<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/digital-natives/pathways/learning-in-higher-education/search_rss">
  <title>Pathways to Higher Education</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 231 to 245.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/know-your-users"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/e-accessibility-kit-in-russian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/dnbook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/ogd-draft-v2-call-for-comments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/open-government-data-study"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rebuttal-dit-press-release-intermediaries"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/wikipedia-reader"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-response-dit-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/untapped-potential"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/google-policy-fellowship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/santiago-workshop-an-after-thought"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/openness/blog-old/know-your-users">
    <title>Know your Users, Match their Needs!</title>
    <link>https://cis-india.org/openness/blog-old/know-your-users</link>
    <description>
        &lt;b&gt;As Free Access to Law initiatives in the Global South enter into a new stage of maturity, they must be certain not to lose sight of their users’ needs. The following post gives a summary of the “Good Practices Handbook”, a research output of the collaborative project Free Access to Law — Is it Here to Stay? undertaken by LexUM (Canada) and the South African Legal Institute in partnership with the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Almost ten years have passed since the Montreal Declaration on
Free Access to Law (FAL) was signed by eight legal information institutes and other
FAL initiatives. Today, the Free Access to Law Movement (FALM) is growing with over 30 initiatives having signed onto the Declaration and providing free, online
access to legal information. While the movement continues to gain momentum, the
big question no longer remains &lt;em&gt;why&lt;/em&gt; we need
free access to law, but instead &lt;em&gt;how&lt;/em&gt; FAL initiatives can continue to do so sustainably in the long-term. The principles of access
and justice underpinning the FALM have been well-argued and few would dispute the
notion that citizens ought to have access to the laws under which they are
governed. As the Montreal Declaration states: "Public legal information from
all countries and international institutions is part of the common heritage of
humanity…Maximizing access to his information promotes justice and the rule of
law" (2002).&lt;/p&gt;
&lt;p&gt;Regardless of legal system or political context, the
importance of securing free online access to the law has been recognized from a
variety of perspectives. Whether FAL is considered a critical democratic
function or simply an essential efficiency within any legal system, it is
difficult to contest that the internet has increased the accessibility of and
ease with which legal information is being published and shared online. Setting
the ideological and practical foundations of the movement aside, effectively
demonstrating the impact of FAL initiatives and to secure their sustainability in
the long-term remains the next big challenge for the FALM. Today, there is a
growing necessity for grounded and realistic indicators that can validate some
of the long-held assumptions around the impacts and outcomes of FAL initiatives.
Furthermore, and perhaps more importantly, there is also a need for a more
nuanced understanding of the factors that influence the sustainability of FAL
initiatives— particularly in resource-scarce and often nebulous legal systems of
the Global South.&lt;/p&gt;
&lt;p&gt;This blog post provides some insight into the questions
above through a brief summary of the results of the study &lt;a class="external-link" href="http://crdi.org/ar/ev-139395-201-1-DO_TOPIC.html"&gt;Free Access to Law—Is
it Here to Stay?&lt;/a&gt; This global comparative study was carried out by LexUM (Canada)
and the South African Legal Institute in partnership with the Centre for
Internet and Society. The project set out to begin providing answers to some of
these critical questions around the impacts and sustainability of the FALM. It
was initially hypothesized in the study that the sustainability of a FAL
initiative rests upon a particular string of contingent factors. To begin, a particular
condition would incentivize the creation of the FAL initiative — more often than
not meeting the unmet needs of those requiring access to legal information.&amp;nbsp; Next, if the FAL initiative is able to provide
the service within a favourable context, it was suspected that it would produce
favourable outcomes for both users and society at large. In turn, if the FAL
initiative was able to provide benefits to users, it was theorized that these benefits
would then stimulate reinvestment into the FAL initiative — forming a positive
and sustainable feedback loop.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As the &lt;a class="external-link" href="http://www.informationjuridique.ca/docs/a2k/Best%20Practices%20Hand%20Book_03sept11.pdf"&gt;Good Practices Handbook&lt;/a&gt; highlights, the research
hypothesis provided an accurate reading of what the sustainability chain of a
FAL initiative might look like in&lt;em&gt; practice&lt;/em&gt;.
If unable to keep up with the evolving information requirements of their users,
this study suggests that FAL initiatives run the risk of FAL becoming outdated
and even outperformed by either government-based or private sector
initiatives.&amp;nbsp; This is why FAL initiatives
must continue to be innovative and find new ways to meet users’ needs. Approaches take my include keeping their
collections up to date, fine-tuning their services or even reinventing
themselves through the provision of value-added services. Gathered from the
experiences of the eleven countries across Africa and Asia examined in this
study, the following is a brief summary of the nine “Good Practices” that emerging
FAL initiatives can consider:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;The FAL initiative
should establish clear objectives&lt;/strong&gt;: Before doing anything, the FAL initiative
should decide what exactly it’s setting out to do…critical components such as
content selection, targeted audience, expected reach, search functionalities
and other website features help determine priorities and evaluate capacity to
achieve these objectives.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;How to be small and
do big things&lt;/strong&gt;: Most of the FAL initiatives studied as part of this project
were formed of small teams (often less than five individuals). Initially, this may
appear to pose a risk for sustainability. However, we saw a number of ways in
which small teams have proven to be innovative, flexible, and able to thrive in
environments of scarcity. However, as much as small teams can be seen as a
source of innovation, they may also pose a risk in the medium to long-term.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;FAL initiatives
require expertise in both IT and legal information&lt;/strong&gt;: Legal information management
experts understand how the law is applied, how different texts and parts of
texts speak to one another, and how these documents are used. IT experts can
imagine a variety of ways to address these needs. If both forms of expertise is
not available within the team of a FAL initiative, institutional partnerships
provide promising sites for collaborative support. For example, the FALM
constitutes a rich source of expertise and has proven to be a site of
collaboration between established and emerging FAL initiatives. Further,
universities have proven to be a significant source of human and financial
resources for several FAL initiatives.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;FAL initiatives
should look to where they are headed (but not too far ahead)&lt;/strong&gt;: Because the
purpose of a FAL initiative is to provide free online access to the law, it
must secure access to this data for regular publication. How will legal
information be received and organized by the initiative? In what format will it
be published in? Early on, FAL initiatives need to develop both internal and
external workflow processes to ensure that the initiative is able to provide regular
access to updated information. Furthermore, an important finding of the study
suggests that context plays a much larger role in a project’s sustainability. Consideration
should be given to a country’s ICT infrastructure, the transparency of a
government and their access to information regimes, and the nature of the legal
information market when designing the workflows of an FAL initiative.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;FAL initiatives
should work with the ICT infrastructure in place&lt;/strong&gt;: The quality and
consistency of internet access varies across countries in the Global South. FAL
initiatives should remain aware of how stakeholders and users are accessing the
internet and develop their service accordingly. Considering the often
intermittent nature of internet connectivity in the Global South, providing
users with offline access to databases is a practical alternative.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;FAL initiatives
should use Free and Open Source Software&lt;/strong&gt;: FAL initiatives should maximise
their use of FLOSS. All FAL initiatives use FLOSS to some extent and without
these flexible and cost-effective alternatives, it would be safe to infer that
the FALM would have grown as quickly as it has.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;FAL initiatives
should be sensitive to culture&lt;/strong&gt;: FAL initiatives rely on stakeholders and
communities of users. Staying mindful of the professional and organizational
cultures within a country may provide the initiative with a source of community
support which may become a sustainability strategy.&amp;nbsp; Further, integrated or parallel social
networking platforms can play an essential role in community-building around
the FAL initiatives and can also serve as another source of content in
resource-scarce environments.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Find your users,
match their needs&lt;/strong&gt;: Project goals and appropriate strategies should be based
on an in-depth understanding of the needs of those using the FAL initiative. As
the sustainability chain suggests, when FAL initiatives produce positive
outputs and outcomes, stakeholders will reinvest in the initiative to ensure
its sustainability. If a user’s needs are effectively met by an FAL initiative,
this group can provide either the resources or impetus for its continued
success. Identifying who your users are and staying aware of their needs is a
good way to secure reinvestment into the project.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;FAL initiatives
should diversify funding sources&lt;/strong&gt;: This may be easier said than
done — reinvestment can be the most challenging aspect of sustaining a FAL
initiative. Early on, initiatives that receive donor-based funding benefit
substantially upon investment. However, these initiatives are put at
significant risk once initial seed funding has been depleted. Similarly, FAL
initiatives that partnerships with other during their start up phase face
similar fates as securing long-term service delivery can become a challenge.
Possible funding sources included throughout the study include, among others:
government, international development agencies or NGOs, the judiciary, law
societies and the sale of value-added services.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to these good practices, this study has emphasized
the role the that the FALM has played in helping redefine online legal information as a public good. Each
of the case studies demonstrates in a unique way the value openness plays in a
legal information ecosystem, and how a robust digital legal information commons can be of
benefit to users. Traditionally, the legal information market has been dominated by a select
number of commercial players. In response, the FALM has created an important
transnational space within which conversations around the provision of and
access to legal information as a political right &lt;em&gt;rather&lt;/em&gt; than a commodity to be bought and sold
can take place. Encouragingly, governments in the Global South are catching and FAL initiatives from the South have proven to be immense sources of innovation in their own right. In Indonesia, for example, FAL initiatives have laid the
groundwork for emerging government initiatives that are now&amp;nbsp; prioritizing the provision of free, online access to legal and other government information. Today, I believe that we are witnessing an important paradigm
shift as governments are beginning to recognize that “access” to legal information is a
right to be held by the public.&lt;/p&gt;
&lt;p&gt;Despite such headway, it is needless to say that FAL initiatives in the Global South
continue to face immense sustainability challenges. However, it is hoped that this
study can provide some practical insights for emerging initiatives
and partnerships. However, as more FAL initiatives begin entering into the next
stage of maturity and growth, it is more important than ever that they are
able to adapt to adverse environmental changes and form
long-lasting partnerships with information sources within government. Most
importantly, FAL initiatives must remain dynamic and responsive to users’
needs. To do so, they must be able to tailor and expand their services, offerings
and user-base. To secure their sustainability and relevance in the long term, they must also be continuously strengthening their ties and maintain open communication flows with
users. &amp;nbsp;If FAL initiatives are able to successfully make the
transition from being supply side initiatives to becoming demand driven services,
the FALM will be well-positioned for another decade of sustainable growth.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Download the collection below:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/publications/Links%20in%20the%20Chain%20-%20Volume%20I%20issue%20I.pdf" class="internal-link" title="Links in The Chain  - Volume I"&gt;&lt;img src="https://cis-india.org/openness/pdf.png" title="Know your Users, Match their Needs!" height="16" width="16" alt="" class="subMenuTitle" /&gt;&lt;/a&gt;&lt;a href="https://cis-india.org/openness/good-practices.pdf" class="internal-link" title="Good Practices Handbook"&gt;Good Practices
Handbook &lt;/a&gt;(426 kb)&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/publications/Links%20in%20the%20Chain%20-%20Volume%20I%20issue%20I.pdf" class="internal-link" title="Links in The Chain  - Volume I"&gt;&lt;img src="https://cis-india.org/openness/pdf.png" title="Know your Users, Match their Needs!" height="16" width="16" alt="" class="subMenuTitle" /&gt;&lt;/a&gt;&lt;a href="https://cis-india.org/openness/environmental-scan.pdf" class="internal-link" title="Environmental Scan Report"&gt;Environmental Scan Report&lt;/a&gt; (860 kb)&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/publications/Links%20in%20the%20Chain%20-%20Volume%20I%20issue%20I.pdf" class="internal-link" title="Links in The Chain  - Volume I"&gt;&lt;img src="https://cis-india.org/openness/pdf.png" title="Know your Users, Match their Needs!" height="16" width="16" alt="" class="subMenuTitle" /&gt;&lt;/a&gt;&lt;a href="https://cis-india.org/openness/local-researchers-methodology-guide.pdf" class="internal-link" title="Local Researcher's Methodology Guide"&gt;Local Researcher's Methodology Guide&lt;/a&gt; (1225 kb)&lt;/p&gt;
&lt;p&gt;The full collection of case studies and the Good Practices
Handbook was originally published on the &lt;a class="external-link" href="http://www.informationjuridique.ca/cij/acces-libre-au-droit/resultats"&gt;Project Website&lt;/a&gt;. The Centre for Internet and Society oversaw the following case studies: &lt;a class="external-link" href="http://www.informationjuridique.ca/docs/a2k/resultats/indiafinaljul11.pdf"&gt;India&lt;/a&gt;, &lt;a class="external-link" href="http://www.informationjuridique.ca/docs/a2k/resultats/hongkongfinaljul11.pdf"&gt;Hong Kong&lt;/a&gt;, &lt;a class="external-link" href="http://www.informationjuridique.ca/docs/a2k/resultats/indonesiafinaljul11.pdf"&gt;Indonesia&lt;/a&gt; and &lt;a class="external-link" href="http://www.informationjuridique.ca/docs/a2k/resultats/Berne_Final_2011_July.pdf"&gt;Philippines&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/know-your-users'&gt;https://cis-india.org/openness/blog-old/know-your-users&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2012-02-27T15:06:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/e-accessibility-kit-in-russian">
    <title>e-Accessibility Policy Handbook for Persons with Disabilities (Russian Version)</title>
    <link>https://cis-india.org/accessibility/e-accessibility-kit-in-russian</link>
    <description>
        &lt;b&gt;The e-Accessibility Policy Handbook for Persons with Disabilities is based upon the online ITU-G3ict e-Accessibility Policy Toolkit for Persons with Disabilities (www.e-accessibilitytoolkit.org) which was released in February 2010. This is the Russian translation of the same.&lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://g3ict.org/resource_center/e-Accessibility%20Policy%20Handbook"&gt;Toolkit&lt;/a&gt; and its companion handbook have contributions from more than 60 experts around the world on ICT accessibility and is a most valuable addition to policy makers and regulators, advocacy and research organisations and persons with disabilities on the implementation of the ICT dispositions of the CRPD.&lt;/p&gt;
&lt;p&gt;The handbook is a joint publication of ITU, G3ict and the Centre for Internet and Society, in cooperation with The Hans Foun­da­tion. The book is com­piled and edit­ed by Nir­mi­ta Narasimhan. Preface by Dr. Hamadoun I. Toure, Sec­re­tary-​Gen­er­al, In­ter­na­tion­al Telecom­mu­ni­ca­tion Union. Introduction by Dr. Sami Al-​Basheer, Di­rec­tor, ITU-D. Foreword by Axel Leblois, Ex­ec­u­tive Di­rec­tor, G3ict.&lt;/p&gt;
&lt;p&gt;UNIC Moscow (United Nations Information Centre - Moscow) has translated the English version of the kit to Russian. For more information on the translation initiative by UNIC Moscow,&lt;a class="external-link" href="http://www.unic.ru/news_inf/viewer.php?uid=164"&gt; click here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Download the Russian version &lt;a href="https://cis-india.org/accessibility/e-accessibility-russian-handbook.pdf" class="internal-link" title="e-Accessibility Policy Handbook (Russian Version)"&gt;here&lt;/a&gt;&amp;nbsp;(PDF, 1045 kb)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/e-accessibility-kit-in-russian'&gt;https://cis-india.org/accessibility/e-accessibility-kit-in-russian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Books</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2012-04-26T10:04:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking">
    <title>Analysis of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;In this blog post, Pranesh Prakash briefly analyses the DIT's response to an RTI request on website blocking alongside the most recent edition of Google's Transparency Report, and what it tells us about the online censorship regime in India.&lt;/b&gt;
        
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;What the DIT's Response Tells Us, and What It Doesn't&lt;/h2&gt;
&lt;p&gt;We at the Centre for Internet and Society had sent in a right to information request to the Department of Information Technology (DIT) asking for more information about website blocking in India. The &lt;a href="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="internal-link" title="Text of DIT's Response to Second RTI on Website Blocking"&gt;response we got from the DIT&lt;/a&gt; was illuminating in many ways. The following are the noteworthy points, in brief:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Six government officials, and one politician have so far made requests for 'disabling access' to certain online content under s.69A of the Information Technology (IT) Act.&lt;/li&gt;

    &lt;li&gt;68 individual items have been requested to be blocked, those being 64 websites (domain-level blocking), 1 sub-domain, and 3 specific web pages. Seemingly, none of these requests have been accepted.&lt;/li&gt;

    &lt;li&gt;The data provided by the government seemingly conflicts with the data released by the likes of Google (via its Transparency Report).&lt;/li&gt;

    &lt;li&gt;India's law enforcement agencies are circumventing the IT Act, the Indian Penal Code (IPC), and ultimately the Constitution, by not following proper procedure for removal of online content.&lt;/li&gt;

    &lt;li&gt;Either the DIT is not providing us all the relevant information on blocking, or is not following the law.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="conflicting-data-on-censorship-requests"&gt;Conflicting Data on Censorship Requests&lt;/h2&gt;
&lt;p&gt;The latest &lt;a href="http://www.google.com/transparencyreport/governmentrequests/IN/"&gt;Google Transparency Report&lt;/a&gt;, released on October 25, 2011, shows that there were 68 written requests (imaginably taking the form of forceful requests/orders) from Indian law enforcement agencies for removal of 358 items from Google's various. If you take the figures since January 2010, it adds up to over 765.&lt;/p&gt;
&lt;p&gt;However, the official government statistics show only eight separate requests having been made to the&amp;nbsp; DIT (which, under the IT Act, is the only authority that can order the blocking of online content), adding up to a total of 64 websites (domain-level), 1 sub-domain, and 3 specific web pages. Of these only 3 are for Google's services (2 for Blogger, and 1 for YouTube).&lt;/p&gt;
&lt;p&gt;If classified according to presumable reason for seeking of the block, that would be 61 domains hosting adult content; 1 domain (tamil.net.in), 1 sub-domain (ulaginazhagiyamuthalpenn.blogspot.com), and 2 specific pages (video of a speech by Bal Thackeray on YouTube and Wikipedia page for Sukhbir Singh Badal) for political content; 1 for religious content (a blog post titled "Insults against Islam" in Malay); and 1 domain hosting online gambling (betfair.com). It is unclear for why one of the requests was made (topix.net).&lt;sup&gt;&lt;a id="fnref1" class="footnoteRef" name="fnref1" href="#fn1"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="content-removal-vs.-content-blocking"&gt;Content Removal vs. Content Blocking&lt;/h2&gt;
&lt;p&gt;Section 69A of the IT Act provides the Central Government the power to "direct any agency of the Government or intermediary to block for access by the public or cause to be blocked for access by the public any information generated, transmitted, received, stored or hosted in any computer resource". The only person through whom this power can be exercised is the 'Designated Officer' (currently Dr. Gulshan Rai of the DIT), who in turn has to follow the procedure laid down in the rules drafted under s.69A ("Information Technology (Procedure and Safeguard for Blocking for Access of Information by Public) Rules, 2009", the 'Blocking Rules').&lt;/p&gt;
&lt;p&gt;Because of this, we see everyone from the Secretary of the Public Law and Order Department of Tamil Nadu to the Joint Commissioner of Police of Mumbai and the State President of the Bharatiya Janata Minority Morcha approaching the Designated Officer for blocking of websites.&lt;/p&gt;
&lt;p&gt;However, as the data from Google shows, there are many times more requests being sent to remove content. The only explanation for this is that an order to 'block for access... or cause to be blocked for access by the public' is taken to be different from an order for removal of content. Nothing in the IT Act, nor in the Blocking Rules actually address this issue.&lt;sup&gt;&lt;a id="fnref2" class="footnoteRef" name="fnref2" href="#fn2"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Thus, there is a possibility that the forcible removal of content is treated separately from blocking of content. That would mean that while blocking is regulated by the IT Act, forcible removal of content is not. Thus, it would seem that forcible removal of online content is happening without clear regulation or limits.&lt;sup&gt;&lt;a id="fnref3" class="footnoteRef" name="fnref3" href="#fn3"&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="role-of-the-indian-penal-code-and-code-of-criminal-procedure"&gt;Role of the Indian Penal Code and Code of Criminal Procedure&lt;/h2&gt;
&lt;p&gt;There are existing provisions in the Indian Penal Code that provide the government the power to censor book, pamphlets, and other material on varied grounds, including obscenity, causing of enmity between communities, etc. The police is provided powers to enforce such governmental orders. Section 95 of the Code of Criminal Procedure allows the State Government to declare (through an official notification) certain publications which seem to violate the Indian Penal Code as 'forfeited to the Government' and to issue search warrants for the same. After this the police can enforce that notification.&lt;/p&gt;
&lt;p&gt;It is clear that this is not the case for any of the content removal requests that were sent to Google.&lt;/p&gt;
&lt;h2 id="police-are-defeating-the-constitution-and-the-it-act"&gt;Police Are Defeating the Constitution and the IT Act&lt;/h2&gt;
&lt;p&gt;Therefore, it would seem that law enforcement agencies are operating outside the bounds set up under the Indian Penal Code, the Code of Criminal Procedure, as also the Information Technology Act, when they send requests for removal of content to companies like Google. While a company might comply with it because it appears to them to violate their own terms of service (which generally include a wide clause about content being in accordance with all local laws), community guidelines, etc., it would appear that it is not required under the law to do so if the order itself is not legal.&lt;/p&gt;
&lt;p&gt;However, anecdotal evidence has it that most companies comply with such 'requests' even when they are not under any legal obligation to do so.&lt;/p&gt;
&lt;p&gt;This way the intention of Parliament in enacting s.69A of the IT Act—to regulate government censorship of the Internet and bring it within the bounds laid down in the Constitution—is defeated.&lt;/p&gt;
&lt;h2 id="dit-either-evasive-or-not-following-rules"&gt;DIT Either Evasive or Not Following Rules&lt;/h2&gt;
&lt;p&gt;The DIT did not provide answers on:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Whether any block ordered by the DIT has ever been revoked&lt;/li&gt;

    &lt;li&gt;On what basis DIT decides which intermediary (web host, ISP, etc.) to send the order of blocking to&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It also provided the minutes for only one meeting&lt;sup&gt;&lt;a id="fnref4" class="footnoteRef" name="fnref4" href="#fn4"&gt;4&lt;/a&gt;&lt;/sup&gt; of the committee that decides whether to carry out a block, when we had requested for minutes of all the meetings it has ever held. That committee (the Committee for Examination of Requests, constituted under Rule 8(4) of the Blocking Rules) has to consider every single item in every single request forwarded to the Designated Officer, and 68 items were sent to the Designated Officer in 6 requests. Quite clearly something doesn't add up. Either the Committee is not following the Blocking Rules or the DIT is not providing a full reply under the RTI Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
      &lt;li id="fn1"&gt;
&lt;p&gt;A request was made to block http://www.topix.net, by the 'Commmissioner, Maharashtra State, Colaba, Mumbai—400001', presumably the Commissioner of State Intelligence Department of Maharashtra, whose office is located in Colaba. &lt;a title="Jump back to footnote 1" class="footnoteBackLink" href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn2"&gt;
&lt;p&gt;However, the Blocking Rules require the person or the hosting intermediary being contacted for a response. This provides the person/intermediary the opportunity to remove the content voluntarily or to oppose the request for blocking.&lt;/p&gt;
&lt;p&gt;"Rule 8. Examination of request: (1) On receipt of request under rule 6, the Designated Officer shall make all reasonable efforts to identify the person or intermediary who has hosted the information or part thereof as well as the computer resource on which such information or part thereof is being hosted and where he is able to identify such person or intermediary and the computer resource hosting the information or part thereof which have been requested to be blocked for public access, he shall issue a notice by way of letters or fax or e-mail signed with electronic signatures to such person or intermediary in control of such computer resource to appear and submit their reply and clarifications if any, before the committee referred to in rule 7, at a specified date and time, which shall not be less than forty-eight hours from the time of receipt of such notice by such person or intermediary." &lt;a title="Jump back to footnote 2" class="footnoteBackLink" href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn3"&gt;
&lt;p&gt;While it is possible to imagine that the Indian Penal Code and the Code of Criminal Procedure lay down limits, it is clear from the Google Transparency Report that the requests from removal are not coming based only on court orders, but from the executive and the police. The police have no powers under the IPC or the CrPC to request removal of content without either a public notification issued by the State Government or a court order. &lt;a title="Jump back to footnote 3" class="footnoteBackLink" href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn4"&gt;
&lt;p&gt;The minutes of the meeting held on August 24, 2010, on the request for blocking of www.betfair.com were sent as 'Annexure III' of the DIT response.&amp;nbsp; This request was not granted.&amp;nbsp; &lt;a title="Jump back to footnote 4" class="footnoteBackLink" href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-12-02T09:26:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/dnbook">
    <title>Digital AlterNatives with a Cause?</title>
    <link>https://cis-india.org/digital-natives/blog/dnbook</link>
    <description>
        &lt;b&gt;Hivos and the Centre for Internet and Society have consolidated their three year knowledge inquiry into the field of youth, technology and change in a four book collective “Digital AlterNatives with a cause?”. This collaboratively produced collective, edited by Nishant Shah and Fieke Jansen, asks critical and pertinent questions about theory and practice around 'digital revolutions' in a post MENA (Middle East - North Africa) world. It works with multiple vocabularies and frameworks and produces dialogues and conversations between digital natives, academic and research scholars, practitioners, development agencies and corporate structures to examine the nature and practice of digital natives in emerging contexts from the Global South. &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I&lt;/strong&gt;&lt;strong&gt;ntroduction&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the 21&lt;sup&gt;st&lt;/sup&gt;
Century, we have witnessed the simultaneous growth of internet and digital
technologies on the one hand, and political protests and mobilisation on the
other. Processes of interpersonal relationships, social communication, economic
expansion, political protocols and governmental mediation are undergoing a
significant transition, across in the world, in developed and emerging
Information and Knowledge societies.&lt;/p&gt;
&lt;p&gt;The young
are often seen as forerunners of these changes because of the pervasive and
persistent presence of digital and online technologies in their lives. The “
Digital Natives with a Cause?” is a research inquiry that uncovers the ways in
which young people in emerging ICT contexts make strategic use of technologies
to bring about change in their immediate environments. Ranging from personal
stories of transformation to efforts at collective change, it aims to identify
knowledge gaps that existing scholarship, practice and popular discourse around
an increasing usage, adoption and integration of digital technologies in
processes of social and political change.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Methodology&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In 2010-11,
three workshops in Taiwan, South Africa and Chile, brought together around 80
people who identified themselves as Digital Natives from Asia, Africa and Latin
America, to explore certain key questions that could provide new insight into
Digital Natives research, policy and practice. The workshops were accompanied
by a ‘Thinkathon’ – a multi-stakeholder summit that initiated conversations
between Digital Natives, academic researchers, scholars, practitioners,
educators, policy makers and corporate representatives to share learnings on
new questions: Is one born digital or does one become a Digital Native? How do
we understand our relationship with the idea of a Digital Native? How do
Digital Natives redefine ‘change’ and how do they see themselves implementing
it? What is the role that technologies play in defining civic action and social
movements? &amp;nbsp;What are the relationships
that these technology based identities and practices have with existing social
movements and political legacies? How do we build new frameworks of sustainable
citizen action outside of institutionalisation?&lt;/p&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;Rationale&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the
knowledge gaps that this book tries to address is the lack of digital natives’
voices in the discourse around them. In the occasions that they are a part of
the discourse, they are generally represented by other actors who define the
frameworks and decide the issues which are important. Hence, more often than
not, most books around digital natives concentrate on similar sounding areas
and topics, which might not always resonate with the concerns that digital
natives and other stake-holders might be engaged with in their material and
discursive practice. The methodology of the workshops was designed keeping this
in mind. Instead of asking the digital natives to give their opinion or recount
a story about what we felt was important, we began by listening to their
articulations about what was at stake for them as e-agents of change. As a
result, the usual topics like piracy, privacy, cyber-bullying, sexting etc.
which automatically map digital natives discourse, are conspicuously absent
from this book. Their absence is not deliberate, but more symptomatic of how
these themes that we presumed as important were not of immediate concerns to
most of the participants in the workshop who are contributing to the book&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;Structure&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The
conversations, research inquiries, reflections, discussions, interviews, and
art practices are consolidated in this four part book which deviates from the
mainstream imagination of the young people involved in processes of change. The
alternative positions, defined by geo-politics, gender, sexuality, class,
education, language, etc. find articulations from people who have been engaged
in the practice and discourse of technology mediated change. Each part
concentrates on one particular theme that helps bring coherence to a wide
spectrum of style and content.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Book 1: To Be: Digital AlterNatives with a Cause? Download &lt;a href="https://cis-india.org/digital-natives/dnbook1/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;The first
part, &lt;em&gt;To Be&lt;/em&gt;, looks at the questions
of digital native identities. Are digital natives the same everywhere? What
does it mean to call a certain population ‘Digital Natives”? Can we also look
at people who are on the fringes – Digital Outcasts, for example? Is it
possible to imagine technology-change relationships not only through questions
of access and usage but also through personal investments and transformations?
The contributions help chart the history, explain the contemporary and give ideas
about what the future of technology mediated identities is going to be.&lt;/p&gt;
&lt;strong&gt;Book 2: To Think: Digital AlterNatives with a Cause? Download &lt;a href="https://cis-india.org/digital-natives/dnbook2/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;In the
second section, &lt;em&gt;To Think,&lt;/em&gt; the
contributors engage with new frameworks of understanding the processes,
logistics, politics and mechanics of digital natives and causes. Giving fresh
perspectives which draw from digital aesthetics, digital natives’ everyday
practices, and their own research into the design and mechanics of technology
mediated change, the contributors help us re-think the concepts, processes and
structures that we have taken for granted. They also nuance the ways in which
new frameworks to think about youth, technology and change can be evolved and
how they provide new ways of sustaining digital natives and their causes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Book 3: To Act: Digital AlterNatives with a Cause? Download &lt;a href="https://cis-india.org/digital-natives/dnbook3/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;To Act&lt;/em&gt; is the third part that concentrates on stories
from the ground. While it is important to conceptually engage with digital
natives, it is also, necessary to connect it with the real life practices that
are reshaping the world. Case-studies, reflections and experiences of people
engaged in processes of change, provide a rich empirical data set which is
further analysed to look at what it means to be a digital native in emerging
information and technology contexts.&lt;/p&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;Book 4: To Connect : Digital AlterNatives with a Cause? Download &lt;a href="https://cis-india.org/digital-natives/dnbook4/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The last
section, &lt;em&gt;To Connect&lt;/em&gt;, recognises the
fact that digital natives do not operate in vacuum. It might be valuable to
maintain the distinction between digital natives and immigrants, but this
distinction does not mean that there are no relationships between them as
actors of change. The section focuses on the digital native ecosystem to look
at the complex assemblage of relationships that support and are amplified by
these new processes of technologised change.&lt;/p&gt;
&lt;p&gt;We see this
book as entering into a dialogue with the growing discourse and practice in the
field of youth, technology and change. The ambition is to look at the digital
(alter)natives as located in the Global South and the potentials for social
change and political participation that is embedded in their interactions
through and with digital and internet technologies. We hope that the book
furthers the idea of a context-based digital native identity and practice,
which challenges the otherwise universalist understanding that seems to be the
popular operative right now. We see this as the beginning of a knowledge
inquiry, rather than an end, and hope that the contributions in the book will
incite new discussions, invoke cross-sectorial and disciplinary debates, and
consolidate knowledges about digital (alter)natives and how they work in the
present to change our futures&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a class="external-link" href="https://www.surveymonkey.com/MyAccount_Login.aspx"&gt;Click here&lt;/a&gt; to order your copy. We invite readers to contribute reviews of an essay they found particularly interesting. Contact us: nishant@cis-india.org and fjansen@hivos.nl if you want more information, resources, or dialogues&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Nishant
Shah&lt;/p&gt;
&lt;p&gt;Fieke
Jansen&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;For media coverage and book reviews,&lt;/strong&gt; &lt;a href="https://cis-india.org/digital-natives/media-coverage" class="external-link"&gt;read here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/dnbook'&gt;https://cis-india.org/digital-natives/blog/dnbook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Campaign</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Agency</dc:subject>
    
    
        <dc:subject>Blank Noise Project</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Beyond the Digital</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Books</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-04-10T09:22:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/ogd-draft-v2-call-for-comments">
    <title>Open Government Data in India (v2)</title>
    <link>https://cis-india.org/openness/blog-old/ogd-draft-v2-call-for-comments</link>
    <description>
        &lt;b&gt;The first draft of the second version of the Open Government Data Report is now online. Nisha Thompson worked on updating the first version of the report. This updated version of the report on open government data in India includes additional case studies as well as a potential policy (National Data Sharing and Accessibility Policy) that would create a central government data portal. The report was distributed for peer review and public feedback.&lt;/b&gt;
        &lt;p&gt;There are additional government case studies regarding e-governance and how they are changing the way data is collected and distributed. The report also looks at the issues around open data at the city and panchayat level and profiles new projects that are working to fill that void. It also includes a deeper account account of the global perspective on open government data and how India's experience with open data will be different from what the west is doing.   Please do let us know what you think are deficiencies in the report, corrections that should be made, or even just general comments.  Drop in a word even if you just find it useful.  Please do write in to pranesh[at]cis-india.org by Friday, September 2, 2011.  &lt;a href="https://cis-india.org/openness/publications/ogd-draft-v2/" class="external-link"&gt;Download the [draft report]&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/ogd-draft-v2-call-for-comments'&gt;https://cis-india.org/openness/blog-old/ogd-draft-v2-call-for-comments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Call for Comments</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>e-governance</dc:subject>
    

   <dc:date>2012-12-14T10:25:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/workshop">
    <title>Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum Workshop: Call for Participation</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/workshop</link>
    <description>
        &lt;b&gt;Deadline for submission: 26th July 2011-06-08;
When: 19th - 22nd August, 2011;
Where: Centre for Environmental Planning and Technology (CEPT) University, Ahmedabad;
Organised by: Centre for Internet and Society, Bangalore and CEPT University, Ahmedabad.
Please Note: Travel support is only available for domestic travel within India.&lt;/b&gt;
        
&lt;p&gt;LOCATING INTERNETS is an innovative, multi-disciplinary, workshop that engages with some of the most crucial debates around Internet and Society within academic scholarship, discourse and practice in India. It explores Where, When, How and What has changed with the emergence of Internet and Digital Technologies in the country. The Internet is not a singular monolithic entity but is articulated in various forms – sometimes materially, through accessing the web; at others, through our experiences; and yet others through imaginations of policy and law. Internets have become a part of our everyday practice, from museums and archives, to school and university programmes, living rooms and public spaces, relationships and our bodily lived realities. It becomes necessary to reconfigure our existing concepts, frameworks and ideas to make sense of the rapidly digitising world around us. The Internet is no longer contained in niche disciplines or specialised everyday practices. LOCATING INTERNETS invites scholars, teachers, researchers, advanced research students and educationalists from any discipline to learn and discuss how to ask new questions and design innovative curricula in their discipline by introducing concepts and ideas from path-breaking research in India.&lt;/p&gt;
&lt;p&gt;Comprised of training, public lectures, open discussion spaces, and hands-on curriculum building exercises, this workshop will introduce the participants to contemporary debates, help them articulate concerns and problems from their own research and practice, and build knowledge clusters to develop innovative and open curricula which can be implemented in interdisciplinary undergraduate spaces in the country. It showcases the research outputs produced by the Centre for Internet and Society’s Researchers @ Work Programme, and brings together nine researchers to talk about alternative histories, processes, and bodies of the Internets, and how they can be integrated into mainstream pedagogic practices and teaching environments.&lt;/p&gt;
&lt;h3&gt;Knowledge Clusters for the Workshop&lt;/h3&gt;
&lt;p&gt;LOCATING INTERNETS is designed innovatively to accommodate for various intellectual and practice based needs of the participants. While the aim is to introduce the participants to a wide interdisciplinary range of scholarship, we also hope to address particular disciplinary and scholarly concerns of the participants. The workshop is further divided into three knowledge clusters which help the participants to focus their energies and ideas in the course of the four days.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Bridging the Gap&lt;/strong&gt;: This workshop seeks to break away from the utopian public discourse of the Internets as a-historical and completely dis-attached from existing technology ecologies in the country. This knowledge cluster intends to produce frameworks that help us contextualize the contemporary internet policy, discourse and practice within larger geo-political and socio-historical flows and continuities in Modern India. The first cluster chartsdifferent pre-histories of the Internets, mapping the continuities and ruptures through philosophy of techno-science, archiving practices, and electronifcation of governments,to develop new technology-society perspectives.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Paradigms of Practice&lt;/strong&gt;:One of the biggest concerns about Internet studies in India and other similar developed contexts is the object oriented approach that looks largely at specific usages, access, infrastructure, etc. However, it is necessary to understand that the Internet is not merely a tool or a gadget. The growth of Internets produces systemic changes at the level of process and thought. The technologies often get appropriated for governance both by the state and the civil society, producing new processes and dissonances which need to be charted. The second cluster looks at certain contemporary processes that the digital and Internet technologies change drastically in order to recalibrate the relationship between the state, the market and the citizen.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Feet on the Ground&lt;/strong&gt;: The third cluster looks at contemporary practices of the Internet to understand the recent histories of movements, activism and cultural practices online. It offers an innovative way of understanding the physical objects and bodies that undergo dramatic transitions as digital technologies become pervasive, persuasive and ubiquitous. It draws upon historical discourse, everyday practices and cultural performances to form new ways of formulating and articulating the shapes and forms of social and cultural structures.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Workshop Outcomes&lt;/h3&gt;
&lt;p&gt;The participants are expected to engage with issue of Internet and it various systemic processes through their own disciplinary interests. Apart from lectures and orientation sessions, the participants will actively work on their own project ideas during the period in groups and will be guided by experts. The final outcome of the workshops would be curriculum for undergraduate and graduate teaching space of various disciplines in the country.&lt;/p&gt;
&lt;h3&gt;Participation Guidelines&lt;/h3&gt;
&lt;p&gt;LOCATING INTERNETS is now accepting submissions from interested participants in the following format:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Name:&lt;/li&gt;&lt;li&gt;Institutional affiliation and title:&lt;/li&gt;&lt;li&gt;Address:&lt;/li&gt;&lt;li&gt;Email address:&lt;/li&gt;&lt;li&gt;Phone number:&lt;/li&gt;&lt;li&gt;A brief resume of work experience (max. 350 words)&lt;/li&gt;&lt;li&gt;Statement of interest (max. 350 words)&lt;/li&gt;&lt;li&gt;Key concerns you want to address in the Internet and Society field (max. 350 words)&lt;/li&gt;&lt;li&gt;Identification with one Knowledge-cluster of the workshop and a proposal for integrating it in your research/teaching practice (max. 500 words)&lt;/li&gt;&lt;li&gt;Current interface with technologies in your pedagogic practices (max. 350 words)&lt;/li&gt;&lt;li&gt;Additional information or relevant hyperlinks you might want to add (Max. 10 lines)&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;pre&gt;Notes:&lt;/pre&gt;
&lt;ul&gt;&lt;li&gt;Submissions will be accepted only from participants in India, as attachments in .doc, .docx or .odt formats at &lt;a class="external-link" href="mailto:locatinginternets@cis-india.org"&gt;locatingInternets@cis-india.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Submissions made beyond 26th July 2011 may not be considered for participation. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Submissions will be scrutinized by the organisers and selected participants will be informed by the 30th July 2011, about their participation.&lt;/li&gt;&lt;li&gt;Selected participants will be required to make their own travel arrangements to the workshop. A 2nd A.C. train return fare will be reimbursed to the participants.&amp;nbsp; Shared accommodation and selected meals will be provided at the workshop.&lt;/li&gt;&lt;li&gt;A limited number of air-fare reimbursements will be available to participants in extraordinary circumstances. All travel support is only available for domestic travel in the country.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Chairs&lt;/strong&gt;: Nishant Shah, Director-Research, Centre for Internet and Society Bangalore;&lt;/p&gt;
&lt;p&gt;Pratyush Shankar, Associate Professor &amp;amp; Head of Undergraduate Program, Faculty of Architecture, CEPT University&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Supported by&lt;/strong&gt;: Kusuma Foundation, Hyderabad&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Experts&lt;/strong&gt;:Anja Kovacs, Arun Menon, Asha Achuthan, Ashish Rajadhykasha, Aparna Balachandran, Namita Malhotra, Nithin Manayath, Nithya Vasudevan, Pratyush Shankar, Rochelle Pinto and Zainab Bawa&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/workshop'&gt;https://cis-india.org/research/conferences/conference-blogs/workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Gaming</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>archives</dc:subject>
    
    
        <dc:subject>New Pedagogies</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>IT Cities</dc:subject>
    

   <dc:date>2011-07-21T06:00:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/open-government-data-study">
    <title>Open Government Data Study</title>
    <link>https://cis-india.org/openness/blog-old/open-government-data-study</link>
    <description>
        &lt;b&gt;CIS produced a report on the state of open government data in India, looking at policy, infrastructure, and particular case studies, as well as emerging concerns, future strategies and recommendations.  The report is authored by Glover Wright, Pranesh Prakash, Sunil Abraham, and Nishant Shah. We are grateful to the Transparency and Accountability Initiative for providing generous funding for this report.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Cross-posted from the &lt;a class="external-link" href="http://www.transparency-initiative.org/reports/open-government-data-study-india"&gt;Transparency and Accountability Initiative website&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Open Government Data Study: India&lt;/h2&gt;
&lt;p&gt;India provides one of the most fascinating examples of the use of open government data in a developing country context. It has one of the best right to information laws in the world and the government’s approach to open data builds on this legacy of making open data relevant to Indian citizens. An estimated 456 million Indians live on less than $1.25 a day and a key issue for India, and other developing countries, is how open data can be accessible to them.&lt;/p&gt;
&lt;p&gt;This paper reviews the progress being made towards open government data in India. Using case studies, it examines some of the pressing challenges facing the adoption of OGD in India. These include infrastructural problems, privacy concerns and the power imbalances that improved transparency can unwittingly create.&amp;nbsp; It also examines government attitudes towards open data and related policies and reviews the relationships between open government data, the media and civil society.&lt;/p&gt;
&lt;p&gt;The authors argue that the Indian Government’s responsibility should not stop short at just providing information, but also extend to making it available and accessible in a way that facilitates analysis and enhances offline usability – and ultimately makes it accessible to the poorest.&lt;/p&gt;
&lt;p&gt;The paper concludes by suggesting technical and policy strategies to develop, promote, implement and maintain a robust open government data policy in India.&lt;/p&gt;
&lt;p&gt;Download the &lt;a href="https://cis-india.org/openness/publications/open-government.pdf" class="internal-link" title="Open Government Data"&gt;report&lt;/a&gt; [PDF, 1.03 MB]&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/open-government-data-study'&gt;https://cis-india.org/openness/blog-old/open-government-data-study&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2015-09-03T08:08:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rebuttal-dit-press-release-intermediaries">
    <title>Rebuttal of DIT's Misleading Statements on New Internet Rules</title>
    <link>https://cis-india.org/internet-governance/blog/rebuttal-dit-press-release-intermediaries</link>
    <description>
        &lt;b&gt;The press statement issued on May 11 by the Department of Information Technology (DIT) on the furore over the newly-issued rules on 'intermediary due diligence' is misleading and is, in places, plainly false.  We are presenting a point-by-point rebuttal of the DIT's claims.&lt;/b&gt;
        &lt;p&gt;In its &lt;a class="external-link" href="http://pib.nic.in/newsite/erelease.aspx?relid=72066"&gt;press release on Wednesday, May 11, 2011&lt;/a&gt;, the DIT stated:
&lt;blockquote&gt;The
 attention of Government has been drawn to news items in a section of 
media on certain aspects of the Rules notified under Section 79 
pertaining to liability of intermediaries under the Information 
Technology Act, 2000. These items have raised two broad issues. One is 
that words used in Rules for objectionable content are broad and could 
be interpreted subjectively. Secondly, there is an apprehension that the
 Rules enable the Government to regulate content in a highly subjective 
and possibly arbitrary manner. &lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;There are actually more issues than merely "subjective interpretation" and "arbitrary governmental regulation".&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;"&gt;The
 Indian Constitution limits how much the government can regulate 
citizens’ fundamental right to freedom of speech and expression. Any 
measure afoul of the constitution is invalid. &lt;/li&gt;&lt;li style="list-style-type: disc;"&gt;Several
 portions of the rules are beyond the limited powers that Parliament had
 granted the Department of IT to create interpretive rules under the 
Information Technology Act. Parliament directed the Government to merely
 define what “due diligence” requirements an intermediary would have to 
follow in order to claim the qualified protection against liability that
 Section 79 of the Information Technology Act provides; these current 
rules have gone dangerously far beyond that, by framing rules that 
insist that intermediaries, without investigation, has to remove content within 36-hours of  receipt of a 
complaint, keep records of a users' details and provide them to 
law enforcement officials.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Department of Information Technology (DIT), Ministry of 
Communications &amp;amp; IT has clarified that the Intermediaries Guidelines
 Rules, 2011 prescribe that due diligence need to be observed by the 
Intermediaries to enjoy exemption from liability for hosting any third 
party information under Section 79 of the Information Technology Act, 
2000. These due diligence practices are the best practices followed 
internationally by well-known mega corporations operating on the 
Internet. &amp;nbsp;The terms specified in the Rules are in accordance with the 
terms used by most of the Intermediaries as part of their existing 
practices, policies and terms of service which they have published on 
their website.&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;We are not aware of any country that actually goes to the extent of 
deciding what Internet-wide ‘best practices’ are and actually converting
 those ‘best practices’ into law by prescribing a universal terms of 
service that all Internet services, websites, and products should enforce.&lt;/li&gt;&lt;li&gt;The Rules require all intermediaries to include the 
government-prescribed terms in an agreement, no matter what services 
they provide. It is one thing for a company to choose the terms of its 
terms of service agreement, and completely another for the government to
 dictate those terms of service. As long as the terms of service of an 
intermediary are not unlawful or bring up issues of users’ rights (such 
as the right to privacy), there is no reason for the government to jump 
in and dictate what the terms of service should or should not be.&lt;/li&gt;&lt;li&gt;The DIT has not offered any proof to back up its assertion that 'most' 
intermediaries already have such terms. &amp;nbsp;Google, a ‘mega corporation’ 
which is an intermediary, &lt;a class="external-link" href="http://www.google.com/accounts/TOS?hl=en"&gt;does not have such an overarching policy&lt;/a&gt;. &amp;nbsp;Indiatimes, another ‘mega 
corporation’ intermediary, &lt;a class="external-link" href="http://www.indiatimes.com/policyterms/1555176.cms"&gt;does not either&lt;/a&gt;. &amp;nbsp;Just because &lt;a class="external-link" href="http://www.rediff.com/termsofuse.html"&gt;a 
company like Rediff&lt;/a&gt; and &lt;a class="external-link" href="http://us.blizzard.com/en-us/company/legal/wow_tou.html"&gt;
Blizzard's World of Warcraft&lt;/a&gt; have some of those terms does not mean a) that they should have all of those terms, nor that b) everyone else should as well.&lt;br /&gt;&lt;br /&gt;In
 attempting to take different terms of service from different Internet 
services and products—the very fact of which indicate the differing 
needs felt across varying online communities—the Department has put in
 place a one-size-fits-all approach.&amp;nbsp; How can this be possible on the Internet, when we wouldn't regulate the post-office and a book publisher under the same rules of liability for, say, defamatory speech.&lt;/li&gt;&lt;li&gt;There is also a significant difference between the effect of those 
terms of service and that of these Rules.&amp;nbsp; An intermediary-framed terms of service 
suggest that the intermediary &lt;em&gt;may&lt;/em&gt; investigate and boot someone off a service for violation, while the Rules insist that 
the intermediary simply has to mandatorily remove content, keep records of users' details and provide them to law enforcement officials, 
else be subject to crippling legal liability.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;So
 to equate the effect of these Rules to merely following ‘existing 
practices’ is plainly wrong. An intermediary—like the CIS website—should have the freedom to choose not to have terms of service 
agreements. We now don’t.“In case any issue arises concerning the interpretation of the terms 
used by the Intermediary, which is not agreed to by the user or affected
 person, the same can only be adjudicated by a Court of Law. The 
Government or any of its agencies have no power to intervene or even 
interpret. DIT has reiterated that there is no intention of the 
Government to acquire regulatory jurisdiction over content under these 
Rules. It has categorically said that these rules do not provide for any
 regulation or control of content by the Government.”&lt;/p&gt;
&lt;p&gt;The
 Rules are based on the presumption that all complaints (and resultant 
mandatory taking down of the content) are correct, and that the 
incorrectness of the take-downs can be disputed in court. &amp;nbsp;Why not just 
invert that, and presume that all complaints need to be proven first, and the correctness of the complaints (instead of the take-downs) be disputed in court? &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Indeed,
 the courts have insisted that presumption of validity is the only 
constitutional way of dealing with speech. (See, for instance, &lt;em&gt;Karthikeyan R. v. Union 
of India&lt;/em&gt;, a 2010 Madras High Court judgment.)&lt;/p&gt;
&lt;p&gt;Further,
 only constitutional courts (namely High Courts and the Supreme Court) 
can go into the question of the validity of a law. &amp;nbsp;Other courts have to
 apply the law, even if it the judge believes it is constitutionally 
invalid. &amp;nbsp;So, most courts will be forced to apply this law of highly 
questionable constitutionality until a High Court or the Supreme Court 
strikes it down.&lt;/p&gt;
&lt;p&gt;What
 the Department has in fact done is to explicitly open up the floodgates
 for increased liability claims and litigation - which runs exactly 
counter to the purpose behind the amendment of Section 79 by Parliament 
in 2008.&lt;/p&gt;
&lt;blockquote&gt;“The
 Government adopted a very transparent process for formulation of the 
Rules under the Information Technology Act. The draft Rules were 
published on the Department of Information Technology website for 
comments and were widely covered by the media. None of the Industry 
Associations and other stakeholders objected to the formulation which is
 now being cited in some section of media.”&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;This is a blatant lie.&lt;/p&gt;
&lt;p&gt;Civil
 society voices, including &lt;a href="https://cis-india.org/internet-governance/blog/2011/02/25/intermediary-due-diligence" class="external-link"&gt;CIS&lt;/a&gt;, &lt;a class="external-link" href="http://www.softwarefreedom.in/index.php?option=com_idoblog&amp;amp;task=viewpost&amp;amp;id=86&amp;amp;Itemid=70"&gt;Software Freedom Law Centre&lt;/a&gt;, and 
individual experts (such as the lawyer and published author &lt;a class="external-link" href="http://www.iltb.net/2011/02/draft-rules-on-intermediary-liability-released-by-the-ministry-of-it/"&gt;Apar Gupta&lt;/a&gt;) 
sent in comments. &amp;nbsp;Companies &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748704681904576314652996232860.html?mod=WSJINDIA_hps_LEFTTopWhatNews"&gt;such as Google&lt;/a&gt;, &lt;a class="external-link" href="http://e2enetworks.com/2011/05/13/e2e-networks-response-to-draft-rules-for-intermediary-guidelines/"&gt;E2E Networks&lt;/a&gt;, and others had apparently 
raised concerns as well.&amp;nbsp; The press has published many a cautionary note, including editorials, op-ed and articles in &lt;a class="external-link" href="http://www.thehindu.com/opinion/lead/article1487299.ece"&gt;the&lt;/a&gt; &lt;a class="external-link" href="http://www.thehindu.com/opinion/editorial/article1515144.ece"&gt;Hindu&lt;/a&gt;, &lt;a class="external-link" href="http://www.thehoot.org/web/home/story.php?sectionId=6&amp;amp;mod=1&amp;amp;pg=1&amp;amp;valid=true&amp;amp;storyid=5163"&gt;the Hoot&lt;/a&gt;, Medianama.com, and Kafila.com, well before the new rules were notified.&amp;nbsp;  We at CIS even received a 'read notification' 
from the email account of the Group Coordinator of the DIT’s Cyber Laws 
Division—Dr. Gulshan Rai—on Thursday, March 3, 2011 at 12:04 PM (we had 
sent the mail to Dr. Rai on Monday, February 28, 2011). &amp;nbsp;We never 
received any acknowledgement, though, not even after we made an express 
request for acknowledgement (and an offer to meet them in person to 
explain our concerns) on Tuesday, April 5, 2011 in an e-mail sent to Mr.
 Prafulla Kumar and Dr. Gulshan Rai of DIT.&lt;/p&gt;
&lt;p&gt;The
 process can hardly be called 'transparent' when the replies received 
from 'industry associations and other stakeholders' have not been made 
public by the DIT. Those comments which are public all indicate that 
serious concerns were raised as to the constitutionality of the Rules.&lt;/p&gt;
&lt;p&gt;The Government has been forward looking to create a conducive 
environment for the Internet medium to catapult itself onto a different 
plane with the evolution of the Internet. The Government remains fully 
committed to freedom of speech and expression and the citizen’s rights 
in this regard.&lt;/p&gt;
&lt;p&gt;&lt;span id="internal-source-marker_0.8528041979429147"&gt;The DIT has limited this statement to the rules on intermediary due 
diligence, and has not spoken about the controversial new rules that 
stifle cybercafes, and restrict users' privacy and freedom to receive 
information.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="internal-source-marker_0.8528041979429147"&gt;&lt;/span&gt;If
 the government is serious about creating a conducive environment for 
innovation, privacy and free expression on the Internet, then it wouldn’t be 
passing Rules that curb down on them, and it definitely will not be 
doing so in such a non-transparent fashion.&lt;/p&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rebuttal-dit-press-release-intermediaries'&gt;https://cis-india.org/internet-governance/blog/rebuttal-dit-press-release-intermediaries&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2012-07-11T13:18:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/wikipedia-reader">
    <title>Critical Point of View: A Wikipedia Reader</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/wikipedia-reader</link>
    <description>
        &lt;b&gt;For millions of internet users around the globe, the search for new knowledge begins with Wikipedia. The encyclopedia’s rapid rise, novel organization, and freely offered content have been marveled at and denounced by a host of commentators. Critical Point of View moves beyond unflagging praise, well-worn facts, and questions about its reliability and accuracy, to unveil the complex, messy, and controversial realities of a distributed knowledge platform.&lt;/b&gt;
        
&lt;p&gt;The essays, interviews and artworks brought together in this reader form part of the overarching Critical Point of View research initiative, which began with a conference in Bangalore (January 2010), followed by events in Amsterdam (March 2010) and Leipzig (September 2010). With an emphasis on theoretical reflection, cultural difference and indeed, critique, contributions to this collection ask: What values are embedded in Wikipedia’s software? On what basis are Wikipedia’s claims to neutrality made? How can Wikipedia give voice to those outside the Western tradition of Enlightenment, or even its own administrative hierarchies? &lt;em&gt;Critical Point of View&lt;/em&gt; collects original insights on the next generation of wiki-related research, from radical artistic interventions and the significant role of bots to hidden trajectories of encyclopedic knowledge and the politics of agency and exclusion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contributors&lt;/strong&gt;: Amila Akdag Salah, Nicholas Carr, Shun-ling Chen, Florian Cramer, Morgan Currie, Edgar Enyedy, Andrew Famiglietti, Heather Ford, Mayo Fuster Morell, Cheng Gao, R. Stuart Geiger, Mark Graham, Gautam John, Dror Kamir, Peter B. Kaufman, Scott Kildall, Lawrence Liang, Patrick Lichty, Geert Lovink, Hans Varghese Mathews, Johanna Niesyto, Matheiu O’Neil, Dan O’Sullivan, Joseph Reagle, Andrea Scharnhorst, Alan Shapiro, Christian Stegbauer, Nathaniel Stern, Krzystztof Suchecki, Nathaniel Tkacz, Maja van der Velden&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Colophon&lt;/strong&gt;: Editors: Geert Lovink and Nathaniel Tkacz. Editorial Assistance: Ivy Roberts and Morgan Currie. Copy-Editing: Cielo Lutino. Design: Katja van Stiphout. Cover Image: Ayumi Higuchi. Priner: Ten Klei, Amsterdam. Publisher: Institute of Network Cultures, Amsterdam. Supported by: The School for Communication and Design at the Amsterdam University of Applied Sciences (Hogeschool van Amsterdam DMCI), the Centre for Internet and Society (CIS) in Bangalore and the Kusuma Trust.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Download the pdf for free &lt;a class="external-link" href="http://www.networkcultures.org/_uploads/%237reader_Wikipedia.pdf"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;To order a hard copy of the reader, send an email: books@networkcultures.org&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Geert Lovink and Nathaniel Tkacz (eds), &lt;em&gt;Critical Point of View: A Wikpedia Reader&lt;/em&gt;, Amsterdam: Institute of Network Cultures, 2011. ISBN: 978-90-78146-13-1, paperback, 385 pages.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/wikipedia-reader'&gt;https://cis-india.org/research/conferences/conference-blogs/wikipedia-reader&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>CPOV</dc:subject>
    

   <dc:date>2011-05-13T07:24:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-response-dit-blocking">
    <title>DIT's Response to RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/blog/rti-response-dit-blocking</link>
    <description>
        &lt;b&gt;For the first time in India, we have a list of websites that are blocked by order of the Indian government.  This data was received from the Department of Information Technology in response to an RTI that CIS filed.  Pranesh Prakash of CIS analyzes the implications of these blocks, as well as the shortcomings of the DIT's response.&lt;/b&gt;
        
&lt;h2&gt;Quick Analysis of DIT's Response to the RTI&lt;br /&gt;&lt;/h2&gt;
&lt;h3&gt;Blocked websites&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The eleven websites that the DIT acknowledges are blocked in India are:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.zone-h.org"&gt;http://www.zone-h.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://donotdial100.webs.com"&gt;http://donotdial100.webs.com&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;http://www.bloggernews.net/124029&lt;/a&gt; [&lt;strong&gt;accessible from Tata DSL, but not from others like Reliance Broadband and BSNL Broadband&lt;/strong&gt;]&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.google.co.in/#h1=en&amp;amp;source=hp&amp;amp;biw=1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=g10&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp;gs_rfai=&amp;amp;fp=e791fe993fa412ba"&gt;http://www.google.co.in/#h1=en&amp;amp;source=hp&amp;amp;biw=1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=g10&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp;gs_rfai=&amp;amp;fp=e791fe993fa412ba&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.cinemahd.net/desktop-enhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html"&gt;http://www.cinemahd.net/desktop-enhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.chakpak.com/find/images/kamasutra-hindi-movie"&gt;http://www.chakpak.com/find/images/kamasutra-hindi-movie&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html"&gt;http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html"&gt;http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.facebook.com/pages/l-Hate-Ambedkar/172025102828076"&gt;http://www.facebook.com/pages/l-Hate-Ambedkar/172025102828076&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.indybay.org"&gt;http://www.indybay.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://arizona.indymedia.org"&gt;http://arizona.indymedia.org&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Of the eleven blocked websites, one was still accessible on a Tata Communications DSL connection.&amp;nbsp; Two of the blocked websites are grassroots news organizations connected to the Independent Media Centre: IndyBay (San Francisco Bay Area IMC) and the Arizona Indymedia website.&amp;nbsp; The Bloggernews.net page that is on the blocked list is in fact an article by N. Vijayashankar (Naavi) from March 12, 2010 titled "Is E2 labs right in getting zone-h.org blocked?", criticising the judicial blocking of Zone-H.org by E2 Labs (with E2 Labs being represented by lawyer Pawan Duggal).&amp;nbsp; The Zone-H.org case is still going through the judicial motions in the District Court of Delhi, but E2 Labs managed to&amp;nbsp; get an &lt;a class="external-link" href="http://www.naavi.org/cl_editorial_10/e2labs_zoneh_org.pdf"&gt;&lt;em&gt;ex parte&lt;/em&gt; (i.e., without Zone-H being heard) interim order from the judge&lt;/a&gt; asking Designated Officer (Mr. Gulshan Rai of DIT) to block access to Zone-H.org.&lt;/p&gt;
&lt;p&gt;As has happened in the past, the government (or the court) &lt;a class="external-link" href="http://support.webs.com/webs/topics/india_problems_seeing_your_site_read_this_first"&gt;accidentally ordered the blocking of all of website host webs.com&lt;/a&gt;, instead of blocking only http://donotdial100.webs.com (which subdomain apparently hosted &lt;a class="external-link" href="http://www.dnaindia.com/mumbai/report_police-still-to-shut-down-fake-account-maligning-force_1419951"&gt;'defamatory' and 'abusive' information about mafia links within the Maharashtra police and political circles&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;It is interesting to note that for most of the websites on most ISPs one gets a 'request timed out' error 
while trying to access the blocked websites, and not a sign saying: 
"site blocked for XYZ reason on request dated DD-MM-YYYY received from the DIT".&amp;nbsp; On Reliance broadband connections, for some of the above websites an error message appears, which states: "This site has been blocked as per instructions from Department of Telecom".&lt;/p&gt;
&lt;h3&gt;Judicial blocking&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;As per the response of the government, all eleven seem to have been blocked on orders received from the judiciary.&amp;nbsp; While they don't state this directly, this is the conclusion one is led to since the Department admits to blocking eleven websites and also notes that there have been eleven requests for blocking from the judiciary.&amp;nbsp; Normally the judiciary is often thought of as a check on the executive's penchant for banning (seen especially in the recent book banning cases in Maharashtra, for instance, where the Bombay High Court has overturned most of the government's banning orders).&amp;nbsp; However, in these cases the ill-informed lower judiciary seem to be manipulated by lawyers to suppress freedom of speech and expression, even going to the extent of blocking grassroots activist news organizations like the Independent Media Centre.&lt;/p&gt;
&lt;h3&gt;Websites not blocked by DIT&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The DIT also notes that the blocks on Typepad.com was not authorized by it (nor, according to the RTI response received by Nikhil Pahwa of Medianama was the &lt;a class="external-link" href="http://www.medianama.com/2011/04/223-indiablocks-indias-it-depts-response-to-our-rti-request-our-stand/"&gt;Mobango.com block authorised by the DIT&lt;/a&gt;).&amp;nbsp; Typepad.com, Mobango.com, and Clickatell.com don't seem to be blocked currently.&amp;nbsp; However, &lt;a class="external-link" href="http://www.medianama.com/2011/03/223-indian-government-blocks-typepad-mobango-clickatell/"&gt;as was reported by Medianama&lt;/a&gt;, for a while when they were being blocked, some sites and ISPs (such as Typepad.com on Bharti Airtel DSL) showed a message stating that the website was blocked on request from the Department of Telecom, which we don't believe has the authority to order blocking of websites.&amp;nbsp; While we still await a response from the Department of Telecom to the RTI we filed with them on this topic, in a letter to the Hindu, &lt;a class="external-link" href="http://www.thehindu.com/news/national/article1574444.ece"&gt;the Department of Telecom has clarified&lt;/a&gt; that it did not order any block on Typepad.com or any of the other websites.&amp;nbsp; This leaves us unsure as to who ordered these blocks.&amp;nbsp; Further, it points out a lacuna in our information policy that ISPs can &lt;em&gt;suo motu&lt;/em&gt; block websites without justifications (such as violation of terms of use), proper notice to customers, or any kind of repercussions for wrongful blocking.&lt;/p&gt;
&lt;h3&gt;Insufficient information on Committee for Examination of Requests&lt;/h3&gt;
&lt;p&gt;All requests for websites blocking (except those directly from the judiciary) must be vetted by the Committee for Examination of Requests (CER) under Rule 8(4) of the Rules under s.69A of the IT Act.&amp;nbsp; Given that the DIT admits that the Designated Officer (who carries out the blocking) has received 21 requests to date, there should be at least 21 recommendations of the CER.&amp;nbsp; However, the DIT has not provided us with the details of those 21 requests and the 21 recommendations.&amp;nbsp; We are filing another RTI to uncover this information.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Text of the DIT's Response&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Government of India &lt;br /&gt;Ministry of Communications &amp;amp; Information Technology &lt;br /&gt;Department of Information Technology &lt;br /&gt;Electronics Niketan, 6 CGO Complex, &lt;br /&gt;New Delhi-110003&lt;br /&gt;&amp;nbsp;&lt;br /&gt;No : 14(3)/2011-ESD&lt;br /&gt;&lt;br /&gt;Shri Pranesh Prakash &lt;br /&gt;Centre for Internet and Society &lt;br /&gt;194, 2-C Cross, &lt;br /&gt;Domulur Stage II, &lt;br /&gt;Bangalore- 560071.&lt;br /&gt;&lt;br /&gt;Subject: Request for information under RTI Act,&lt;br /&gt;&lt;br /&gt;Sir,&lt;br /&gt;Reference your request dated 28lh February 2011 on the above subject.&lt;br /&gt;The point wise information as received from the custodian of Information is enclosed for your reference and records.&lt;br /&gt;&lt;br /&gt;sd/-&lt;br /&gt;(A.K.Kaushik) &lt;br /&gt;Additional Director &amp;amp; CPIO &lt;br /&gt;Tel: 011-24364803&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Subject : RTI on website blocking requested by Shri Pranesh Prakash&lt;/p&gt;
&lt;blockquote&gt;(i) Did the Department order Airtel to block TypePad under S.69A of the Information Technology Act ("IT Act"), 2000 read with the Information Technology (Procedures and Safeguards for Blocking Access of Information by Public) Rules, 2009 ("Rules") or any other law for the time being in force? If so, please provide a copy of such order or orders. If not, what action, if at all, has been taken by the Department against Airtel for blocking of websites in contravention of S.69A of the IT Act?&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply &lt;/strong&gt;- This Department did not order Airtel to block the said site.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(ii) Has the Department ever ordered a block under s.69A of the IT Act? If so, what was the information that was ordered to be blocked?&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The Department has issued directions for blocking under section 69A for the following websites:&lt;br /&gt;(a) www.zone-h.org.&lt;br /&gt;(b) http://donotdial100.webs.com (IP 216.52.115.50)&lt;br /&gt;(c) www.bloggernews.net/124029&lt;br /&gt;(d) http://www.google.co.in/#h 1 =en&amp;amp;source=hp&amp;amp; biw=1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+ wallpaper&amp;amp;aq=4&amp;amp;aqi=g10&amp;amp;aql =&amp;amp;oq=dr+ babas&amp;amp; gs_rfai=&amp;amp;fp=e791 fe993fa412ba&lt;br /&gt;(e) http://www.cinemahd.net/desktop-enhancements/wallpaper/23945- wallpapers-beautiful-girl-wallpaper.html&lt;br /&gt;(f) http://www.chakpak.com/find/images/ kamasutra-hindi-movie&lt;br /&gt;(g) http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged- to.html&lt;br /&gt;(h) http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta- wardrobe.html.&lt;br /&gt;(i) http://www.facebook.com/pages/l-Hate-Ambedkar/172025102828076&lt;br /&gt;(j) www.indybay.org&lt;br /&gt;(k) www.arizona.indymedia.org&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(iii) How many requests for blocking of information has the Designated Officer received, and how many of those requests have been accepted and how many rejected? How many of those requests were for emergency blocking under Rule 9 of the Rules?&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Designated Officer received 21 request for blocking of information. 11 websites have been blocked on the basis of orders received from court of law. One request has been rejected. For other requests, additional input/information has been sought from the Nodal Officer.&lt;br /&gt;&lt;br /&gt;No request for emergency blocking under rule 9 of the Rules have been received.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(iv) Please provide use the present composition of the Committee for Examination of Requests constituted under Rule 7 of the Rules.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The present composition of the Committee is :&lt;br /&gt;(a) Designated Officer (Group Coordinator - Cyber Law)&lt;br /&gt;(b) Joint Secretary, Ministry of Home Affairs&lt;br /&gt;(c) Joint Secretary, Ministry of Information and Broadcasting&lt;br /&gt;(d) Additional Secretary and Ministry of Law &amp;amp; Justice&lt;br /&gt;(e) Senior Director, Indian Computer Emergency Response Team&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(v) Please provide us the dates and copies of the minutes of all meetings held by the Committee for Examination of Requests under Rule 8(4) of the Rules, and copies of their recommendations.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The Committee had met on 24-08-2010 with respect to request for blocking of website www.betfair.com.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(vi) Please provide us the present composition of the Review Committee constituted under rule 419A of the Indian Telegraph Rules, 1951.&lt;br /&gt;(vii) Please provide us the dates and copies of the minutes of all meetings held by the Review Committee under Rule 14 of the Rules, and copies of all orders issued by the Review Committee.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - This Department do not have details for above. The said information may be available with Department of Telecommunications.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-response-dit-blocking'&gt;https://cis-india.org/internet-governance/blog/rti-response-dit-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-08-02T07:13:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad">
    <title>'Privacy Matters', Ahmedabad: Conference Report </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad</link>
    <description>
        &lt;b&gt;On 26 March 2011, civil society, lawyers, judges, students and NGO’s, gathered together at the Ahmedabad Management Association to take part in 'Privacy Matters' –  a public conference organised by Privacy India in partnership with IDRC and Research Foundation for Governance in India (RFGI) — to discuss the challenges of  privacy in India, with an emphasis on national security and privacy. The conference was opened by Prashant Iyengar, head researcher at Privacy India and Kanan Drhu, director of RFGI. Mr. Iyengar explained Privacy India’s mandate to raise awareness of privacy, spark civil action, and promote democratic dialogue around privacy challenges and violations in India. RFGI is a think tank established in 2009 which aims to research, promote, and implement various reforms to improve the legal and political process in Gujarat and across India. ‘Privacy Matters – Ahmedabad’ is the third conference out of the eight that Privacy India will be hosting across India. The next conference will take place in Hyderabad on 9 April 2011. It will focus on human rights and privacy.&lt;/b&gt;
        
&lt;h2&gt;The keynote speech, delivered by Usha Ramanathan, focused on links not often made between privacy and social phenomenon.&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;img class="image-left" src="../it-act/usha.jpg/image_preview" alt="Usha Ramanathan " /&gt;Ms. Usha Ramanathan opened the conference by examining the links not often made between privacy and personal security, between databases and national security, and the centrality of dislodging privacy in projects of social control. In her presentation she spoke about the inverse relationship between national and personal security, making the point that an important part of privacy is the ability of an individual to secure their own person. Today, because national security follows a policy of ubiquitous surveillance, it is almost impossible for an individual to secure their person from the state. Ms. Ramanathan also traced the beginnings of ubiquitous surveillance to the increasing global fear of terrorism, and the national break down of the criminal justice system in India. Instead of looking to the roots of terrorism and the roots of failure in the criminal justice system, the Indian State has responded to both these factors by superimposing a system of surveillance on top of the existing rule. Consequently, the state has become pan-optical — closely following the movement of its entire population. The state has been able to achieve this level of surveillance through technology, which it has used to create identifiers for its population. The use of technology by the state mediates a link between corporate interest and state interest. Thus, by facilitating the easy and ubiquitous creation of identifiers and surveillance, technology is changing the idea and the nature of privacy. For example, it is now important that a privacy law allows for individuals to protect and secure their identity, something that every individual has and every individual controls, while regulating the creation and external use of identifiers — something that is used by another (not you) to distinguish a person from the rest of the population.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;How can privacy legislation work to positively regulate the use of technology by the government, so that invasion of privacy does not consequently become state policy?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How can privacy legislation distinguish between and work to protect an identity while regulating the creation and use of personal information as identifiers?&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Session I of the Conference featured a Judicial Perspective of Privacy and a Presentation on the Connections between Privacy and the Federal Income Tax Regime in India.&lt;/h2&gt;
&lt;h3&gt;Privacy and the Constitution&lt;/h3&gt;
&lt;img class="image-right" src="../it-act/judge.jpg/image_preview" alt="Justice Bhatt" /&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;J N Bhatt&lt;/strong&gt;, the former Chief Justice of Gujarat and Bihar, and currently the head of the Gujarat State Law Commission, spoke about privacy as a fundamental right that has been written into articles 19 and 21 of the Constitution of India. Important points from his presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;As privacy is already a recognized fundamental right, the question at hand is not if there is a right to privacy, but instead how can the right to privacy be best proliferated.&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Within the question of how a privacy can best be proliferated, is a question about rights and duties. Wherever there is a right to privacy there is also a corresponding duty to privacy — as rights and duties are interdependent.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Though privacy has been recognized as a fundamental right in India, when looking at the actual assertion of the right, it is important to be aware of the cultural realities of India. India is a country with 39 per cent of her population living below the poverty line, with an even lower literacy rate, and there is a direct connection between the assertion of civil liberties, an individual’s civic sense, and education.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;When looking at how to best proliferate the right to privacy, governance and common law, a methodology to reach the poorest of the poor should be laid out first.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;What is the best way to proliferate the right to privacy ?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;What legal structures need to be in place to ensure that the poor can assert their right to privacy?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;What social structures need to be in place to ensure that the poor can assert their right to privacy?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&lt;img class="image-left" src="../it-act/profdrhu.jpg/image_preview" alt="Prof. Drhu" /&gt;&amp;nbsp;Privacy and the Indian Tax Regime&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Professor Amal Dhru&lt;/strong&gt;, visiting professor from the Indian Institute of Management, Ahmedabad and a practicing Chartered Accountant spoke on the connections between privacy and the federal income tax regime in India. In his presentation he explained how the information collected by the federal income tax regime in India can be both useful in holding a citizen accountable, and invasive of one’s personal privacy if mis-used. Important points from his presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The Indian tax regime highlights the tension between public interest as tax evasion is considered an exception to the right to privacy as it is a matter of public interest.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;There is a lack of confidence in the existing banking and tax system in India. For example in the business sector, Indian investors have deposited over 700 billion dollars abroad as they are given complete privacy and security over their money. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Though there is a lack of confidence in the current banking and tax system, a tighter law is not necessarily the solution. For example, studies have found that tighter tax regimes lead to greater evasion, while looser tax regimes have higher compliance rates.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;On April 1, 2011 the new tax codes for India will be implemented. The reform will give enormous power to tax offices, and as the tax authorities will become equipped to do taxes smarter – this will come at a cost to citizen’s privacy. &lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Just as a tighter tax law leads to a higher percentage of tax evasion, will a tight privacy law simply lead to greater numbers of privacy violations?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;What creates public confidence in a law?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Should a privacy legislation be responsible for defining the public good?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Should privacy protection of tax-related information be incorporated into a privacy legislation or contained only in tax law?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;To what extent should tax authorities be allowed to investigate potential tax evasion i.e., one’s computer, house or e-mail? &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;How does one balance the private vs. the public good? &lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&amp;nbsp;Session II of the Conference focused on National Security and Privacy, and Cultural Conceptions of Privacy &lt;br /&gt;&lt;/h2&gt;
&lt;h3&gt;National Security and Privacy&lt;img class="image-right" src="../it-act/mathew.jpg/image_preview" alt="Mr. Thomas " /&gt;&lt;/h3&gt;
&lt;p style="text-align: left;"&gt;In the second session on Privacy and National Security, Colonel Mathew Thomas spoke on privacy and national security. Colonel Thomas is a management consultant and activity leader for development centers and has held top positions in the Indian Army, and the Defence Research and Development Organisation, where he headed the missile manufacturing facility. Sharing his personal experiences in the army he explained the connection between privacy and national security. Important points from his presentation include:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;National Security is often not an internal threat, but instead an external threat. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;There is a connection between the increase in surveillance and liberalization of Government. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;More surveillance does not bring more security. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Foreign software poses as a threat to national security.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Greater security is gained through intelligent use and analysis of data. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;A strong national security plan should not rely solely on surveillance of its citizens. &amp;nbsp;Instead national security should be brought about through strong economic policies, non-reliance on foreign software, neutrality in foreign policy, fair trade policies, rural development and prevention of migration to cities, and having a politically honest and accountable governance.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Is it effective for&amp;nbsp; privacy to be compromised in the name of anti- terror laws?&lt;/li&gt;&lt;li&gt;&amp;nbsp;Can the development and distribution of indigenous software protect national privacy?&lt;/li&gt;&lt;li&gt;&amp;nbsp;How can strong economic policies indirectly protect &amp;nbsp;an individual's privacy?&lt;/li&gt;&lt;li&gt;&amp;nbsp;How can a strong foreign policy protect an Indian citizen's privacy when it is stored or sent abroad?&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&amp;nbsp;&lt;img class="image-left" src="../it-act/gagan.jpg/image_preview" alt="Gagan Sethi" /&gt;Privacy as a Cultural Construct&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Gagan Sethi from the Centre for Social Justice, Ahmedabad shared his opinion on privacy. Important points from his presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Privacy is a cultural construct that changes with context, perspective, and time.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;When considering a privacy policy it is important to create a policy that does not strictly define what privacy is and what it is not, but instead create a policy that defines and promotes a common respect for human dignity.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp; If a privacy policy is developed to promote a common respect for human dignity – will it be effective?&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Can you develop a policy that has a loose definition and mandate, but has strong legal teeth?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Session III of the Conference focused on Minority Identities and Privacy, Prisoner Rights, and Cyber Security.&lt;/h2&gt;
&lt;h3&gt;Privacy and Minority Identities&lt;img class="image-right" src="../it-act/copy_of_bobby.jpg/image_preview" alt="Bobby Kuhnu " /&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Bobby Kuhnu&lt;/strong&gt;, a lawyer and activist, presented in the third session on Privacy, Minority Identities, and Security. &amp;nbsp;In his talk Mr. Kuhnu through the use of three examples examined the ideological underpinnings of the discourse on privacy and its bearings on socially marginalized identities in the context of the Indian State and the constitutional right to privacy. Important points from his presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;In India, names can be sensitive and personal information like one’s religion, family, caste, and background can all be known through a&amp;nbsp; name.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Because of the sensitivity of a person’s name, many people do not feel safe or comfortable in their own identity.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Reservation lists and public postings of information, can and have been used to discriminate and violate another’s privacy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Should a privacy legislation requirement throughout&amp;nbsp; institutions and government bodies that names should not be publicly displayed to the point of identification?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;What is the most effective way of legally protecting an individual from discrimination based on their name?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Perspectives of Privacy&amp;nbsp; &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;img class="image-left" src="../it-act/interns.jpg/image_preview" alt="Interns " /&gt;In the last portion of the day, Yash Sampat and Aditya Yagnik spoke on the origins of privacy and privacy in the cyber world. Vimmi Surti spoke on prisoner's rights and privacy and Ramswaroop Chaudhary presented on minority identities in South Asia and privacy. Important points from their presentation include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;Internet has led to an increase in privacy violations.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;The result of privacy infringements is often the deprivation of individuals from safe access to services availed to them.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;When looking at privacy as the protection of human dignity, prisoner’s rights are violated through overcrowding in prisons, poor health, and poor sanitation.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Questions to Consider&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;Are there legal mechanisms that can be put in place to ensure the least amount of deprivation to services when an individual’s privacy is invaded?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;To what extent should prisoners be availed the right to privacy?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;The concluding session was a time for discussion and&amp;nbsp; opinion sharing&lt;img class="image-right" src="../it-act/kananandjudge.jpg/image_preview" alt="Kanan and the Judge " /&gt;&lt;/h2&gt;
&lt;p&gt;From the closing session, and the above sessions many themes and questions pertaining to privacy came out that will need to be addressed when considering the way forward &amp;nbsp;for a privacy legislation including:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Regulation of ubiquitous surveillance in the name of national security&lt;/li&gt;&lt;li&gt;Regulation over public display of names and personal information&lt;/li&gt;&lt;li&gt;The need to distinguish between identity and identifier. &lt;/li&gt;&lt;li&gt;The need to protect an individual's identity while regulating the production and use of identifiers.&lt;/li&gt;&lt;li&gt;Privacy rights and prisoners: what does the right to privacy mean to a prisoner, i.e., clean facilities and health care. &lt;/li&gt;&lt;li&gt;Can the right to privacy be a platform for individuals to claim sanitary/safe working and living conditions. &lt;/li&gt;&lt;li&gt;Recognize the changing nature of&amp;nbsp; privacy rights in a technological society.&lt;/li&gt;&lt;li&gt;Privacy implications of biometric usage.&lt;/li&gt;&lt;li&gt;Creation of a definition of when privacy rights will supersede identification needs.&lt;/li&gt;&lt;li&gt;How can government institutions, like the tax department, incorporate and protect the right to privacy with the collection of large amounts of data for more efficient services. &lt;/li&gt;&lt;li&gt;Privacy and the family&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/strong&gt;
&lt;div class="pullquote"&gt;&lt;strong&gt;
Download the report and agenda&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-conference-ahmedabad.pdf" class="internal-link" title="Privacy Conference in Ahmedabad PDF"&gt;here&lt;/a&gt;&amp;nbsp;[pdf - 452kb]&lt;/strong&gt;&lt;/div&gt;
&lt;p class="callout"&gt;&lt;strong&gt;Also see Matthew's &lt;a href="https://cis-india.org/internet-governance/blog/privacy-ahmedabad-conference-presentation.pptx" class="internal-link" title="Privacy Conference in Ahmedabad Powerpoint Presentation"&gt;presentation&lt;/a&gt;&amp;nbsp;[powerpoint file 116kb]&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-04-04T04:45:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/untapped-potential">
    <title>India's untapped potential: Are a billion people losing out because of spectrum?</title>
    <link>https://cis-india.org/telecom/blog/untapped-potential</link>
    <description>
        &lt;b&gt;As one of the world’s fastest growing economies and with over 65% of its billion-plus population under 35, India has huge potential. But according to Shyam Ponappa of the Centre for Internet &amp; Society, its spectrum management – the electromagnetic waves that are used from home appliances like microwaves and remote controls, to radios, cell phones, and of course, the internet – could be a huge barrier to the country’s economic and social development.&lt;/b&gt;
        &lt;p&gt;Until the global economic downturn that began about two years ago, the economic model for spectrum distribution in India and many developing countries was based on the free market. But Ponappa demonstrates in a &lt;a class="external-link" href="http://www.apc.org/en/node/11864/"&gt;new report &lt;/a&gt;for APC that spectrum is worth treating as a public utility the way we do roads, electricity and other basic infrastructure, which would allow for people in rural areas to access spectrum-dependant services like mobile phones and wifi and increase quality of services for all.&lt;/p&gt;
&lt;p&gt;Currently in India, as in most other countries, spectrum is being treated as a property, where “chunks” of spectrum are sold to the mobile phone and telecommunications operators with the highest bid. Commonly there are 3 – 4 operators in a developed country; however, in India there are up to sixteen. The extreme competition has resulted in the Indian bidders paying outrageous fees that they are never able to recuperate. So while the &lt;a class="external-link" href="http://www.apc.org/en/glossary/term/353"&gt;government&lt;/a&gt; makes a profit on the sale, this profit comes at a societal cost.&lt;/p&gt;
&lt;p&gt;Ponappa proposes pooling spectrum and to have a set of network providers, who in turn serve operators for retail users. This effectively opens up the spectrum and could make costs ten or fifteen times cheaper than they are now.&lt;/p&gt;
&lt;p&gt;“It is appropriate to push the concept of open spectrum in developed markets who underwent their development phase some 60 – 100 years ago and put in place basic infrastructure systems. But in countries like India and the Asian sub-continent, it does not make sense to do this because we are not at the same stage of economic development,” Ponappa told APCNews.&lt;/p&gt;
&lt;p&gt;“When markets are well structured and organised,” he continues, “[&lt;a class="external-link" href="http://www.apc.org/en/glossary/term/353"&gt;government&lt;/a&gt; control] can be less effective and efficient for society as a whole, compared with open competition. However developing economies don’t have the integrated systems in place that advanced economies do. India does not have an adequately developed network of copper, optical &lt;a class="external-link" href="http://www.apc.org/en/glossary/term/293"&gt;fibre&lt;/a&gt; or microwaves covering most of its population. And we are at a stage of development at which infrastructure is a fundamental determinant of productivity, as well as of a reasonable quality of life.”&lt;/p&gt;
&lt;p&gt;Ponappa argues that in India’s case it would be advisable for governments to work with other stakeholders – corporations, &lt;a class="external-link" href="http://www.apc.org/en/glossary/term/354"&gt;state&lt;/a&gt;-owned agencies, and civil society – on a collaborative solution. “It would be much more conducive to a sound economy to have either the &lt;a class="external-link" href="http://www.apc.org/en/glossary/term/353"&gt;government&lt;/a&gt; step in and open up the commercial spectrum, or to have two to three main operators (possibly subsidised, but not necessarily) as we do with the provision of utilities,” he says. Yet, the free market mentality continues to reign, and a surfeit of operators is trying to make a profit in the telecommunications &lt;a class="external-link" href="http://www.apc.org/en/taxonomy/term/325"&gt;wireless&lt;/a&gt; sector.&lt;/p&gt;
&lt;h3&gt;Everybody wants a piece of the pie&lt;/h3&gt;
&lt;p&gt;In India, every operator is assigned a sliver of spectrum for their exclusive use and the rest is assigned to the government, the public sector and defence.&lt;/p&gt;
&lt;p&gt;The result is high-cost infrastructure for operators (setting up networks with multiple sets of more advanced equipment because of the limited spectrum, with the capital constraints resulting in less extensive networks in rural areas) as well as for users (who have to pay for all this equipment).&lt;/p&gt;
&lt;p&gt;“Too many operators make for increased capital costs for each operator, and cumulatively for all operators,” Ponappa explains.&lt;/p&gt;
&lt;p&gt;And these higher costs are increasingly difficult to recover from consumer-generated revenue, as India undergoes huge price wars. Many operators may eventually go bankrupt. While no consumers ever complain about low costs –and India has some of the world’s lowest mobile rates– they will complain about poor quality and unreliable service. Consequently, consumers may not have to pay much to use mobile services, but they may not always be able to make or receive calls when they need to, and do not have access to broadband.&lt;/p&gt;
&lt;p&gt;While most countries have moved on to 3G networks (which has more capacity for a given spectrum band than 2G, meaning better call quality) as many as four of India’s sixteen operators have not even developed their 2G networks. Making the switch to 3G seems like a good idea, but there are substantial costs associated with deploying these more advanced techniques to both operators (for network upgrades) and for end users (in terms of new handsets).&lt;/p&gt;
&lt;p&gt;Too much competition in this case has made operators inefficient.&lt;/p&gt;
&lt;h3&gt;Spectrum as a national common good&lt;/h3&gt;
&lt;p&gt;If spectrum were treated as if it were a public utility, posits Ponappa, each operator would have access to a bigger chunk of spectrum, and the traffic-handling capacity of each would increase at a lower cost.&lt;/p&gt;
&lt;p&gt;“With the current model the capacity of networks is suffering because networks cannot afford to expand or make technical improvements without economic losses. Other infrastructure services such as electricity and water supply are managed by utility companies, which are typically monopolies for a product-segment, or duopolies for purposes of competition. So why not treat spectrum the same way?” suggests Ponappa.&lt;/p&gt;
&lt;p&gt;Ponappa suggests treating networks, and spectrum as a part of networks, as we would an oil pipeline, where everyone accesses the same one, and pays a fee for its use.&lt;/p&gt;
&lt;p&gt;This would bring more people onto the network and increase revenues, since operating costs would be shared. The more revenue it can generate, the more efficient operators will be, using the same high-capacity circuits. The more revenue the main operators have, the more they could invest in up-to-date technology to extend their networks and provide a better service to clients. The better the technology, the more people could access the &lt;a class="external-link" href="http://www.apc.org/en/taxonomy/term/258"&gt;internet&lt;/a&gt; and other now vital sources of information, as well as focus on broadband and infrastructure to the country’s isolated rural areas, which today have rudimentary communications infrastructure.&lt;/p&gt;
&lt;h3&gt;India’s rural populations, the lost resource&lt;/h3&gt;
&lt;p&gt;As a predominantly rural country, lack of basic IT infrastructure means that the largest segment of India’s population has no &lt;a class="external-link" href="http://www.apc.org/en/taxonomy/term/300"&gt;access to information &lt;/a&gt;and communications technologies.&lt;/p&gt;
&lt;p&gt;Ponappa grew up on a farm in a rural area some 200 km from Bangalore where even fixed line phone networks were unreliable. “We have multiple telephone lines because we never know which one will work,” he says.&lt;/p&gt;
&lt;p&gt;Given India’s massive rural population, this means that there are hundreds of millions of people that are unable to access the internet. Services like quality distance education are not even an option if basic infrastructure such as fixed telephone lines is not in place and the country itself is losing out on the incalculable potential of this untapped human resource.&lt;/p&gt;
&lt;p&gt;Download the report &lt;a href="https://cis-india.org/telecom/publications/india-untapped-potential" class="internal-link"&gt;here&lt;/a&gt; [pdf - 280 kb]&lt;/p&gt;
&lt;p&gt;See the report in the APC &lt;a class="external-link" href="http://www.apc.org/en/pubs/research/open-spectrum-development-india-case-study"&gt;website&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;This article was written as part of the APC’s project work on &lt;/i&gt;&lt;a class="external-link" href="http://www.apc.org/en/node/10445/"&gt;&lt;i&gt;Spectrum for development&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, an initiative that aims to provide an understanding of spectrum regulation by examining the situation in Africa, Asia and Latin America.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Photo by &lt;a class="external-link" href="http://www.flickr.com/photos/kiwanja/3170290086/"&gt;kiwanja&lt;/a&gt;. Used with permission under Creative Content licensing.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/untapped-potential'&gt;https://cis-india.org/telecom/blog/untapped-potential&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2012-12-14T10:31:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/google-policy-fellowship">
    <title>Google Policy Fellowship Program: Asia Chapter</title>
    <link>https://cis-india.org/internet-governance/blog/google-policy-fellowship</link>
    <description>
        &lt;b&gt;For the ardent followers of free and open Internet and for those who love to debate on technology, media law and Internet-related policy issues, there is some good news. The Centre for Internet and Society, India is conducting a Google Policy Fellowship program this summer!&lt;/b&gt;
        
&lt;p&gt;Offered for the first time in Asia Pacific, the &lt;a class="external-link" href="http://www.google.com/policyfellowship/"&gt;Google Policy Fellowship&lt;/a&gt; offers&amp;nbsp;successful applicants the opportunity to develop research and debate on issues relating to freedom of expression for a minimum of ten weeks from June to August 2011. The applicants will be selected in Australia, India and Hong Kong respectively.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society will select the India Fellow, and is accepting applications for the position before March 27, 2011.&amp;nbsp;Google is providing a USD 7,500 stipend to the India Fellow, who will be selected by April 18, 2011.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To apply, please send to &lt;a href="mailto:google.fellowship@cis-india.org"&gt;google.fellowship@cis-india.org&lt;/a&gt; &amp;nbsp;the following materials:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Statement of Purpose: A brief write-up outlining about your interest and qualifications for the programme including the relevant academic, professional and extracurricular experiences. As part of the write-up, also explain on what you hope to gain from participation in the programme and what research work concerning free expression online you would like to further through this programme. (About 1200 words max).&lt;/li&gt;&lt;li&gt;Resume&lt;/li&gt;&lt;li&gt;Three references&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;More information about the focus of the work that the Google Policy Fellow will take on is&amp;nbsp;described below&lt;a href="#1"&gt;1&lt;/a&gt;.&amp;nbsp;More information about the Google Policy Fellowship program is available in the FAQ&lt;a href="#2"&gt;2&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name="1"&gt;Research Agenda &amp;nbsp;Outline&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The research proposals, and the fellowship itself, are to be anchored in the reality of the growing threat to civil liberties in cyberspace, with the consequent curbs on free expression that arise. The aim of the research is to chart out a comprehensive map of the legal and policy frameworks relating to free expression within the Asia-Pacific region and also examine people’s attitudes and ground-level movements relating to the same. This second component will necessarily involve some amount of empirical research: the fellows across different regions (for 2011, there will be fellows from India, Australia and Hong Kong) will be expected to use a survey on similar lines, so that the results could be adequately contrasted.&lt;/p&gt;
&lt;p&gt;The research would involve but not necessarily be limited to the following areas:&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Understanding Dissent&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;This component would involve looking at how dissent is negotiated in the region by the legal system and the ways in which governments seek to stifle and control online dissent. Specific points of interrogation would include:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The extent to which the constitution and other laws in the region protect freedom of expression and the extent to which they are enforced.&lt;/li&gt;&lt;li&gt;Judicial decisions relating to free expression, censorship and dissent. Have they examined how speech and other activities on the Internet should be afforded free speech protection?&lt;/li&gt;&lt;li&gt;The kind of material deemed objectionable and subject to censorship and/or penalization.&lt;/li&gt;&lt;li&gt;The kind of penalties placed on writers, commentators and bloggers for posting objectionable materials on the Internet.&lt;/li&gt;&lt;li&gt;Understanding the economic environment in which free expression operates: chains of media ownership, state restrictions on the means of journalistic production and distribution, and the levels of state control through allocation of advertising or subsidies would be part of this question.&lt;/li&gt;&lt;li&gt;Further, what are the laws relating to encryption and telecom security, as well as to intermediary liability, and how do they affect free expression?&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Understanding Free Expression&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;To be examined here is the question of how freedom of expression is perceived by people. What is the extent to which people believe the right is available to them — as balanced by conceivably conflicting rights such as privacy?&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;One part of proceeding on this would be to track a set of activist bloggers, gauging their take on various issues.&lt;/li&gt;&lt;li&gt;Another part would include tracking public opinion through comments pages on articles relating to free speech issues; taking a survey or coordinating focus group research. However, this is by no means the most reliable way to gauge the same and is, in particular, one area that will require an appropriate methodology to be developed by the fellows in consultation with the partner organizations.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Both these components are essential in being able to proceed with the third aspect, mentioned below.&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Understanding and Facilitating Movements&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;This final aspect will involve looking at how free expression advocates come together, or fail to do so.&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Is there a defined activist community in the region?&lt;/li&gt;&lt;li&gt;If not, what are the possible reasons behind failure of collaboration or organization? Have there been attempts towards the same?&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;&lt;a name="2"&gt;Frequently Asked Questions&lt;/a&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;What is the Google Policy Fellowship program?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Google Policy Fellowship program offers students interested in Internet and technology related policy issues with an opportunity to spend their summer working on these issues at the Centre for Internet and Society at Bangalore. Students will work for a period of ten weeks starting from June 2011. The research agenda for the program is based on legal and policy frameworks in the region connected to the ground-level perception of free expression.&lt;br /&gt;&lt;strong&gt;Applications for the Fellowship should carry these:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Statement of Purpose: A brief write-up outlining about your interest and qualifications for the programme including the relevant academic, professional and extracurricular experiences. As part of the write-up, also explain on what you hope to gain from participation in the programme and what research work concerning free expression online you would like to further through this programme. (About 1200 words max).&lt;/li&gt;&lt;li&gt;Resume&lt;/li&gt;&lt;li&gt;Three &amp;nbsp;references&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Important Dates&lt;br /&gt;&lt;/strong&gt;What is the program timeline?&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;March 27, 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Student application deadline; applications must be received by midnight 00:00 GMT.&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;April 18, 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;Student applicants are notified of the status of their applications.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;June 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;Students begin their fellowship with the host organization (start date to be determined by students and the host organization); Google issues initial student stipends.&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;July 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;Mid-term evaluations; Google issues mid-term stipends.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;August 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;Final evaluations; Google issues final stipends.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Eligibility&lt;span class="Apple-style-span"&gt;I am an International student can I apply and participate in the program?&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Are there any age restrictions on participating?&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Yes. You must be 18 years of age or older by 1 January 2011 to be eligible to participate in Google Policy Fellowship program in 2011.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Are there citizenship requirements for the Fellowship?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;For the time being, we are only accepting students eligible to work in India (e.g. Indian citizens, permanent residents of India, and individuals presently holding an Indian student visa. Google cannot provide guidance or assistance on obtaining the necessary documentation to meet the criteria.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Who is eligible to participate as a student in Google Policy Fellowship program?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In order to participate in the program, you must be a student. Google defines a student as an individual enrolled in or accepted into an accredited institution including (but not necessarily limited to) colleges, universities, masters programs, PhD programs and undergraduate programs. Eligibility is based on enrollment in an accredited university by 1 January 2011.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;I am an International student can I apply and participate in the program?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In order to participate in the program, you must be a student (see Google's definition of a student above). You must also be eligible to work in India (see section on citizen requirements for fellowship above). Google cannot provide guidance or assistance on obtaining the necessary documentation to meet this criterion.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;I have been accepted into an accredited post-secondary school program, but have not yet begun attending. Can I still take part in the program?&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;As long as you are enrolled in a college or university program as of 1 January 2011, you are eligible to participate in the program.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;I graduate in the middle of the program. Can I still participate?&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;As long as you are enrolled in a college or university program as of 1 January 2011, you are eligible to participate in the program.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;h3&gt;Payments, Forms, and Other Administrative Stuff&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;How do payments work*?&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Google will provide a stipend of USD 7,500 equivalent to each Fellow for the summer.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Accepted students in good standing with their host organization will receive a USD 2,500 stipend payable shortly after they begin the Fellowship in June 2011.&lt;/li&gt;&lt;li&gt;Students who receive passing mid-term evaluations by their host organization will receive a USD 1,500 stipend shortly after the mid-term evaluation in July 2011.&lt;/li&gt;&lt;li&gt;Students who receive passing final evaluations by their host organization and who have submitted their final program evaluations will receive a USD 3,500 stipend shortly after final evaluations in August 2011.&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;&lt;em&gt;Please note: Payments will be made by electronic bank transfer, and are contingent upon satisfactory evaluations by the host organization, completion of all required enrollment and other forms. Fellows are responsible for payment of any taxes associated with their receipt of the Fellowship stipend.&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;*&lt;em&gt;While the three step payment structure given here corresponds to the one in the United States, disbursement of the amount may be altered as felt necessary.&amp;nbsp;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;What documentation is required from students?&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Students should be prepared, upon request, to provide Google or the host organization with transcripts from their accredited institution as proof of enrollment or admission status. Transcripts do not need to be official (photo copy of original will be sufficient).&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;I would like to use the work I did for my Google Policy Fellowship to obtain course credit from my university. Is this acceptable?&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Yes. If you need documentation from Google to provide to your school for course credit, you can contact Google. We will not provide documentation until we have received a final evaluation from your mentoring organization.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Host Organizations&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;What is Google's relationship with the Centre for Internet and Society?&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Google provides the funding and administrative support for individual fellows directly. Google and the Centre for Internet and Society are not partners or affiliates. The Centre for Internet and Society does not represent the views or opinions of Google and cannot bind Google legally.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/google-policy-fellowship'&gt;https://cis-india.org/internet-governance/blog/google-policy-fellowship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-02T07:34:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/santiago-workshop-an-after-thought">
    <title>Digital Natives with a Cause? —Workshop in Santiago — an Afterthought</title>
    <link>https://cis-india.org/digital-natives/blog/santiago-workshop-an-after-thought</link>
    <description>
        &lt;b&gt;The Digital Natives had their third and final workshop in Santiago, Chile from 8 to 10 February 2011. Once again CIS and Hivos joined hands to organise the event. Samuel Tettner, Digital Natives Coordinator from CIS narrates his experiences from the workshop in this blog post. &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;For three days, from 8 to 10 February, I spent most of the days and almost one full night at the Digital Natives with a Cause? Workshop. The day before the workshop, I met the facilitators:&amp;nbsp;&lt;a class="external-link" href="http://www.karaandrade.com"&gt;Kara&lt;/a&gt;, &lt;a class="external-link" href="http://www.twitter.com/markun"&gt;Pedro&lt;/a&gt; and &lt;a class="external-link" href="http://mx.linkedin.com/in/jmcasanueva"&gt;Juan-Manuel&lt;/a&gt;. All three of them were quite enthusiastic with each one specializing on an aspect of the research objectives. That night, I had my first formal meeting with the participants in the conference room of Hotel Windsor in Santiago. &amp;nbsp;It is always fascinating to meet a large group of people, especially since you have been corresponding with them for a couple of weeks, have read about them and their projects, made images in your head of how they look, how they act, how they will get along with each other and so on.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I was particularly excited about the workshop in Santiago since it presented itself to me an opportunity to re-connect with a side of Latin America that I had not experienced. I moved from Venezuela to the United States at the age of 15. I don’t know about everyone else, but when I was 15, I was mostly interested in music, movies, my friends, fast cars, video games, and a whole lot of the nonsense stuff. Meeting these highly motivated young men and women from all over the American continent and the Caribbean islands allowed me to connect with the more nuanced and matured side of my identity— a side that had only heard English spoken to it.&lt;/p&gt;
&lt;p&gt;The
actual workshop took place at the &lt;a class="external-link" href="http://www.bibliotecasantiago.cl"&gt;Biblioteca de Santiago&lt;/a&gt;, a library in Santiago, a beautiful modern building, with an architecture that rivalled the best libraries I ever saw in the world. Our local partner&amp;nbsp; &lt;a class="external-link" href="http://rising.globalvoicesonline.org/"&gt;Rising Voices&lt;/a&gt;, had done an incredible job of organizing the logistics. The workshop opened with an ice-breaking exercise that unlike most ice-breaking exercises required some neural movement. Participants were asked to come up with a word that described their practice, politics or ideology. You see the workshop participants were young people who engage with digital technologies to create social and political change. I chose my word ‘innovation’ mainly because it’s an idea that’s been hunting my day-dreams lately, but also because I knew it would elicit interesting responses. I briefly sat down with Luis Carlos from Peru and Joan from the Dominican Republic, whose words were ‘stories’ and also ‘creative’. A blog post about that experience can be found&amp;nbsp;&lt;a class="external-link" href="http://digitalnatives.in/fitoria/blogs/sharing-common-knowledge-freedom"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Afterwards we had the pleasure of hearing from Juan-Manuel, the facilitator from Mexico. Juan-Manuel talked about issues of participation, motivation to do social change, impact of our engagements and other social change related processes. He left us with three big questions that stayed with us for the rest of the afternoon:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;What is our motivation to do social work? Where does it come from? Where does it end? How did it start? Can it be replicated?&lt;/li&gt;&lt;li&gt;What is incidence / impact? How can one measure impact?&lt;/li&gt;&lt;li&gt;What does one need to know to create social impact?&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;I got in a group with Adolfo from Nicaragua, Maria Del Mar from Paraguay, Karl from Haiti and Julio from Chile. Kara was our facilitator for the discussion. A blog post about that experience by Maria Del Mar can be found&amp;nbsp;&lt;a class="external-link" href="http://digitalnatives.in/marzavala/blogs/motivation-incidence-knowledge-0"&gt;here&lt;/a&gt;.&amp;nbsp;
After discussing for about one hour, we made a white paper that visually illustrated` our discussion. We decided to make a word / concept cloud and mix it with a collage. That was it. With a lot of anticipation and nervousness the first day of our workshop ended.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/chile3.JPG/image_preview" alt="Chile3" class="image-inline" title="Chile3" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Oh wait! I forgot to add a small detail, that day Nishant also taught us how to do a Bollywood dance. I didn’t take any pictures, but I hope someone did!&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Chileworkshop2.jpg/image_preview" alt="Chile4" class="image-inline image-inline" title="Chile4" /&gt;&lt;/p&gt;
&lt;p&gt;On the second day, Pedro Markun from Brazil opened the floor with a thought-provoking presentation. Unfortunately, I missed most of the presentation, but if one is to judge by the tweets, it was very inspiring. After the presentation, we participated in a bar camp. During this activity participants proposed the topics for discussion, out of which we selected five to focus on. I decided to join the conversation about ‘digital rights’, a topic proposed by Andres from Venezuela. Brendon from Trinidad and Tobago, Luis Carlos and Roberto from Peru, and Joan from the DR also participated in this discussion. I wrote a small blog about my opinion on this conversation &lt;a class="external-link" href="http://digitalnatives.in/tettner/blogs/discussion-about-digital-rights"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;During the second half of the day, the process was reversed and instead of us participants writing down concepts we wanted to talk about, five words were written on the board: mobilization, network building, awareness, campaigns, and representation. This activity, called HOW DO YOU SPELL PROCESS? asked us to choose the word with which we identify the most; it could be the word we know the most about, or the least about, or the word we’re most interested in implementing in our practice. I joined the mobilization group, because part of the job as the community manager for the Digital Natives project involved motivating the members, involving them in other’s ideas, helping them connect with greater initiatives – all ideas that I think connect with mobilization issues. I sat down with Maria Carmelita from Argentina, Brendon from T&amp;amp;B and Francisco from Chile.&lt;/p&gt;
&lt;p&gt;After we were all settled in the group plenary after this activity, Fieke had a dictatorial proclamation to make: we then had around 12 hours to make a visual presentation (a video, a play, a sketch and others) about our discussions during HOW DO YOU SPELL PROCESS?&lt;/p&gt;
&lt;p&gt;I met Brendon, Francisco, and Carmelita shortly after for dinner and the planning of our video. We decided to have an Indian night, which is ironic since I now live in India, yet the experience was very interesting: I tried ‘curry’ for the first time in my life! &amp;nbsp;For our video, we decided to make a cheesy, 1984-esque “how to” video to change the world through mobilization. The video can be found&amp;nbsp;&lt;a class="external-link" href="http://digitalnatives.in/mariacarmelita/videos/mobilisation-three-steps-program-0"&gt;here&lt;/a&gt;. Check out the other videos as well, they all are quite interesting and thought-provoking.&lt;/p&gt;
&lt;p&gt;Finally, on the third day after a showing of the videos and plays, the last facilitator, Kara from Guatemala, shared with us her personal journey into her social commitment. From growing up in a banana plantation in Guatemala, to her use of digital technologies to raise funds to build a house for her uncle, Kara’s story inspired all in attendance. Kara told her story through a specific framework, which was named the Matrix. The Matrix consisted of re-framing one’s story through four lenses: dream, discovery, design and destiny. We then broke into groups and reflected into our own journeys with technology using the same framework.&lt;/p&gt;
&lt;p&gt;In the end, we all went to a nice restaurant and had a common dinner. I love those tables of over 20+people; you can switch seats and change conversations instantly. Overall, the workshop was a huge learning experience. I was able to meet some similar people from Latin America, and better understand the cultural context of the intersection of technology and the social and the political spheres. With the last workshop now over, we have collected a plethora of research materials which we will analyze during the second phase of the Digital Natives with a Cause? project. The journey still continues.&lt;/p&gt;
&lt;p&gt;Thanks to all of you who made the
experience Possible!.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Chileworkshop1.jpg/image_preview" alt="chile2" class="image-inline image-inline" title="chile2" /&gt;&lt;/p&gt;
&lt;p&gt;For info on&amp;nbsp;schedule of events, organisers and participants, click &lt;a href="https://cis-india.org/digital-natives/publications/workshop-schedule/at_download/file" class="internal-link" title="Digital Natives Santiago Workshop Schedule"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/santiago-workshop-an-after-thought'&gt;https://cis-india.org/digital-natives/blog/santiago-workshop-an-after-thought&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tettner</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2012-01-03T10:16:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary">
    <title>Privacy Matters — Conference Report</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary</link>
    <description>
        &lt;b&gt;A one-day conference on Privacy Matters was held on Sunday, 23 January 2011 at the National University of Juridical Sciences (NUJS) Law School in Kolkata. This was the first of a series of eleven conferences on ‘privacy’ that Privacy India is scheduled to host in different Indian cities from January to June this year. Members of Parliament, Sri Manoj Bhattacharya from the Revolutionary Socialist Party (RSP) and Sri Nilotpal Basu from the Communist Party of India (Marxist) CPI (M) spoke in the conference. Students, the civil society and lawyers also participated in it.&lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The conference was held to discuss elements of the privacy legislation that has been proposed to the Parliament of India, and the UID Bill and project. The conference focused on the tensions between privacy and society that exist in India today, and acted as a space for opinion sharing and discussion. Privacy India which was formed under the auspices of&amp;nbsp; Privacy International, a UK based organization that works to protect the right of privacy around the world, the Centre for Internet and Society (CIS), an NGO based in Bangalore, and Society in Action Group (SAG), an NGO based in Delhi joined hands to host this event.&lt;/p&gt;
&lt;p&gt;Rajan Gandhi, founder of SAG opened the conference with an explanation of the mandate of Privacy India, the objective of which is of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. &amp;nbsp;One of Privacy India's goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, legislators and the legal and academic community.&lt;/p&gt;
&lt;h3&gt;Keynote&lt;/h3&gt;
&lt;p&gt;The keynote speech was delivered by Dr. Sudhir Krishnaswamy professor of law and governance. Dr. Krishnaswamy began by outlining the present situation of privacy in India. The right to privacy has been read into Sections 19 and 21 of the Constitution of India through case law, which has defined privacy — among other things — as the right to personal autonomy, the right against unreasonable search and seizure, and as a fundamental right that is critical to the person, but does not supersede public or national interest. Dr. Krishnaswamy also raised many intriguing questions including: &amp;nbsp;what does privacy mean to India — is it linked to a person’s dignity and their honour? Or is it purely concerned with misappropriation of information, and further is privacy in India an issue of the individual or an issue of the family and the community? He also described the philosophical groundings of privacy as being in the right to dignity, the right to autonomy, and the misappropriation of information. &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Privacy Challenges&lt;/h3&gt;
&lt;p&gt;The conference was spread into three sessions. In the first session Prashant Iyengar, head researcher of the project at Privacy India, spoke about the challenges that India specifically is facing in shaping a privacy legislation including: the need to balance the right to information/transparency and privacy, the need to create a definition of privacy that does not exclude lower classes and is not a negative right, but instead a positive right, and the problem of ubiquitous surveillance that is happening in society today. &amp;nbsp;Elonnai Hickok, policy analyst at Privacy India, spoke specifically on wire tapping, and the Nira Radia tapes. In her presentation she first outlined other countries definitions of privacy which include: the right to be left alone, the protection from unauthorized searches, and the right to control information about oneself through consent. &amp;nbsp;Using the case study of Nira Radia and Ratan Tata she spoke about the rising concern of wire tapping in the country as being indicative of a social change and relationship of the state and government. Elonnai also raised questions concerning whether privacy should be made inversely proportional to public figures, and if public interest will always supersede the private right of individuals.&lt;/p&gt;
&lt;h3&gt;UID and Privacy&lt;/h3&gt;
&lt;p&gt;The second session of the conference focused on the UID Bill and privacy. Presentations from NUJS student Amba Kak and Sai Vinod raised concerns about the UID project and privacy. Their presentation also compared and contrasted identity schemes of other countries with the UID. A few similarities that they found amongst all scheme were: the collection of data, the processing of data, and the storing of data. &amp;nbsp;Deva &amp;nbsp;Prasad from the National Law School of Bangalore presented on constitutional elements of the UID scheme ranging from loopholes in the Bill to connections that can be made when the UID Bill is placed in the larger picture. &amp;nbsp;Sri Manoj Bhattacharya (MP) from RSP voiced his concerns of the UID, and emphasized that by giving an individual a number which acts as their fundamental identity which they use to function in society, the government in fact is eroding an individual’s actual identity, and that is an invasion of privacy. &amp;nbsp;Sri Nilotpal Basu (MP) from CPI (M) spoke out strongly against the UID, voicing that his greatest concern with the UID is that it will be a way for corporate bodies to target individuals as consumers, and that privacy legislation could be used as a way for corporate bodies to hide from the public eye.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;In the concluding session the floor was opened up to the public for questions and opinion sharing. Many participants shared what they believed needed to be included in privacy legislation, and what issues a privacy legislation needs to address. A few of these include: privacy rights and the media, privacy and the right to information, the privacy rights of minorities, and the privacy rights of the government. Also types of regulatory models for privacy were discussed. For instance, should privacy in India be represented and protected through a data protection law, or should privacy be seen as a fundamental right to privacy? Should privacy be represented through a broad framework, or through sector specific statutes? What should the redressal and enforcement mechanisms look like?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As seen from the presentations and the comments at the conference one thing which is clear is that privacy is an issue that concerns every person in India. Over the next six months Privacy India will be conducting ten more conferences in different Indian cities to engage the public in dialogues of privacy and raise awareness around the issues of privacy. &amp;nbsp;The next workshop will be held on 5 February 2011 in Bangalore.&lt;/p&gt;
&lt;p&gt;Download the conference summary &lt;a href="https://cis-india.org/internet-governance/blog/privacy-kolkata-report" class="internal-link" title="Privacy India Calcutta Conference"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-01-27T10:22:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
