulatory code of practice may be problematic, especially since there would be inadequate checks and balances on how data is being handled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant argued that the Indian government does not appear to take responsibility for the right to privacy, as it is not considered to be a fundamental human right; this being said, a co-regulatory framework could be more appropriate, especially since the industry has better insights on how data is being protected on an international level. Thus it was argued that the government could create high level principles and that the industry would comply. However, a participant argued that every company is susceptible to some type of violation and that in such a case, both self-regulation and co-regulation would be highly problematic. It was argued that, as any company could probably violate users´ data in some way down the line either way, self-regulation or co-regulation would probably not be the most beneficial option for the industry. This argument was supplemented by another participant who stated that co-regulation would mandate the industry and the Privacy Commissioner as the ultimate authorities to handle users´ data and that this could potentially lead to major violations, especially due to inadequate accountability towards users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Co-regulation was once again supported by the DSCI through the argument that customers &lt;i&gt;choose &lt;/i&gt;to use specific services and that by doing so, they should comply with the security measures and privacy policies provided. However, a participant asked whether other stakeholders should be involved, as well as what type of &lt;i&gt;incentives&lt;/i&gt; companies have in order to comply with regulations and to protect users´ data. Another participant argued that the very definition of privacy remains vague and that co-regulation should not be an option, since the industry could be violating individuals´ privacy without even realising it. Another issue which was raised is how data would be protected when many companies have servers based in other countries. The DSCI responded by arguing that checks and balances would be in place to deal with all the above concerns, yet a general consensus on co-regulation did not appear to have been reached.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;Discussion on the draft Privacy (Protection) Bill 2013&lt;/h1&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of definitions: Chapter II&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The sections of the draft Privacy (Protection) Bill 2013 were discussed during the second session of the third Privacy Round Table meeting. In particular, the session started with a discussion on whether the draft Privacy (Protection) Bill 2013 should be split into two separate Bills, where the one would focus on data protection and the other on surveillance and interception. The split of a Bill on data protection to two consecutive Bills was also proposed, where the one would focus on data protection binding the public sector and the other on data protection binding the private sector. As the draft Privacy (Protection) Bill 2013 is in line with global privacy standards, the possibility of splitting the Bill to focus separately on the sections mentioned above was seriously considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the definitions laid out in Chapter 2 of the draft Privacy (Protection) Bill 2013 started with a debate around the definitions of personal data and sensitive personal data and what exactly they should include. It was pointed out that the Data Protection Act of the UK has a much broader definition for the term ´sensitive personal data´ and it was recommended that the Indian draft Privacy (Protection) Bill complies with it. Other participants argued that a controversy lies in India on whether the government would conduct a caste census and if that were to be the case, such data (also including, but not limited to, religion and ethnic origin) should be included in the legal definition for ´sensitive personal data´ to safeguard individuals from potential abuse. Furthermore, the fact that the term ´sensitive personal data´ does not have a harmonious nature in the U.S. and in Europe was raised, especially since that would make it more difficult for India to comply to global privacy standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broadness of the definition for ´sensitive personal data´ was raised as a potential problematic issue, especially since it may not be realistic to expect companies in the long term to protect everything it may include. The participants debated on whether financial information should be included in the definition of ´sensitive personal data´, but a consensus was not reached. Other participants argued that the terms ´data subject´ and ´data controller´ should be carefully defined, as well as that a generic definition for the term ´genetic data´ should be included in the Bill. Furthermore, it was argued that the word ´monitor´ should be included in the definitions of the Bill and that the universal norms in regards to the definitions should apply to each and every state in India. It was also noted that organizational affiliation, such as a trade union membership, should also be included in the definitions of the Bill, since the lack of legal protection may potentially have social and political implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Discussion of “Protection of Personal Data”: Chapter III &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the data protection chapter of the draft Privacy (Protection) Bill began with the recommendation that data collected by companies should comply with a confidentiality agreement. Another participant argued that the UK looks at every financial mechanism to trace how information flows and that India should do the same to protect individuals´ personal data. It was also argued that when an individual is constantly under surveillance, that individual´s behaviour is more controlled and that extra accountability should be required for the use of CCTV cameras. In particular, it was argued that when entities outside the jurisdiction gain access to CCTV data, they should be accountable as to how they use it. Furthermore, it was argued that the Bill should provide provisions on how data is used abroad, especially when it is stored in foreign servers. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Issue of Consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded with a discussion of Section 6 and it was pointed out that consent needs to be a prerequisite to data collection. Furthermore, conditions laid out in section 3 would have to be met, through which the individual would have to be informed prior to any data collection, processing, disclosure and retention of data. Section 11 of the Bill entails an accuracy provision, through which individuals have the right to access the data withheld about them and make any necessary corrections. A participant argued that the transmission of data should also be included in the Bill and that the transmitter would have to be responsible for the accuracy of the data. Another participant argued that transmitters should be responsible for the integrity of the data, but that individuals should be responsible for its accuracy. However, such arguments were countered by a participant who argued that it is not practically possible to inform individuals every time there is a change in their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Outsourcing of Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was further recommended that outsourcing guidelines should be created and implemented, which would specify the agents responsible for outsourcing data. On this note, the fact that a large volume of Indian data is being outsourced to the U.S. under the Patriot Act was discussed. In particular, it was pointed out that most data retention servers are based in the U.S., which makes it difficult for Indians to be able to be informed about which data is being collected, whether it is being processed, shared, disclosed and/or retained. A participant argued that most companies have special provisions which guarantee that data will not cross borders and that it actually depends on the type of ISP handling the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue which was raised was that, although a consumer may have control over his/her data at the first stage, that individual ultimately loses control over his/her data in the next stages when data is being shared and/or disclosed without his/her knowledge or consent. Not only is this problematic because individuals lose control over their data, but also because the issue of accountability arises, as it is hard to determine who is responsible for the data once it has been shared and disclosed. Some participants suggested that such a problem could possibly be solved if the data subject is informed by the data processor that its data is being outsourced, as well as of the specific parties the data is being outsourced to. Another participant argued that it does not matter who the data is being outsourced to, but the manner of its use is what really matters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Retention&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Acting on the powers given by POTA, it was argued that 50,000 arrests have been made. Out of these arrests, only seven convictions have been made, yet the data of thousands of individuals can be stored for many years under POTA. Thus, it was pointed out that it is crucial that the individual is informed when his/her data is destroyed and that such data is not retained indefinitely. This was supplemented by a participant who argued that most countries in the West have data retention laws and that India should too. Other participants argued that data retention does not end with data destruction, but with the return of the data to the individual and the assurance that it is not stored elsewhere. However, several participants argued that the return of data is not always possible, especially since parties may lack the infrastructure to take back their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was pointed out that civil society groups have claimed that collected data should be destroyed within a specific time period, but the debate remains polarized. In particular, some participants argued that data should be retained indefinitely, as the purpose of data collection may change within time and that data may be valuable in dealing with crime and terrorism in the future. This was countered by participants who argued that the indefinite retention of data may potentially lead to human rights violations, especially if the government handling the data is non-democratic. Another participant argued that the fact that data may be collected for purpose A, processed for purpose B and retained or disclosed for purpose C can be very problematic in terms of human rights violations in the future. Furthermore, another participant stated that destruction should mean that data is no longer accessible and that is should not only apply to present data, but also to past data, such as archives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Processing&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The processing of personal data is regulated in section 8 of the draft Privacy (Protection) Bill 2013. A participant argued that the responsibility should lie with the person doing the outsourcing of the data (the data collector). Another participant raised the issue that although banks acquire consent prior to collection and use of data, they subsequently use that data for any form of data processing and disclosure. Credit information requires specific permission and it was argued that the same should apply to other types of personal data. Consent should be acquired for every new purpose other than the original purpose for data collection. It was strongly argued that general consent should not cover every possible disclosure, sharing and processing of data. Another issue which was raised in terms of data processing is that Indian data could be compromised through global cooperation or pre-existing cooperation with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Disclosure&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disclosure of personal data was highlighted as one of the most important provisions within the draft Privacy (Protection) Bill 2013. In particular, three types of disclosure were pointed out: (1) disclosure with consent, (2) disclosure in outsourcing, (3) disclosure for law enforcement purposes. Within this discussion, principle liability issues were raised, as well as whether the data of a deceased person should be disclosed. Other participants raised the issue of data being disclosed by international third parties, who gain access to it through cooperation with Indian law enforcement agencies and cases of dual criminality in terms of the misuse of data abroad were raised. A participant highlighted three points: (1) the subject who has responsibility for the processing of data, (2) any obligation under law should be made applicable to the party receiving the information, (3) applicable laws for outsourcing Indian data to international third parties. It was emphasized that the failure to address these three points could potentially lead to a conflict of laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a participant, a non-disclosure agreement should be a prerequisite to outsourcing. This was preceded by a discussion on the conditions for data disclosure under the draft Privacy (Protection) Bill 2013 and it was recommended that if data is disclosed without the consent of the individual, the individual should be informed within one year. It was also pointed out that disclosure of data in furtherance of a court order should not be included in the Bill because courts in India tend to be inconsistent. This was followed by a discussion on whether power should be invested in the High Court in terms of data disclosure.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Interception of Communications”: Chapter IV&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table ended with a brief discussion on the fourth chapter of the draft Privacy (Protection) Bill 2013, which regulates the interception of communications. Following an overview of the sections and their content, a participant argued that interception does not necessarily need to be covered in the draft Privacy (Protection) Bill, as it is already covered in the Telegraph Act. This was countered by participants who argued that the interception of communications can potentially lead to a major violation of the right to privacy and other human rights, which is why it should be included in the draft Privacy (Protection) Bill. Other participants argued that a requirement that intercepted communication remains confidential is necessary, but that there is no need to include privacy officers in this. Some participants proposed that an exception for sting operations should be included in this chapter.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Meeting conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table entailed a discussion of the definitions used in the draft Privacy (Protection) Bill 2013, as well as of chapters II, III and IV on the right to privacy, the protection of personal data and the interception of communications. The majority of the participants agreed that India needs a privacy legislation and that individuals´ data should be legally protected. However, participants disagreed in regards to how data would be safeguarded and the extent to which data collection, processing, sharing, disclosure, destruction and retention should be regulated. This was supplemented by the debate on self-regulation and co-regulation; participants disagreed on whether the industry should regulate the use of customers´ data autonomously from government regulation or whether the industry should co-operate with the Privacy Commissioner for the regulation of the use of data. Though a consensus was not reached in regards to co-regulation and self-regulation, the majority of the participants agreed upon the establishment of a privacy legislation which would safeguard individuals´ personal data. The major issue, however, with the creation of a privacy legislation in India would probably be its adequate enforcement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting'&gt;https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:35:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet">
    <title>A lifetime of five years on the internet</title>
    <link>https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet</link>
    <description>
        &lt;b&gt;Centre for Internet and Society observes its fifth anniversary on Sunday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Subir Ghosh was &lt;a class="external-link" href="http://www.dnaindia.com/bangalore/1836745/report-a-lifetime-of-five-years-on-the-internet"&gt;published in DNA on May 19, 2013&lt;/a&gt;. Sunil Abraham is quoted in this.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Five years is a long time in the internet space. The past five years, certainly, has been. And so has it been for the Centre for Internet and Society that completes five years here.&lt;br /&gt;&lt;br /&gt;When a group of citizens got together to come under a platform called CIS five years ago, they had wanted to work on policy issues about the internet that had a bearing on society. They, in fact, still do; except that the new media space itself has undergone a metamorphosis. Five years ago social media was just starting off, few people had smart phones, and online speech was not a burning issue.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, executive director of city-based CIS, affirms this, and goes on to assert: “Five years ago, privacy was not a mainstream concern. Today, many different actors and stakeholders are interested in the configuration of the draft Privacy Bill. We first warned the public about the draconian measures in the IT Act during the 2008 amendment. Four years later, many more people are familiar with problematic sections and are adopting various strategies to amend the Act and it’s associated rules.”&lt;br /&gt;&lt;br /&gt;Likewise, five years ago, people dismissed “shared spectrum” as a pipe dream; today “shared spectrum” is mentioned in the National Telecom Policy. CIS usually thinks ahead, and works on a range of issues.&lt;br /&gt;&lt;br /&gt;“For internet adoption in India to grow dramatically from the dismal statistics today, we need to ensure continued access to cheap devices and affordable and ubiquitous broadband,” says Abraham.&lt;br /&gt;&lt;br /&gt;“With Ericsson suing Micromax for Rs100 crore, the mobile wars have come to India. If we have to protect innovation in sub-100 dollar devices, we need to configure our patent and copyright policy carefully.”&lt;br /&gt;&lt;br /&gt;But since CIS works primarily on policy issues, shouldn’t it have been based in Delhi rather than in Bangalore? “We do have a small office in Delhi. But we are headquartered in Bangalore because we need to keep learning from technologists and the technical community,” explains Abraham.&lt;br /&gt;&lt;br /&gt;When an organisation calling itself the Centre for Internet and Society (www.cis-india.org) observes its fifth anniversary, it shouldn’t surprise anyone that many of the activities related to the anniversary celebrations (May 20-23) have precious little to do with the internet, and is more about society itself. And yes, an entire evening is devoted to Kannada. There’s a talk by Chandrashekhara Kambara on ‘Kannada in the modern era,’ and another by UB Pavanaja titled ‘From Palm Leaf to Tablet – Journey of Kannada’.&lt;br /&gt;&lt;br /&gt;“We are looking at the complete eco-system. For instance, during the digitalisation of TV in India, what will happen to the internet? Do TV promoting policies undermine the growth of broadband? On the second day we look at the connection between another older technology - cinema and the Internet.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet'&gt;https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-05-20T09:04:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go">
    <title>Sex on-the-go</title>
    <link>https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go</link>
    <description>
        &lt;b&gt;After a freak fire in 2011 reduced the cubbyholes trading in electronic goods inside a Crawford Market shopping plaza to ashes, Junaid has gone alfresco.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Anand Holla was &lt;a class="external-link" href="http://www.mumbaimirror.com/others/sunday-read/Sex-on-the-go/articleshow/19886770.cms"&gt;published in Mumbai Mirror&lt;/a&gt; on May 4, 2013. Pranesh Prakash is quoted in it.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;He sits on a stool by a  chock-full street tinkering with mobile phones while three teenage  staffers hover around him. A laptop receives favourable treatment; it  sits at the centre of the makeshift stall scattered with card readers.  The imaginary wall of hostility he carefully builds over several seconds  crashes when he realises we are genuine customers. "This is not your  regular movie...it will cost you Rs 250 for 4 GB," he mutters, dodging  eye contact. Some bargaining later, he hurriedly transfers 200 short  pornographic clips from the laptop on to a memory card for Rs 150. Most  are the fall-out of crosscountry MMS scandals, the flavour of the  season. "Everyone does it, no one talks about it. A raid means we lose  our equipment and pay a hefty fine," he says in staccato metre, handing  us back the card. Seconds later, head down, he's back to reviving a dead  smartphone.&lt;br /&gt; &lt;br /&gt; The rates vary at a booth a few metres down. It's  Rs 400 for 16GB - the same price as that for loading your phone with the  latest Bollywood and Hollywood films - of a "collection" that includes  foreign porn, and bestiality videos.&lt;br /&gt; &lt;br /&gt; It's hardly a secret that  several of the city's cell phone repair shops and SIM card kiosks that  flaunt a computer, stock smut in secret folders marked by gibberish  names. "We get some women, too," one owner says. "They say, "Zara woh  waale movies daal dena'."&lt;br /&gt; &lt;br /&gt; Which brings you to the rules of the mobile-porn-off-the-street universe.&lt;br /&gt; &lt;br /&gt; A blunt demand for a blue film clip will send shopkeepers into a shell.  Some may even express mock disgust at your request. Blame it on random  raids by the State Anti-Piracy Cell. Around South Mumbai's markets, for  instance, code words 'Daal gosht' or 'Pelampaal' put the  Flashing-Loading-Repairing stall owners at ease. But for tongue-tied  first-timers, body language is the marker. A local cell phone  accessories distributor says, "The more desperate you look and sound,  the easier it is for you to pass off as a bona fide purchaser. If you  are well-dressed, they'll deny they stock it. There's no fixed rate. Sab  grahak dekhke poodi baandhte hain. Considering how it's a simple  copy-paste job, it's free money anyway."&lt;br /&gt; &lt;br /&gt; Regular customers  frequently leave their phones with their trusted 'service' providers for  loading apps, games, the latest films, and porn too. It's a package  deal. "If you know how to ask for it, there's hardly a corner in Mumbai  where you can't buy pocket porn," says a shopkeeper from Mulund.&lt;br /&gt; &lt;br /&gt; In fact, pornography is not high on the authorities' agenda, says Vijay  Mukhi, former member of the High Court/State Government Committee on  Pornography and Cyber Laws. "Unless the Anti-Piracy Cell sends a dummy  customer to lay a trap, it's near impossible to prosecute the  shopkeepers because watching porn is not a crime; only producing,  publishing or distributing it is," he clarifies.&lt;br /&gt; &lt;br /&gt; Shafqat  Usmani, President of the Mobile Dealers Welfare Association of Mumbai,  says, the paltry 2.5 per cent margin on products makes the city's 50,000  mobile phone retailers render additional services, including repairing.  Is loading porn part of the survival mechanism? "The low margin is no  excuse to indulge in disgusting activities," he says.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Hand-held and hi-res&lt;/b&gt;&lt;br /&gt; The cell phone boom - both, cheap Chinese models that allow the  not-so-privileged access to technology and the arrival of high-res  display screens that offer the affluent a viewing experience superior to  television - has worked towards making porn consumption mainstream.  Local train commuters will tell you of the passenger on the corner seat  watching smutty clips, as if it were an impassive pastime. It's even  found favour as a 'stress reliever'. "My friends and I buy phone porn to  watch whenever the workload at office gets out of hand," says a  Mankhurd resident.&lt;br /&gt; &lt;br /&gt; While watching porn on laptops, either  straight off the net or via DVDs, means you could get busted by family  and friends, the handheld experience - with a phone password to boot -  allows complete privacy.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;What would you like?&lt;/b&gt;&lt;br /&gt; Depending on which neighbourhood market you access, the popular  offering varies. In Kurla, says a cell phone mechanic, foreign porn has  no takers. "They (customers) say everything happens too soon and easy.  The demand is for morphed celebrity sex videos, South Indian porn and of  course, MMS clips." Some of these are what the industry refers to as  'kaand' videos. They resemble MMS scandal clips but are staged. It's the  lure of these grainy, sloppily shot videos that landed Karnataka BJP  ministers Lakshman Savdi and CC Patil in a soup last February. The two  were caught watching a clip during assembly. Amid a storm of criticism,  they and Mangalore minister Krishna Palemar, who was accused of  transferring the video to Savdi's phone, resigned.&lt;br /&gt; &lt;br /&gt; On  Ahmedabad's Relief Road, a row of kiosks that sport the 'Downloading'  sign, like the one run by Karimmuddin, offer hi-definition (HD) foreign  porn to affluent students who walk in with large-screen 3G phones  demanding virus-free content. It's Rs 100 for 2GB worth of mp4 clips of  720p resolution, and Rs 50 for 2GB worth low-quality clips, says  21-year-old Moin. Smaller, dirt cheap deals are available too. A single  HD clip at Rs 5.50, a low-res one for Rs 2, and the 'lightest' clip for  Rs 21 paise.&lt;br /&gt; &lt;br /&gt; "My customers are youngsters from middle and upper  middle class families," says 30-year-old Rocky, a shop owner in  Navrangpura, while catering to Vikas, a collegian waiting for a Rs 100  download. "We are a group of six friends, including girls. For Rs 100,  I'm going away with more than 20 HD video clips," he says  straight-faced, adding that his group of friends, girls included, get  together during the holidays for collective viewing. A relationship of  trust between regulars like Vikas and shopkeepers means he will share a  clip with the mobile store owner, in case he doesn't have it in stock.&lt;br /&gt; &lt;br /&gt; It's a business of 100 per cent profits, they admit, and raids are easy  to dodge since the police usually come looking for duplicate cell  phones. They'd make half their monthly earnings if they relied on  selling SIM cards, mobile accessories and software loading alone, says  Ramesh, a 23-year-old staffer at a cell phone shop in Odhav that gets  walk-ins from rickshawallahs and college students.&lt;br /&gt; &lt;br /&gt; The rise of  mobile porn has turned into a thorn in the flesh for pirated DVD  sellers. Ajju, who runs a CD/DVD stand near Panchwati Crossroads,  remembers a time when customers crowded him for 'tragda' or XXX CDs.  "Older women would arrive in cars, roll down the window and ask for  adult movies. I'd notice how they'd chuck the explicit cover and plonk  the CD in an unsuspecting plastic bag." Mobile porn has hit his profits,  bringing it down by 20 per cent.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Southward bound&lt;/b&gt;&lt;br /&gt; Surprisingly, in Bengaluru, the erotic DVD trend is experiencing freak  survival. Two years ago, the youth scoured Majestic and SP Road for  downloaded porn. But with affordable mobile phone data plans and pirated  DVD sellers ratting on their competitors, mobile repair shop owners  have had to stick to doing just that - fiddle with hardware.&lt;br /&gt; &lt;br /&gt; It's the tier II and III cities across India that are waking up to the  potential of porn-on-phone. Earlier this year, Mysore-based moral  awareness group Rescue conducted a survey across 964 junior college  students from Mysore, Chamarajanagar and Bengaluru. More than 75 per  cent watched porn regularly, and most watched six times more porn on  their phones than on any other device, said the findings.&lt;br /&gt; &lt;br /&gt; Mangalore, Belgaum, Dharwad and Mysore, all educational centres, support  a thriving porn-lending library system. A student from Moodabidri says,  "Most hostel students venture out to these shops once a week, and pay  Rs 50 for a porn-loaded memory card. They return it a week later in  exchange for fresh content."&lt;br /&gt; &lt;br /&gt; Mangalore leads the pack in the  sleaze game. It's believed that the clip that got the Karnataka  ministers into trouble was called Fasila, and was a hit in Mangalore and  neighbouring Kasargod two years ago. Six years ago, a seven-minute MMS  sex clip was converted into a half-hour CD named Mangalooru Mungaru Male  and sold widely. In 2000, before mobiles became the rage they are now,  sex CDs flew off the shelves. The famous 40-minute clip, Mysore Mallige  (known as MM CD) that featured a girl from Puttur, was sold for as much  as Rs 1,000.&lt;br /&gt; &lt;br /&gt; A mobile accessories shop owner in Puttur says the  porn viewing audience has grown to include blue collar workers, who  aren't tech-savvy to figure their own Internet downloads. "All they want  is clarity of clips,' he says.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Watch, don't act&lt;/b&gt;&lt;br /&gt; His customers then, are not very different from 22-year-old Manoj Sah  and his 19-year-old companion Pradeep Kumar, who admitted to  investigators probing the rape of a five-year-old girl in East Delhi  last month, that they were drinking and watching porn on their mobile  phone before they lured the girl into Sah's house with a chocolate.&lt;br /&gt; &lt;br /&gt; While the nation erupted in protest, the confession drew attention to  the possible fallout of easy access to pornographic content. The Delhi  case isn't isolated. In January, Mumbai cringed when 70-year-old Niyaz  Raza was arrested in the Govandi rape case involving a 13-year-old girl.  His SIM was found loaded with sex clips, including one where he had  filmed the girl performing oral sex on him.&lt;br /&gt; &lt;br /&gt; Last month, Indore  advocate Kamlesh Vaswani filed a writ petition in the Supreme Court  seeking a change in Internet laws that would make watching pornography a  nonbailable offence. It estimates that the number of such clips  accessible to Indians is more than 200 million. The petition states:  "The sexual content that kids are accessing today is far more graphic,  violent, brutal, deviant, and destructive (than before), and has put the  entire society in danger." It also finds the increasing "severity and  gravity" of these visuals a concern, and accuses accessible pornography  of "fuelling" most of the offences committed against women and children.&lt;br /&gt; &lt;br /&gt; So, more than porn, it's the exposure of a larger audience to its  extreme forms - bondage, bestiality, even paedophila - that's spurred a  debate. To sum up the sentiment in the words of award-winning writer  Robin Morgan: "Pornography is the theory, rape is the practice."&lt;br /&gt; &lt;br /&gt; There are enough and more voices refuting Vaswani's claim. Pranesh  Prakash is one of them. The policy director with Bengaluru-based Centre  for Internet and Society, says, "There is no data to establish a direct  co-relation between porn and sexual crimes. To be alarmed over the  widespread availability of porn through mobile phone loading alone is a  classist reaction; those who are well-to-do have had easy digital access  anyway."&lt;br /&gt; &lt;br /&gt; Way before those accused of rape were introduced to  porn, they were exposed to a culture of misogyny that says women must be  controlled, and their bodies are free to loot.&lt;br /&gt; &lt;br /&gt; &lt;i&gt;- With  Hemington James and Yogesh Avasthi in Ahmedabad, Rakesh Prakash in  Bengaluru and Deepthi Shridhar in Mangalore (Some names been changed to  protect identity)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go'&gt;https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:08:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground">
    <title>WORLD WIDE PLAYGROUND </title>
    <link>https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground</link>
    <description>
        &lt;b&gt;The Delhi High Court recently asked the central government to explain why minors are allowed to create online accounts on social networking sites such as Facebook or Orkut. The High Court’s question stems from a petition filed by former senior BJP leader K.N. Govindacharya last year. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The Op-ed was &lt;a class="external-link" href="http://www.telegraphindia.com/1130515/jsp/opinion/story_16900282.jsp#.Ua8HhthmMQN"&gt;published in the Telegraph&lt;/a&gt; on May 15, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Govindacharya argued that by allowing minors to open accounts on social media sites, the companies of these sites were violating the Indian Majority Act, 1875, the Indian Contract Act, 1872, and the Information Technology Act, 2000.&lt;/p&gt;
&lt;p align="left" class="story"&gt;One of Govindacharya’s main concerns is  that when minors give false information to open an account on an online  portal, they are liable to be held guilty for a criminal offence.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;“Providing  false information about oneself is more of a crime than a civil wrong,”  explains Debsankar Chowdhury, a Calcutta-based cyber law expert.  “However, if it is provided with an intention to enter into a contract  which otherwise is not allowed, it is tantamount to fraud under Section  17 of the Contract Act of 1872.”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;For minors,  though, Chowdhury points out that the Juvenile Justice Act, 2005, will  be brought into play, and they will face lighter sentences.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;As for the  social networking companies themselves, according to the law of the land  they can be held accountable if a user provides them with false  information. As Pavan Duggal, a Supreme Court advocate and expert on  cyber law, points out, “All social networking sites are intermediaries  under Section 2(1)(w) of the amended Information Technology Act, 2000.  They are made responsible for all third party data or information made  available by them under Section 79 of the Information Technology Act,  2000.” As such, social networking sites would be held accountable for  allowing people, especially minors, to create fake profiles on their  networks under Section 79 and 85 of the Information Technology Act,  2000, he adds.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;The other  problem here is that while a social networking site  like Facebook  allows anyone over 13 to open an account, according to Indian law,  anyone under 18 years of age is a minor; and a minor cannot enter into a  contract with any entity. “The issue raised in Govindacharya’s petition  is of a fundamental nature,” opines Duggal. “Section 3 of the Indian  Majority Act, 1875, clearly states that every person domiciled in India  shall attain the age of majority on his completing the age of 18 years.  However, Facebook allows 13-year-olds to become its members. Since  children lack the inherent capacity to contract under the Indian  Contract Act, 1872, the contract entered into between  Indian children  below the age of 18 years and Facebook is null and void.”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;But though  the nitty gritty of the law seems to be weighted against children below  18 — or even 13 — joining social networking sites, not everyone believes  that kids should be prevented from having a presence online. Six months  ago, 10-year-old Shruti (name changed) met with an accident, and was  bedridden for some time. She was bored and miserable. To cheer her up,  her father signed her on to Facebook — yes, by providing false  information about her age.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;Other  parents may not take a similar view of their young children joining  Facebook under false pretexts. But Ashok Agarwal, a Delhi-based lawyer  and child rights activist, believes that Govindacharya’s petition  demonstrates an outdated way of thinking. “We are letting children speak  at the UN and in Parliament, but we don’t want to let them speak  online,” he says. “Allowing children to use sites like Facebook doesn’t  hurt them, and if anything, denying them access to it would be denying  them their universal Right to Participate. This right is part of  Unicef’s Convention on the Rights of the Child.” And also it’s denying  them access to a tool and medium that is, and will be, an integral part  of their lives, adds Agarwal.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;Leaving  aside the debate on whether or not children below a certain age should  be allowed on social networking sites, Chowdhury points out that right  now there is no means of checking the age of those who are signing in to  these online portals.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;In fact,  Section D of Govindacharya’s petition does point out the need for some  kind of verification process when people create an online account, much  like what phone service providers do when someone applies for a new  connection.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;But experts  point out that this is not feasible in the case of social networking  sites. Says Chowdhury, “Mobile companies operate their network in  specific locations, whereas sites like Facebook exist worldwide.  Moreover, these portals don’t take a single penny from their users. So  do you really think it is possible to make offline verification?”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;Indeed,  verification of user data — ostensibly to cut out underage persons from  logging on to social networking sites — has much wider ramifications.  Pranesh Prakash, policy director at the Centre for Internet and Society  in Bangalore, points out that it could start a downward spiral towards  loss of online privacy. “If anyone wants to create an account on a  website, but has to provide some sort of verifiable data, you’re going  to remove a person’s ability to post anonymously on the Internet. Then  what happens to freedom of speech? People like to post online  anonymously, but if everyone’s identity is known, that privacy is  revoked.”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;The effect  of social networking sites on children will be debated for a long time.  But clearly, it would be tough to enforce laws to prevent children from  logging on to these sites.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground'&gt;https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:47:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother">
    <title>Is India's government becoming Big Brother? </title>
    <link>https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother</link>
    <description>
        &lt;b&gt;India's new Central Monitoring System will give officials unprecedented access to calls, texts, and online activity.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The blog post by Talia Ralph and Jason Overdorf was &lt;a class="external-link" href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt;published in Global Post&lt;/a&gt; on May 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government has quietly started putting into place its new Central  Monitoring System, a project that will give it access to its citizens'  telephone calls, texts, and online activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system, &lt;a href="http://www.pcworld.com/article/183229/article.html" target="_blank"&gt;in development since 2009&lt;/a&gt;, will enable state agencies to monitor all digital interactions, &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms" target="_blank"&gt;the Times of India reported&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Work on CMS has been kept quiet for the past few years, although the  newspaper reported that several government agencies ordered specialized  equipment and systems for monitoring telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's government has steadily been increasing its access to  telecommunications since the 2008 Mumbai bombings to help track  militants and illegal activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The country — one of the world's fastest-growing internet markets —  enacted its information technology law in 2000, and amended it twice, in  2008 and again in 2011.&lt;/p&gt;
&lt;p&gt;As PCWorld described the new system,&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;The CMS will have central and regional databases to help  central and state-level enforcement agencies intercept and monitor  communications, the government said. It will also have direct electronic  provisioning of target numbers by government agencies without any  intervention from telecom service providers, it added. It will also  feature analysis of call data records and data mining of these records  to identify call details, location details, and other information of the  target numbers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Internet freedom activists and privacy experts worry the project  offers far too much access to citizens' communications. They say  official agencies allegedly misused and leaked tapped phone  conversations, while the government has sought to quash dissent and  silence critics on the internet under the guise of preventing hate  speech.&lt;/p&gt;
&lt;p&gt;"In the absence of a strong privacy law that promotes transparency  about surveillance and thus allows us to judge the utility of the  surveillance, this kind of development is very worrisome," Pranesh  Prakash, the director of policy at the Center for Internet and Society,  told the Times of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Further, this has been done with neither public nor parliamentary  dialog, making the government unaccountable to its citizens," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government last year &lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/120824/india-china-censorship-internet"&gt;blocked mobile phones and shut down social media&lt;/a&gt; sites ostensibly to prevent communal riots, but in the process blocked  some 16 Twitter handles known to be critical of the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics of the CMS movement &lt;a href="http://stopicms.org/2013/05/the-what-why-and-how-for-stopicms/" target="_blank"&gt;wrote a blog post &lt;/a&gt;arguing that the Indian government wants to use the law to censor "hate speeches and government criticism."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We know the government today hates public criticizing it," the group  Stop ICMS wrote on their blog. "The recent arrests of people for  tweeting or posting on Facebook has proved that. Govt. does not like  criticism that can be seen by everyone on the Internet."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS program is in place in a "preliminary state" right now, with the full version expected to be in place by August 2014.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother'&gt;https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:39:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication">
    <title>India's Rs 400-crore Central Monitoring System to snoop on all communication </title>
    <link>https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication</link>
    <description>
        &lt;b&gt;Latest reports confirm that the government's longstanding aim of initiating the Central Monitoring System in the country is materialising now.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://tech2.in.com/news/general/indias-rs-400crore-central-monitoring-system-to-snoop-on-all-communication/872510"&gt;published in Tech 2&lt;/a&gt; on May 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms" rel="nofollow" target="_blank" title="TOI report"&gt;The Times of India&lt;/a&gt;&lt;/b&gt; reports that the government began rolling out the project last month,  and it lets them access all communication in the country – comprising  online activities, phone calls, SMSes, social media conversations and  even the geographical location of individuals. Using the Central  Monitoring System, officials with the National Investigation Agency or  tax officials will have access to "every byte of communication".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pavan Duggal, an advocate with the Supreme Court, believes that the  new system "is capable of tremendous abuse". He went on to say that the  government hasn't revealed much on what it intends to monitor with this  new system, and under what criteria.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Development of Telematics has been given the task of  putting this system in place to give government officials this crucial  access to communication in the country. In his statement to the  Parliament in December last year, IT minister Milind Deora had said that  the Central Monitoring System will "lawfully intercept Internet and  telephone services".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This system was initiated in the wake of the horrying bomb blast in  Mumbai in November 2008. Post that incident, the government reportedly  took on the task of making itself technologically adept to "eavesdrop on  digital communications".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would be important to quote here that the IT law – enacted in  2000, amended in 2008 and in 2011 – confers upon government officials  the authority to intercept phone calls, SMSes, emails and even monitor  websites. That, however, can only be done for "reasonable security  practices and procedures".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication'&gt;https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-05T10:39:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013">
    <title>Google Policy Fellowship Programme: Call for Applications </title>
    <link>https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is inviting applications for the Google Policy Fellowship programme. Google is providing a USD 7,500 stipend to the India Fellow, who will be selected by July 1, 2013.&lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;The &lt;a href="http://www.google.com/policyfellowship/"&gt;Google Policy Fellowship&lt;/a&gt; offers successful candidates an opportunity to develop research and debate on the fellowship focus areas, which include Access to Knowledge, Openness in India, Freedom of Expression, Privacy, and Telecom, for a period of about ten weeks starting from July 7, 2013 upto October 1, 2013. CIS will select the India Fellow. Send in your applications for the position by June 15, 2013.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To apply, please send to&lt;a href="mailto:google.fellowship@cis-india.org"&gt; google.fellowship@cis-india.org&lt;/a&gt; the following materials:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Statement 	of Purpose&lt;/b&gt;: 	A brief write-up outlining about your interest and qualifications 	for the programme including the relevant academic, professional and 	extracurricular experiences. As part of the write-up, also explain 	on what you hope to gain from participation in the programme and 	what research work concerning free expression online you would like 	to further through this programme. (About 1200 words max).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Resume&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Three 	references&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Fellowship Focus Areas&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;: Studies looking at access to knowledge issues in India in light of copyright law, consumers law, parallel imports and the interplay between pervasive technologies and intellectual property rights, targeted at policymakers, Members of Parliament, publishers, photographers, filmmakers, etc.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Openness 	in India&lt;/b&gt;: 	Studies with policy recommendations on open access to scholarly 	literature, free access to law, open content, open standards, free 	and open source software, aimed at policymakers, policy researchers, 	academics and the general public.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Freedom 	of Expression&lt;/b&gt;: 	Studies on policy, regulatory and legislative issues concerning 	censorship and freedom of speech and expression online, aimed at 	bloggers, journalists, authors and the general public.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Privacy&lt;/b&gt;: 	Studies on privacy issues like data protection and the right to 	information, limits to privacy in light of the provisions of the 	constitution, media norms and privacy, banking and financial 	privacy, workplace privacy, privacy and wire-tapping, e-governance 	and privacy, medical privacy, consumer privacy, etc., aimed at 	policymakers and the public.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Telecom&lt;/b&gt;: 	Building awareness and capacity on telecommunication policy in India 	for researchers and academicians, policymakers and regulators, 	consumer and civil society organisations, education and library 	institutions and lay persons through the creation of a dedicated web 	based resource focusing on knowledge dissemination.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 align="JUSTIFY"&gt;Frequently Asked Questions&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;What is the Google Policy Fellowship program?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Google Policy Fellowship program offers students interested in Internet and technology related policy issues with an opportunity to spend their summer working on these issues at the Centre for Internet and Society at Bangalore. Students will work for a period of ten weeks starting from June 1, 2013. The research agenda for the program is based on legal and policy frameworks in the region connected to the ground-level perceptions of the fellowship focus areas mentioned above.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;I 	am an International student can I apply and participate in the 	program? Are there any age restrictions on participating?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Yes. 	You must be 18 years of age or older by January 1, 2013 	to be eligible to participate in Google Policy Fellowship program in 	2013.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Are 	there citizenship requirements for the Fellowship?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;For 	the time being, we are only accepting students eligible to work in 	India (e.g. Indian citizens, permanent residents of India, and 	individuals presently holding an Indian student visa. Google cannot 	provide guidance or assistance on obtaining the necessary 	documentation to meet the criteria.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Who 	is eligible to participate as a student in Google Policy Fellowship 	program?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In 	order to participate in the program, you must be a student. Google 	defines a student as an individual enrolled in or accepted into an 	accredited institution including (but not necessarily limited to) 	colleges, universities, masters programs, PhD programs and 	undergraduate programs. Eligibility is based on enrollment in an 	accredited university by January 1, 2013.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;I 	am an International student can I apply and participate in the 	program?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In 	order to participate in the program, you must be a student (see 	Google's definition of a student above). You must also be eligible 	to work in India (see section on citizen requirements for fellowship 	above). Google cannot provide guidance or assistance on obtaining 	the necessary documentation to meet this criterion.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;I 	have been accepted into an accredited post-secondary school program, 	but have not yet begun attending. Can I still take part in the 	program?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;As 	long as you are enrolled in a college or university program as of 	January 1, 2013, 	you are eligible to participate in the program.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;I 	graduate in the middle of the program. Can I still participate?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;As 	long as you are enrolled in a college or university program as of 	January 1, 2013, 	you are eligible to participate in the program.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 class="western"&gt;Payments, Forms, and Other Administrative Stuff&lt;/h3&gt;
&lt;p class="western"&gt;&lt;b&gt;How do payments work?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Google will provide a stipend of USD 7,500 equivalent to each Fellow for the summer.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Accepted 	students in good standing with their host organization will receive 	a USD 2,500 stipend payable shortly after they begin the Fellowship 	in June 2013.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Students 	who receive passing mid-term evaluations by their host organization 	will receive a USD 1,500 stipend shortly after the mid-term 	evaluation in July 2013.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Students 	who receive passing final evaluations by their host organization and 	who have submitted their final program evaluations will receive a 	USD 3,500 stipend shortly after final evaluations in August 2013.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Please note: &lt;i&gt;Payments will be made by electronic bank transfer, and are contingent upon satisfactory evaluations by the host organization, completion of all required enrollment and other forms. Fellows are responsible for payment of any taxes associated with their receipt of the Fellowship stipend&lt;/i&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;*&lt;/b&gt;While the three step payment structure given here corresponds to the one in the United States, disbursement of the amount may be altered as felt necessary.&lt;/p&gt;
&lt;p class="western"&gt;&lt;b&gt;What documentation is required from students?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Students should be prepared, upon request, to provide Google or the host organization with transcripts from their accredited institution as proof of enrollment or admission status. Transcripts do not need to be official (photo copy of original will be sufficient).&lt;/p&gt;
&lt;p class="western"&gt;&lt;b&gt;I would like to use the work I did for my Google Policy Fellowship to obtain course credit from my university. Is this acceptable?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yes. If you need documentation from Google to provide to your school for course credit, you can contact Google. We will not provide documentation until we have received a final evaluation from your mentoring organization.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Host Organizations&lt;/h2&gt;
&lt;p class="western"&gt;&lt;b&gt;What is Google's relationship with the Centre for Internet and Society?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Google provides the funding and administrative support for individual fellows directly. Google and the Centre for Internet and Society are not partners or affiliates. The Centre for Internet and Society does not represent the views or opinions of Google and cannot bind Google legally.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;Important Dates&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;What is the program timeline?&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;June 15, 2013&lt;/td&gt;
&lt;td&gt;Student Application Deadline. Applications must be received by midnight. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;July 1, 2013&lt;/td&gt;
&lt;td&gt;Student applicants are notified of the status of their applications. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;July 2013&lt;/td&gt;
&lt;td&gt;Students begin their fellowship with the host organization (start date to be determined by students and the host organization); Google issues initial student stipends. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;August 2013 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mid-term evaluations; Google issues mid-term stipends. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;October 2013&lt;/td&gt;
&lt;td&gt;Final evaluations; Google issues final stipends. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013'&gt;https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-05-17T01:01:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
