<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/digital-natives/pathways/learning-in-higher-education/search_rss">
  <title>Pathways to Higher Education</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 111 to 125.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/international-open-data-charter-comments-by-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/workshop-on-open-data-for-human-development-2015-06-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-activism-in-asia-reader"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/studying-the-emerging-database-state-in-india-accepted-abstract"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/konkani-wikipedia-goes-live"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/open-data-intermediaries-in-developing-countries"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/workshop-on-open-data-for-human-development-2015-06"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/making-in-the-humanities-2013-some-questions-and-conflicts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/studying-internet-in-india-selected-abstracts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015">
    <title>Open Letter to PM Modi on Intellectual Property Rights issues on His Visit to the United States of America in September, 2015</title>
    <link>https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015</link>
    <description>
        &lt;b&gt;This is an open letter by CIS to the Prime Minister, Shri Narendra Modi in light of his impending visit to the USA. This letter asks the Prime Minister to urge the USA to ratify the Marrakesh Treaty; and asks that India not be a party to TPP negotiations, in light of recent reports on a study encouraging India to join the TPP.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Shri Narendra Damodardas Modi&lt;br /&gt;Hon’ble Prime Minister of India&lt;br /&gt;152, South Block, Raisina Hill&lt;br /&gt;New Delhi-110011&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;22 September, 2015&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Dear Sir,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We write on behalf of the Centre for Internet and Society, India &lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt;, a Bangalore and New Delhi based not-for-profit organization engaging in research on among others, accessibility for persons with disabilities, intellectual property rights, openness and access to knowledge. Over the past fifteen months, we have welcomed and support certain initiatives of our government as being in line with some of our research interests, specifically, the "Make in India" and "Digital India" initiatives, and your vision of a digitally empowered India, as we have noted in an earlier open letter to you. &lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This letter is in light of your visit to the United States of America (“USA”) this month, to articulate a two-fold request:&lt;em&gt; first, &lt;/em&gt;that during the course of your visit you request the government of the USA to ratify the Marrakesh Treaty for visually impaired persons (“Marrakesh Treaty”); &lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt; and &lt;em&gt;second, &lt;/em&gt;that the Indian government not enter into any negotiations around the Trans-Pacific Partnership trade agreement (“the TPP”).&lt;/p&gt;
&lt;h3&gt;On the Marrakesh Treaty&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;According to figures by the World Blind Union, approximately 90% of all published material is not accessible to blind or print disabled people. &lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt; The severity of the ‘book famine’ experienced by the world’s estimated 300 million blind or otherwise print or visually disabled people (of which an estimated 63 million are in India) was highlighted by India in its Closing Statement at the Diplomatic Conference convened to conclude the Marrakesh Treaty. &lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt; India has historically been a strong advocate of the spirit of the Marrakesh Treaty, becoming the first country to ratify it in June, 2014. &lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; Amendments in 2012 to India’s copyright law predated the signature to the Marrakesh Treaty. These amendments created disability and works neutral exceptions to our copyright law, well beyond the mandate of the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The true realization of the promise of the Marrakesh Treaty however will remain a distant dream until the treaty comes into effect (three months) after 20 Member States have ratified it or acceded to it. &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt; According to information available from the World Intellectual Property Organization &lt;a name="_ftnref8" href="#_ftn8"&gt;[8]&lt;/a&gt;, this number is currently only 9, and the USA is not one of the countries to have done so. The USA is home &lt;a name="_ftnref9" href="#_ftn9"&gt;[9]&lt;/a&gt; to some of the largest publishers of both academic and other/leisure material including Penguin Random House, Harper Collins, John Wiley &amp;amp; Sons, the RELX Group, McGraw-Hill Education, Scholastic and Cengage Learning to name a few. It accounts for a large volume of the world’s book and other print material export. The active participation of the USA through the ratification of the Marrakesh treaty is critical if the treaty is to be truly effective.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;During your visit, we urge you request the government of the United States of America to ratify the Marrakesh Treaty at the earliest. This will bring us one important step closer to eradicating the book famine.&lt;/p&gt;
&lt;h3&gt;On the TPP&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;We are concerned after reports &lt;a name="_ftnref10" href="#_ftn10"&gt;[10]&lt;/a&gt; of a recent study authored by C Fred Bergsten that encourages India to join the TPP. On this front, we are in complete agreement with the reported statement of the Hon’ble Ambassador Shri Arun K. Singh, where he disagrees with some of the findings and analysis of this recent report. &lt;a name="_ftnref11" href="#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The TPP has come into severe criticism &lt;a name="_ftnref12" href="#_ftn12"&gt;[12]&lt;/a&gt; over the years &lt;a name="_ftnref13" href="#_ftn13"&gt;[13]&lt;/a&gt; from a vast multitude &lt;a name="_ftnref14" href="#_ftn14"&gt;[14]&lt;/a&gt; of sources &lt;a name="_ftnref15" href="#_ftn15"&gt;[15]&lt;/a&gt; (including a group of 30 law professors in 2012) &lt;a name="_ftnref16" href="#_ftn16"&gt;[16]&lt;/a&gt; across the various countries that are a party to the negotiations. Among others and most relevant to us as an organization is the criticism around the secrecy of negotiations &lt;a name="_ftnref17" href="#_ftn17"&gt;[17]&lt;/a&gt; as well as the content of the chapter on intellectual property in the TPP. It is our belief that eventually, India stands to lose as a result of the TPP &lt;a name="_ftnref18" href="#_ftn18"&gt;[18]&lt;/a&gt; with its possible adverse impact on our economy. &lt;a name="_ftnref19" href="#_ftn19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The rigid intellectual property protections (including criminal penalties for unintentional copying) &lt;a name="_ftnref20" href="#_ftn20"&gt;[20]&lt;/a&gt; sought to be enforced through the TPP would benefit only US pharmaceutical and entertainment industries. &lt;a name="_ftnref21" href="#_ftn21"&gt;[21]&lt;/a&gt; These provisions (among others) mandate the inclusion of TRIPS plus provisions in national laws, envisage possible extensions in term of protection on patents, restrict copyright exceptions and limitations, extend copyright protection terms and impose a higher liability on intermediaries; &lt;a name="_ftnref22" href="#_ftn22"&gt;[22]&lt;/a&gt;all of which would be disastrous for an emerging economy such as India’s, which is a heavy user of intellectual property and not a heavy producer of the same.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Historically, India has been a supporter of a transparent, multilateral decision making process, a commitment to which was also reiterated recently by the Hon’ble Minister of State for Commerce and Industry, Smt. Nirmala Sitharaman. &lt;a name="_ftnref23" href="#_ftn23"&gt;[23]&lt;/a&gt;India has also raised many of its concerns (on the secrecy of the negotiations as well as substantive provisions themselves) around the TPP and its close cousin, the Anti-Counterfeiting Trade Agreement (“ACTA”) in 2011 &lt;a name="_ftnref24" href="#_ftn24"&gt;[24]&lt;/a&gt; and 2012 &lt;a name="_ftnref25" href="#_ftn25"&gt;[25]&lt;/a&gt; at the World Trade Organization (“WTO”) TRIPS Council and on the ACTA in 2010, also at the WTO Trips Council. &lt;a name="_ftnref26" href="#_ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In light of the above, we strongly urge the Indian government to not engage in negotiations on the TPP. At a minimum, we would request that any engagement in TPP negotiations be preceded by national consultations on the same, soliciting input from various stakeholders with diverging interests, including academia, civil society, industry associations, large Indian corporations, small and medium enterprises and multi- national corporations, rights holders associations and other interest groups.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We thank you for the opportunity to present these views to you. We do hope that you will consider these suggestions favourably, in the interests of India’s economic and social development. We welcome any opportunity to assist you with any queries you may have with regard to these submissions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thank you.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Yours truly&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(For the Centre for Internet and Society, India)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Pranesh Prakash,&amp;nbsp; Policy Director&lt;br /&gt;Nehaa Chaudhari, Programme Officer&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Copies to:&lt;/p&gt;
&lt;ol style="text-align: justify;" type="1"&gt;
&lt;li&gt;Smt. Smriti Zubin Irani, Minister for Human Resource Development, Government of India.&lt;/li&gt;
&lt;li&gt;Prof. (Dr.) Ram Shankar Katheria, Minister of State for Human Resource Development (Higher Education), Government of India.&lt;/li&gt;
&lt;li&gt;Smt. Nirmala Sitharaman, Minister of State for Commerce and Industry, Government of India.&lt;/li&gt;
&lt;li&gt;Shri Vinay Sheel Oberoi, Secretary (Department of Higher Education), Ministry of Human Resources Development, Government of India, Government of India.&lt;/li&gt;
&lt;li&gt;Shri Amitabh Kant, Secretary (Department of Industrial Policy and Promotion), Ministry of Commerce and Industry, Government of India.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;br /&gt;&lt;br /&gt;(Edit - 25 September, 2015) - The following people have reached out to us in support of this letter and have expressed a desire to have their signatures placed on record as support. We wish to acknowledge the same.&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Prof. Dinesh Abrol - Convenor, National Working Group on Patent Laws and WTO&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Dr. B. Ekbal - President, Democratic Alliance for Knowledge Freedom, Kerala&lt;/li&gt;&lt;li&gt;T.C. James - President, NIPO&lt;/li&gt;&lt;li&gt;Dr. Suman Sahai - Chairperson, Gene Campaign&lt;/li&gt;&lt;li&gt;Dr. Biswajit Dhar - Professor, Centre for Economic Studies and Planning, School of Social Sciences, Jawaharlal Nehru University&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt;See generally &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt;Rohini Lakshane, Open Letter to Prime Minister Modi, available at &lt;a href="http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi&lt;/a&gt; (last accessed 22 September, 2015); Centre for Internet and Society/Rohini Lakshane, Digital India &amp;amp; Make in India : Form a patent pool of critical mobile technologies – CIS India, available at &lt;a href="http://www.medianama.com/2015/03/223-digital-india-make-in-india-form-a-patent-pool-of-critical-mobile-technologies-cis-india/" rel="noreferrer"&gt;http://www.medianama.com/2015/03/223-digital-india-make-in-india-form-a-patent-pool-of-critical-mobile-technologies-cis-india/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt;The Marrakesh Treaty to Facilitate Access to Published Works by Visually Impaired Persons and Persons with Print Disabilities adopted on June 27, 2013. Treaty text and other official documentation available at &lt;a href="http://www.wipo.int/treaties/en/ip/marrakesh/" rel="noreferrer"&gt;http://www.wipo.int/treaties/en/ip/marrakesh/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt;World Blind Union, Marrakesh Treaty – Right to Read Campaign, available at &lt;a href="http://www.worldblindunion.org/English/our-work/our-priorities/Pages/right-2-read-campaign.aspx" rel="noreferrer"&gt;http://www.worldblindunion.org/English/our-work/our-priorities/Pages/right-2-read-campaign.aspx&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt;Pranesh Prakash, India’s Closing Statement at Marrakesh on the Treaty for the Blind, available at &lt;a href="http://cis-india.org/a2k/blogs/india-closing-statement-marrakesh-treaty-for-the-blind"&gt;http://cis-india.org/a2k/blogs/india-closing-statement-marrakesh-treaty-for-the-blind&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt;Nehaa Chaudhari, India’s Ratification of the Marrakesh Treaty Celebrated; Accessible Books Consortium Launched, available at &lt;a href="http://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated"&gt;http://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt;Article 18 of the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt;World Intellectual Property Organization, WIPO Administered Treaties: Contracting Parties &amp;gt; Marrakesh VIP Treaty (Treaty not yet in force), available at &lt;a href="http://www.wipo.int/treaties/en/ShowResults.jsp?lang=en&amp;amp;treaty_id=843" rel="noreferrer"&gt;http://www.wipo.int/treaties/en/ShowResults.jsp?lang=en&amp;amp;treaty_id=843&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt;Publishers Weekly, The World’s 57 Largest Book Publishers, 2015, available at &lt;a href="http://www.publishersweekly.com/pw/by-topic/international/international-book-news/article/67224-the-world-s-57-largest-book-publishers-2015.html" rel="noreferrer"&gt;http://www.publishersweekly.com/pw/by-topic/international/international-book-news/article/67224-the-world-s-57-largest-book-publishers-2015.html&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt;S Rajagopalan, US Report Pushes India to Join the Trans-Pacific Partnership, available at &lt;a href="http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html" rel="noreferrer"&gt;http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html&lt;/a&gt; (last accessed 22 September, 2015); Indo-Asian News Service on NDTV, India Can Boost Exports by $500 Billion with Trade Liberalization: Study, available at &lt;a href="http://www.ndtv.com/india-news/india-can-boost-exports-by-500-billion-with-trade-liberalization-study-1218887" rel="noreferrer"&gt;http://www.ndtv.com/india-news/india-can-boost-exports-by-500-billion-with-trade-liberalization-study-1218887&lt;/a&gt; (last accessed 22 September, 2015); Raghavendra M., India can boost exports by $500 billion with trade liberalization: study, available at &lt;a href="http://www.americanbazaaronline.com/2015/09/18/india-can-boost-exports-by-500-billion-with-trade-liberalization-study/" rel="noreferrer"&gt;http://www.americanbazaaronline.com/2015/09/18/india-can-boost-exports-by-500-billion-with-trade-liberalization-study/&lt;/a&gt; (last accessed 22 September, 2015); Press Trust of India in the Business Standard, India can boost exports by USD 500 bn by joining the TPP: report, available at &lt;a href="http://www.business-standard.com/article/pti-stories/india-can-boost-exports-by-usd-500-bn-by-joining-tpp-report-115091701149_1.html" rel="noreferrer"&gt;http://www.business-standard.com/article/pti-stories/india-can-boost-exports-by-usd-500-bn-by-joining-tpp-report-115091701149_1.html&lt;/a&gt; (last accessed 22 September, 2015); Seema Sirohi, India must expand its trade before it gets left behind in the race, available at &lt;a href="http://blogs.economictimes.indiatimes.com/letterfromwashington/india-must-expand-its-trade-before-it-gets-left-behind-in-the-race/" rel="noreferrer"&gt;http://blogs.economictimes.indiatimes.com/letterfromwashington/india-must-expand-its-trade-before-it-gets-left-behind-in-the-race/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt;S Rajagopalan, US Report Pushes India to Join the Trans-Pacific Partnership, available at &lt;a href="http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html" rel="noreferrer"&gt;http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html&lt;/a&gt; (last accessed 22 September, 2015)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt;Natasha Lennard, Noam Chomsky: Trans-Pacific Partnership is a “neoliberal assault”, available at &lt;a href="http://www.salon.com/2014/01/13/chomsky_tpp_is_a_neoliberal_assault/" rel="noreferrer"&gt;http://www.salon.com/2014/01/13/chomsky_tpp_is_a_neoliberal_assault/&lt;/a&gt; (last accessed 22 September, 2015); Zach Carter and Ryan Grim, Noam Chomsky: Obama Trade Deal a ‘Neoliberal Assault’ to ‘Further Corporate Domination’, available at &lt;a href="http://www.huffingtonpost.com/2014/01/13/noam-chomsky-obama-trans-pacific-partnership_n_4577495.html?ir=India&amp;amp;adsSiteOverride=in" rel="noreferrer"&gt;http://www.huffingtonpost.com/2014/01/13/noam-chomsky-obama-trans-pacific-partnership_n_4577495.html?ir=India&amp;amp;adsSiteOverride=in&lt;/a&gt; (last accessed 22 September, 2015); Sean Flynn;, Margot E Kaminski, Brook K Baker and Jimmy H Koo., "Public Interest Analysis of the US TPP Proposal for an IP Chapter" (2011). PIJIP Research Paper Series. Paper 21. &lt;a href="http://digitalcommons.wcl.american.edu/research/21" rel="noreferrer"&gt;http://digitalcommons.wcl.american.edu/research/21&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt;BBC News, TPP: What is it and why does it matter?, available at &lt;a href="http://www.bbc.com/news/business-21782080" rel="noreferrer"&gt;http://www.bbc.com/news/business-21782080&lt;/a&gt; (last accessed 22 September, 2015);&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt;For a compilation on writing on the TPP &lt;em&gt;see&lt;/em&gt; James Love, Trans-Pacific Partnership (TPP also known as the TPPA), available at &lt;a href="http://keionline.org/tpp" rel="noreferrer"&gt;http://keionline.org/tpp&lt;/a&gt; (last accessed 22 September, 2015); &lt;em&gt;see also &lt;/em&gt;American University Program on Information Justice and Intellectual Property, Trans-Pacific Partnership, available at &lt;a href="http://infojustice.org/tpp" rel="noreferrer"&gt;http://infojustice.org/tpp&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt;Zach Carter, Alan Grayson on Trans-Pacific Partnership: Obama Secrecy Hides ‘Assault on Democratic Government’, available at &lt;a href="http://www.huffingtonpost.com/2013/06/18/alan-grayson-trans-pacific-partnership_n_3456167.html?ir=India&amp;amp;adsSiteOverride=in" rel="noreferrer"&gt;http://www.huffingtonpost.com/2013/06/18/alan-grayson-trans-pacific-partnership_n_3456167.html?ir=India&amp;amp;adsSiteOverride=in&lt;/a&gt; (last accessed 22 September, 2015); James Love, KEI analysis of Wikileaks leak of TPP IPR text, from August 30, 2013, available at &lt;a href="http://keionline.org/node/1825" rel="noreferrer"&gt;http://keionline.org/node/1825&lt;/a&gt; (last accessed 22 September, 2015); Ian Verrender, The TPP has the potential for real harm, available at &lt;a href="http://www.abc.net.au/news/2015-03-16/verrender-the-tpp-has-the-potential-for-real-harm/6321538" rel="noreferrer"&gt;http://www.abc.net.au/news/2015-03-16/verrender-the-tpp-has-the-potential-for-real-harm/6321538&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt;Sean Flynn, Law Professors Call for Trans-Pacific Partnership (TPP) Transparency, available at &lt;a href="http://infojustice.org/archives/21137" rel="noreferrer"&gt;http://infojustice.org/archives/21137&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt;Sachie Mizohata, "The Trans-Pacific Partnership and Its Critics: An introduction and a petition," The Asia-Pacific Journal, Vol. 11, Issue 36, No. 3, available at &lt;a href="http://japanfocus.org/-Sachie-MIZOHATA/3996/article.html" rel="noreferrer"&gt;http://japanfocus.org/-Sachie-MIZOHATA/3996/article.html&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt;Vijay Rajamohan, Trans-Pacific Partnership – Should India Join this Mega Trade Deal?, available at &lt;a href="http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/" rel="noreferrer"&gt;http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt;Sylvia Mishra, How will the Trans-Pacific Partnership affect India?, available at &lt;a href="http://www.observerindia.com/cms/sites/orfonline/modules/analysis/AnalysisDetail.html?cmaid=85684&amp;amp;mmacmaid=85685" rel="noreferrer"&gt;http://www.observerindia.com/cms/sites/orfonline/modules/analysis/AnalysisDetail.html?cmaid=85684&amp;amp;mmacmaid=85685&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt;Gabrielle Chan, Trans-Pacific Partnership: a guide to the most contentious issues, available at &lt;a href="http://www.theguardian.com/world/2013/dec/10/trans-pacific-partnership-a-guide-to-the-most-contentious-issues" rel="noreferrer"&gt;http://www.theguardian.com/world/2013/dec/10/trans-pacific-partnership-a-guide-to-the-most-contentious-issues&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt;James Love, New leak of TPP consolidated text on intellectual property provides details of pandering to drug companies and publishers, available at &lt;a href="http://www.keionline.org/node/2108" rel="noreferrer"&gt;http://www.keionline.org/node/2108&lt;/a&gt; (last accessed 22 September, 2015); Vijay Rajamohan, Trans-Pacific Partnership – Should India Join this Mega Trade Deal?, available at &lt;a href="http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/" rel="noreferrer"&gt;http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/&lt;/a&gt; (last accessed 22 September, 2015) referencing Paul Krugman.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt;William New, Leaked TPP Draft Reveals Extreme Rights Holder Position Of US, Japan, Outraged Observers Say, available at &lt;a href="http://www.ip-watch.org/2014/10/17/leaked-tpp-draft-reveals-extreme-rights-holder-position-of-us-japan-outraged-observers-say/" rel="noreferrer"&gt;http://www.ip-watch.org/2014/10/17/leaked-tpp-draft-reveals-extreme-rights-holder-position-of-us-japan-outraged-observers-say/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt;Lalit K Jha, India not being left out of global trade pacts: Minister, available at &lt;a href="http://www.thestatesman.com/news/business/india-not-being-left-out-of-global-trade-pacts-minister/91679.html" rel="noreferrer"&gt;http://www.thestatesman.com/news/business/india-not-being-left-out-of-global-trade-pacts-minister/91679.html&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt;Thirukumaran Balasubramaniam, WTO TRIPS Council: India raises concerns on ACTA and TPPA on discussion of “Trends in the Enforcement of IPRs”, available at &lt;a href="https://donttradeourlivesaway.wordpress.com/2011/10/29/wto-trips-council-india-raises-concerns-on-acta-and-tppa-on-discussion-of-trends-in-the-enforcement-of-iprs/" rel="noreferrer"&gt;https://donttradeourlivesaway.wordpress.com/2011/10/29/wto-trips-council-india-raises-concerns-on-acta-and-tppa-on-discussion-of-trends-in-the-enforcement-of-iprs/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt;Thirukumaran Balasubramaniam, 28 Feb 2012: Intervention delivered by India at WTO TRIPS Council on IP Enforcement Trends noting concerns with ACTA and TPPA, available at &lt;a href="http://keionline.org/node/1376" rel="noreferrer"&gt;http://keionline.org/node/1376&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt;Kanaga Raja, ACTA comes in for criticism at the TRIPS council, available at &lt;a href="http://www.twn.my/title2/wto.info/2010/twninfo100606.htm" rel="noreferrer"&gt;http://www.twn.my/title2/wto.info/2010/twninfo100606.htm&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015'&gt;https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pranesh Prakash and Nehaa Chaudhari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-09-25T06:43:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/international-open-data-charter-comments-by-cis">
    <title>International Open Data Charter: Comments by CIS</title>
    <link>https://cis-india.org/openness/international-open-data-charter-comments-by-cis</link>
    <description>
        &lt;b&gt;The second meeting of Stewards of the International Open Data Charter is in progress in Santiago, Chile, where the revisions made to the Charter based on the comments received during the public consultation period that ended on July 31, 2015, are being re-discussed and finalised by the Stewards. Here we are sharing the comments submitted by us on the first public draft of the Charter published during the International Open Data Conference in Ottawa, Canada, in May 2015. The comments include those submitted by Sumandro and Sharath Chandra Ram.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The draft International Open Data Charter and all the submitted comments can be accessed here: &lt;a href="http://opendatacharter.net/charter/" target="_blank"&gt;http://opendatacharter.net/charter/&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Comments on the Public Draft&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Note: The text below contains excerpts from the public draft of the Charter, followed by submitted comments in &lt;strong&gt;bold&lt;/strong&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;1) The world is witnessing the growth of a global movement facilitated by technology and digital media and fuelled by information – one that contains enormous potential to create more accountable, efficient, responsive, and effective governments and businesses, and to spur economic growth.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The word ‘movement’ can perhaps be replaced by ‘transformation.’ ‘Movement’ tends to suggest some kind of unity of purpose or objective, which is not perhaps what is meant here. Also, is it possible to add ‘transparent’ to ‘accountable, efficient, responsive, and effective’?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Open data sit at the heart of this global movement.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Perhaps ‘transformation’ and not ‘movement’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2) Building a more democratic, just, and prosperous society requires transparent, accountable governments that engage regularly and meaningfully with citizens. Accordingly, there is an ongoing effort to enable collaboration around key social challenges, to provide effective oversight of government activities, to support economic development through innovation, and to develop effective, efficient public policies and programmes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Perhaps insert ‘sustainable’ before ‘economic development’. In the second sentence, none of the action phrases (‘enable collaboration’ and ‘effective oversight’ and ‘innovation’ and ‘develop effective, efficient’) are speaking about either democracy or justice. The focus seems to be completely on effectiveness. Phrases like ‘transparent’, ‘accountable’, and ‘participatory’ should be introduced here.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Open data is essential to meeting these challenges.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The above point clarifies why ‘data is essential’ but not why ‘open data is essential’. The connection between democracy and justice on one hand, and open data on the other is not yet articulated clearly.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3) Effective access to data allows individuals and organisations to develop new insights and innovations that can generate social and economic benefits to improve the lives of people around the world, and help to improve the flow of information within and between countries. While governments collect a wide range of data, they do not always share these data in ways that are easily discoverable, useable, or understandable by the public.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Along with allowing ‘insights’ and ‘innovations’ to develop, can it also be highlighted that open data make decisions and processes transparent?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is a missed opportunity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I agree with above comments that it is perhaps better to articulate this not as ‘missed opportunity’ but to highlight this as the very ‘opportunity’ that the open data agenda is interested in capturing.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;4) Today, many people expect to be able to access high quality information and services, including government data, when and how they want. Others see the opportunity presented by government data as one which can provide innovative policy solutions and support economic and social benefits for all members of society. We have arrived at a point at which people can use open data to generate value, insights, ideas, and services to create a better world for all.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This point may also mention that some people are interested in using government data to open up government decisions and processes and make them transparent, which is a necessary condition for making the government accountable.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;6) Providing access to government data can drive sustainable and inclusive growth by empowering citizens, the media, civil society, and the private sector to identify gaps, and work toward better outcomes for public services in areas such as health, education, public safety, environmental protection, and governance. Open data can do this by:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Perhaps ‘democratic participation’ can be added after ‘sustainable and inclusive growth’. That is: ‘Providing access to government data can drive sustainable and inclusive growth, and democratic participation, by empowering citizens…’&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;7) Open government data can be used in innovative ways to create useful tools and products that help to navigate modern life more easily. Used in this way, open data are a catalyst for innovation in the private sector, supporting the creation of new markets, businesses, and jobs. These benefits can multiply as more private sector and civil society organisations adopt open data practices modelled by government and share their own data with the public.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The incentive for private sector and CSOs to open up data is not clear. Overall benefit may rise with them opening up data, but how does a private company / CSO benefit by opening up its data?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;8) We, the adherents to the International Open Data Charter, agree that open data are an under-used resource with huge potential to encourage the building of stronger, more interconnected societies that better meet the needs of our citizens and allow innovation and prosperity to flourish.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Along with ‘stronger’ and ‘more interconnected’, please mention ‘more transparent’ and ‘more democratic’. Also it is not clear what is meant by ‘stronger’. ‘[B]etter meet the needs of our citizens’ does not necessarily suggest a more democratic or just society, but a more effective welfare distribution system. Please add ‘… and empower the citizens to ensure accountability of the government.’&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;9) We therefore agree to follow a set of principles that will be the foundation for access to, and the release and use of, open government data. These principles are:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Open Data by Default;&lt;/li&gt;
&lt;li&gt;Quality and Quantity;&lt;/li&gt;
&lt;li&gt;Accessible and Useable by All;&lt;/li&gt;
&lt;li&gt;Engagement and Empowerment of Citizens;&lt;/li&gt;
&lt;li&gt;Collaboration for Development and Innovation&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Does it makes sense to remove the ‘Quantity and Quality’ point and merging it with ‘Accessible and Usable by All’? Data quantity and quality issues, along with those related to publication of data, can all logically follow under the topic of data access and use. For example, highly aggregated data published once a year without documentation is not really usable data.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;10) We will develop an action plan in support of the implementation of the Charter and its Technical Annexes, and will update and renew the action plan at a minimum of every two years. We agree to commit the necessary resources to work within our political and legal frameworks to implement these principles in accordance with the technical best practices and timeframes set out in our action plan.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We (at CIS) strongly feel that the Charter should also prescribe that along with the national Action Plan, Open Data Citizen’s Charters are created for various levels and verticals of the government. This will clarify data publication responsibilities and targets at ministerial and sub-national (including city) governmental levels, and will allow for much more effective monitoring (national and international) of the Action Plan implementation process.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;‘[A]t a minimum of every two years’ reads a bit unclear. Does it mean that the Action Plan should be renewed only after two years and not before, or that the Action Plan should be renewed every two years or before that?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;11) We recognise that free access to, and the subsequent use of, government data are of significant value to society and the economy, and that government data should, therefore, be open by default.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Along with clarifying the scope of ‘government data,’ the idea of ‘open’ in the context of data needs a clear definition as an independent point. The document is getting into ‘open by default’ without clarifying what is ‘open’, including both necessary and sufficient conditions.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;12) We acknowledge the need to promote the global development and adoption of tools and policies for the creation, use, and exchange of open data and information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I agree with Mike Linksvayer. This is a great opportunity for the Charter to connect the open data agenda with the wider open agendas, especially that of free and open source softwares. It is very important that this point promotes ‘global development of free and open source tools’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Extending the comment by Jose Subero, along with ‘tools’ and ‘policies’, it will be great to have a mention of ‘standards’ here, which is critical for ensuring ‘interoperability’ and thus ‘harmonisation’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;13) We recognise that the term ‘government data’ is meant in the widest sense possible. This could apply to data held by national, federal, and local governments, international government bodies, and other types of institutions in the wider public sector. This could also apply to data created for governments by external organisations, and data of significant benefit to the public which is held by external organisations and related to government programmes and services (e.g. data on extractives entities, data on transportation infrastructure, etc).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;It is wonderful that the point promotes a wide understanding of ‘government data’ but at the same time it should also define a necessary core understanding of data, just to ensure that governments do not interpret this point too narrowly.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Further, a focus only on data created by public agencies can perhaps be too narrow (for the necessary/core understanding of ‘government data’). With public services delivered increasingly by private agencies and public-private-partnerships, it is crucial that ‘government data’ should explicitly include any data coming out of a process funded by public money (the process may be carried out by a public agency or not). This is an extremely important point from a developing country perspective.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;14) We recognise that there is domestic and international legislation, in particular pertaining to security, privacy, confidentiality, intellectual property, and personally-identifiable and other sensitive information, which must be observed and/or updated where necessary.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;From a developing country perspective, it is very important that the Charter does not keep this critical point dependent on domestic and international legislations. International legislation may not be very developed for all of the mentioned topics, and many countries may not have existing domestic legislations on these topics either. The Charter should mention an internationally acceptable list of concerns / criteria for not opening up data. The list may include the topics mentioned here, like privacy and national security. This need not be a list of sufficient criteria, but of necessary ones.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;15) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;develop and adopt policies and practices to ensure that all government data is made open by default, as outlined in this Charter, while recognising that there are legitimate reasons why some data cannot be released;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;'Administrative reforms’ are most often crucial to make government data ‘open by default, and the same should be mentioned along with ‘policies’ and ‘practices’.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;provide clear justifications as to why certain data cannot be released;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This is a great point. Perhaps it can be added that all government agencies should produce a list of all data assets maintained by them, point out the ones that cannot be made open, and provide clear justification as to why those cannot be released. This comment pre-empts 19.1. Perhaps this point about providing justification for not releasing data can be merged with 19.1.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;develop the leadership, management, oversight, and internal communication policies necessary to enable this transition to a culture of openness.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Along with ‘leadership, management, oversight, and internal communication’, is it possible to add ‘incentives’? This is often overlooked in implementing open data policies.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;16) We recognise that governments and other public sector organisations hold vast amounts of information that may be of interest to citizens, and that it may take time to identify data for release or publication.&lt;/p&gt;
&lt;p&gt;17) We also recognise the importance of consulting with citizens, other governments, non-governmental organisations, and other open data users, to identify which data to prioritise for release and/or improvement.&lt;/p&gt;
&lt;p&gt;18) We agree, however, that governments’ primary responsibility should be to release data in a timely manner, without undue delay.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Points 16-18 seem to suggest that the ‘quantity and quality’ issue is mostly one of prioritisation. This can be misleading. This is perhaps the ‘quantity’ issue, but not at all the ‘quality’ issue.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;19) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;...&lt;/li&gt;
&lt;li&gt;release high-quality open data that are timely, comprehensive, and accurate in accordance with prioritisation that is informed by public requests. To the extent possible, data will be released in their original, unmodified form and at the finest level of granularity available, and will also be linked to any visualisations or analyses created based on the data, as well as any relevant guidance or documentation;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Please add ‘human- and machine-readable’ along with ‘timely, comprehensive, and accurate’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Put ‘, and’ between ‘, and accurate’ and ‘in accordance’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;‘Relevant guidance or documentation’ should be mentioned before, and not after, ‘visualisations or analyses’.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;ensure that accompanying documentation is written in clear, plain language, so that it can be easily understood by all;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Add that the documentation should be ‘comprehensive’, along with being written in plain language.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;make sure that data are fully described, and that data users have sufficient information to understand their source, strengths, weaknesses, and any analytical limitations;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Regarding ‘Full description of data’ — Aggregate data must be accompanied by low level raw data along with details of analytical methods used to arrive at figures. This allows for verification as well as alternate views and detection of statistical anomalies.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;ensure that open datasets include consistent core metadata, and are made available in human- and machine-readable formats under an open and unrestrictive licence;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Is this the necessary definition of ‘open data’? If so, it should be much higher up.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;allow users to provide feedback, and continue to make revisions to ensure the quality of the data is improved as needed; and&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This point should clarify if it is talking about making revisions of the data itself (its content), or how it is being published (its form), or both?&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;apply consistent information lifecycle management practices, and ensure historical copies of datasets are preserved, archived, and kept accessible as long as they retain value.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;The ‘as long as they retain value’ part seems vague. Who is going to take this decision about value? Is it possible to rephrase this as ‘as long as they are demanded by data users’?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;21) We recognise that open data should be made available free of charge in order to encourage their widest possible use.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Maybe ‘government data’ and not ‘open data’ (open data already means it is available gratis). Also, along with ‘free of charge’ maybe add ‘under open license’, as that is a critical requirement for ‘widest possible use.’&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;22) We recognise that when open data are released, they should be made available without bureaucratic or administrative barriers, such as mandatory user registration, which can deter people from accessing the data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I strongly believe that this point should be removed. Registration of the data user can also be very useful for the government agencies to track demand and actual usage of their datasets. Instead of the government agencies doing such kind of tracking as a background process, it is much better if the data usage monitoring of all users is done transparently. Along with perhaps a public dashboard of data usages of the users of an open data portal. As long as the registration barrier does not involve an approval process by the government agency, it can be allowed.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A more general point should be added as part of this principle, regarding no-discrimination (or approval process) among data users interested in accessing and using of open government data.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;23) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;release data in open formats and free of charge to ensure that the data are available to the widest range of users to find, access, and use them. In many cases, this will include providing data in multiple formats, so that they can be processed by computers and used by people; and&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Please add ‘open license’ along with ‘open formats’ and ‘free of charge’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;24) We recognise that the release of open data strengthens our public and democratic institutions, encourages better development, implementation, and assessment of policies to meet the needs of our citizens, and enables more meaningful, better informed engagement between governments and citizens.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Perhaps add ‘, and makes them transparent’ after ‘strengthens our public and democratic institutions’. Please also add ‘monitoring’ along with ‘development, implementation, and assessment’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;25) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;implement oversight and review processes to report regularly on the progress and impact of our open data initiatives;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;The functioning of these ‘oversight and review processes’ must be open and transparent themselves. The reporting should be public.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;engage with community and civil society representatives working in the domain of transparency and accountability to determine what data they need to effectively hold governments to account; encourage the use of open data to develop innovative, evidence-based policy solutions that benefit all members of society, as well as empower marginalised groups; and&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This must also include a point regarding the government proactively seeking data demands from citizens, CSOs, academics, and the private sector.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;‘as well as empower marginalised groups’ is too vague. Perhaps it can be made into a separate point, and qualified with what kinds of empowerment is needed – from demanding data, to accessing and using data, to be aware of the data collected from such groups by the government agencies.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;be transparent about our own data collection, standards, and publishing processes, by documenting all of these related processes online.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This should be part of point 19.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;26) We recognise the importance of diversity in stimulating creativity and innovation. The more citizens, governments, civil society, and the private sector use open data, the greater the social and economic benefits that will be generated. This is true for government, commercial, and non-commercial uses.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The diversity point is almost already made with points 20-21 – widest possible users lead to widest possible use.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;28) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;...&lt;/li&gt;
&lt;li&gt;engage with civil society, the private sector, and academic representatives to determine what data they need to generate social and economic value;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This is also covered under the Principle 3.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;provide training programs, tools, and guidelines designed to ensure government employees are capable of using open data effectively in policy development processes;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This should be part of Principle 1.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;encourage non-governmental organisations to open up data created and collected by them in order to move toward a richer open data ecosystem with multiple sources of open data;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;I agree with ABS. Why not ‘non-governmental organisations and the private sector’?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Also the document shifts back and forth between ‘civil society organisations’ and ‘non-governmental organisations’. If both mean the same in this document, then it should use only one.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;General Comments on the Charter&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1. Why not merge the Principle 4 and 5 so as to describe an overall situation of engagement and collaboration. The ends can be commercial acts or towards democratic practices, but the existing principles do not make much a difference between the two types of acts.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2. Further, can a new principle be added at the end that would address the implementation process of the Action Plan? Specifically, it should clarify how the implementation itself be an open process, with not only the Action Plan but annual reports regarding the status of implementation. This principle may connect to the work being done by the Implementation WG.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/international-open-data-charter-comments-by-cis'&gt;https://cis-india.org/openness/international-open-data-charter-comments-by-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>International Open Data Charter</dc:subject>
    

   <dc:date>2015-09-08T11:01:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/workshop-on-open-data-for-human-development-2015-06-report">
    <title>Workshop on Open Data for Human Development - Sessions Report</title>
    <link>https://cis-india.org/openness/workshop-on-open-data-for-human-development-2015-06-report</link>
    <description>
        &lt;b&gt;CIS facilitated a workshop on open data policy and tools for government officials from Sikkim, Meghalaya, and Tripura, and those from Bhutan and Maldives, in June 2015. The workshop was co-facilitated with Akvo, DataMeet, and Mapbox, and was supported by International Centre for Human Development of UNDP India. Here we share the workshop report and other related documents. The report is written by Sumandro, along with Amitangshu Acharya of Akvo.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Day 01, June 03, 2015&lt;/h2&gt;
&lt;p&gt;The first day of the workshop began with &lt;a href="https://en.wikipedia.org/wiki/Prem_Das_Rai"&gt;&lt;strong&gt;Mr. Prem Das Rai&lt;/strong&gt;&lt;/a&gt;, Honourable MP, Loksabha, Sikkim, briefly addressing the participants. He contextualised the workshop against the background of technological changes and emerging opportunities of governance through effective usages of data. &lt;a href="https://en.wikipedia.org/wiki/A._K._Shiva_Kumar"&gt;&lt;strong&gt;Dr. A.K. Shiva Kumar&lt;/strong&gt;&lt;/a&gt;, Director of the &lt;a href="http://www.undp.org/content/india/en/home/operations/projects/human-development/the-international-centre-for-human-development.html"&gt;International Centre for Human Development (IC4HD)&lt;/a&gt;, UNDP India, welcomed the participants and initiated a panel discussion on data, ICTs and governance. The panel had three speakers: &lt;a href="https://twitter.com/SrivatsaKrishna"&gt;&lt;strong&gt;Mr. Srivatsa Krishna&lt;/strong&gt;&lt;/a&gt;, IAS and Secretary, &lt;a href="https://www.bangaloreitbt.in/"&gt;Department of Information Technology, Biotechnology, and Science and Technology&lt;/a&gt;, Government of Karnataka; &lt;a href="http://www.cgg.gov.in/adg_profile.html"&gt;&lt;strong&gt;Dr. B. Gangaiah&lt;/strong&gt;&lt;/a&gt;, Additional Director General, &lt;a href="http://www.cgg.gov.in/"&gt;Centre for Good Governance&lt;/a&gt;, Hyderabad; and &lt;a href="https://twitter.com/sunil_abraham"&gt;&lt;strong&gt;Sunil Abraham&lt;/strong&gt;&lt;/a&gt;, Executive Director, &lt;a href="http://cis-india.org/"&gt;the Centre for Internet and Society&lt;/a&gt;, Bengaluru and Delhi.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mr. Krishna&lt;/strong&gt; spoke about the strategies adopted in setting up IT and ITES clusters in Cyberabad, Andhra Pradesh and in Bengaluru, Karnataka. He noted that tax cuts and accelerated land allocation are key to incentivising the private sector to set up IT and ITES units. Another major concern is that of ensuring supply of good quality IT workers. He also emphasised on the need for governments to build effective public facing electronic services - either in the form of Nemmadi Kendras, where people can physically go to access various government services, or in the form of mobile applications that bring different civic services into one digital interface, like &lt;a href="https://www.bangaloreone.gov.in/public/default.aspx"&gt;Bangalore One&lt;/a&gt; and &lt;a href="https://www.mobile.karnataka.gov.in/goken/login.aspx"&gt;Karnataka Mobile One&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Dr. Gangaiah&lt;/strong&gt; gave an extensive overview of the idea and applications of open data in the contexts of governance and development. He noted that government data (in India) often suffers from criticisms related to quality, as well as the lack of availability of the same in public domain. The key problems, he identified, for opening up government data in India are that most often the data is collected by a government agency for a very specific purpose, and the steps required to ensure wider circulation and use of the same is not taken (such as lack of documentation and interoperability of data); and that the government agencies most often consider the collected data as a source of power, and hence as something to be retained and not disclosed in full details. The slides from Dr. Gangaiah’s presentation can be accessed &lt;a href="https://drive.google.com/file/d/0B7xi0bhhq-OxcGs3UndvWDZJMlk/view?usp=sharing"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mr. Abraham&lt;/strong&gt;’s presentation highlighted several areas of concern when deploying data-driven techniques and solutions for human development challenges. He described how the current phase of open data discussions by central and state governments in India represent the third phase of ‘openness’ in governance in India. While the first phase focused on usage of Free/Libre Open Source Softwares in building electronic governance applications and information systems, the second phase involved embracing of open software standards and formats across government information systems and IT solutions. It is very important to note that with the third phase of openness focusing on opening up of data and information, both of these earlier foci of free and open source softwares, and open standards and interoperability are returning as complementary components to ensure seamless publication of open government data. However, he argued, when deploying data-driven techniques and solutions for human development challenges, it is imperative to remember three things: 1) collection of data is a time- and effort-consuming task, and hence must be optimised so as to not to take away time and effort from actual developmental interventions, 2) bad quality of development data is a structural problem, often emanating from the data being not useful to the person actually collecting it, and 3) availability of data does not automatically change or open up the process of decision-making.&lt;/p&gt;
&lt;p&gt;The second session of the day started with a detailed presentation by &lt;strong&gt;Mr. T. Samdup&lt;/strong&gt;, Joint Director, Department of Information Technology, Government of Sikkim, on the context, the making, and the salient features of the &lt;a href="http://www.sikkim.gov.in/stateportal/Link/SODAAP%20Policy%20Document.pdf"&gt;Sikkim Open Data Acquisition and Accessibility Policy (SODAAP)&lt;/a&gt;, 2014. He explained that the Policy mandates setting up of an online state data portal that will host all data sets generated by various agencies of the Government of Sikkim, and making such data available, subject to concerns of privacy and security, across all state government agencies and the citizens in general. The key needs driving this Policy have been that for availability of accurate and timely data on various aspects of human development in the state, as well as for reducing expenses and confusions due to duplication of data collection efforts. The slides from Mr. Samdup’s presentation can be accessed &lt;a href="https://drive.google.com/file/d/0B7xi0bhhq-OxcktuMm0tTGFMWHc/view?usp=sharing"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The presentation by &lt;strong&gt;Mr. Samdup&lt;/strong&gt; was followed by one by &lt;a href="https://twitter.com/ajantriks"&gt;&lt;strong&gt;Mr. Sumandro Chattapadhyay&lt;/strong&gt;&lt;/a&gt; of the Centre for Internet and Society on an initial set of questions and concerns that should be addressed by the implementation plan of the SODAAP. He took a detailed look at the four objectives mentioned in the Policy document, and discussed what tasks, decisions, and deliberations are needed to achieve each of those. In conclusion, he listed a set of core components of the implementation process that must also be discussed in the implementation plan document, namely: 1) governance and oversight structure for implementation, 2) incentivising government personnel for opening up data across departments, including financial support for the same, 3) metadata, documentation of data collection process, and implementing unique identifiers, and 4) developing processes of sharing of data between the Union and the state government, especially in reference to national Management Information Systems. The slides from Mr. Chattapadhyay’s presentation can be accessed &lt;a href="https://drive.google.com/file/d/0B7xi0bhhq-OxNUVGM1ZqcGhiUUU/view?usp=sharing"&gt;here.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;These presentations were followed by a general discussion on various aspects of the SODAAP and the challenges to be overcome during its implementation. This session provided a general introduction to the SODAAP, especially for workshop participants who are not from Sikkim, and also set up the key questions to be discussed and answered while preparing the first draft of the SODAAP implementation plan.&lt;/p&gt;
&lt;p&gt;After the second session ended, the participants were asked to individually write down the key challenges they identify for the implementation process of SODAAP. These responses were compiled by Sumandro and made available as a reference document for the implementation plan. The chart below summarises these responses.&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://ajantriks.github.io/cis/charts/2015.08_sodaap-challenges/index.html" frameborder="0" height="400" width="700"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the third session of the day, &lt;a href="https://twitter.com/joycarpediem"&gt;&lt;strong&gt;Joy Ghosh&lt;/strong&gt;&lt;/a&gt; and &lt;a href="https://twitter.com/amitangshu"&gt;&lt;strong&gt;Amitangshu Acharya&lt;/strong&gt;&lt;/a&gt; of &lt;a href="http://akvo.org/"&gt;Akvo&lt;/a&gt; talked about the challenges of collecting structured born-digital data from the grassroots level, and how using mobile-based applications, like &lt;a href="http://akvo.org/products/akvoflow/"&gt;Akvo FLOW&lt;/a&gt;, can address such challenges. Akvo FLOW runs on all Android-based smartphones, and allows ground level development workers to directly feed data into the phone, as well as collect related materials like GPS location and photographs, based upon a form that is centrally designed and downloaded into their phones by the development workers. The data is then kept in the phone till it is sent back to the main server, where data coming from all different surveyors using the same form is shown on a map-based interface for easy navigation of the data across space and time. In this session, Mr. Acharya first introduced the participants to the issues around digital data collection, touching upon issues of ethics, capacity, prioritisation of data collection process along with tools. Mr. Ghosh then took over to describe the functioning of the tool, and then distributed several smartphones, pre-loaded with Akvo FLOW, among the participants for an applied data collection exercise where the participants walked around the NIAS campus and collected data using the FLOW interface. They returned to see their data mapped and analysed on the online dashboard. Their presentation can be accessed &lt;a href="https://drive.google.com/file/d/0B0kFsiLLpy0XdDM2TE5tckE5Zlk/view?usp=sharing"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Day 02, June 04, 2015&lt;/h2&gt;
&lt;p&gt;The second day started with two consecutive presentations by &lt;a href="https://twitter.com/thej"&gt;&lt;strong&gt;Mr. Thejesh GN&lt;/strong&gt;&lt;/a&gt; of &lt;a href="http://datameet.org/"&gt;DataMeet&lt;/a&gt;, and &lt;a href="https://twitter.com/Sramach9"&gt;&lt;strong&gt;Mr. Sivaram Ramachandran&lt;/strong&gt;&lt;/a&gt; of &lt;a href="http://mapbox.com/"&gt;Mapbox&lt;/a&gt; on the tools and techniques for working with statistical data and with geospatial data, respectively. The former presentation took the participants through the stages of working with statistical data: from collecting and finding data, to cleaning and validating, and finally analysing the data. Various free and open source tools for each of these stages were also discussed in brief, such as &lt;a href="https://pdftables.com/"&gt;PDF Tables&lt;/a&gt;&lt;a&gt; and &lt;/a&gt;&lt;a href="http://tabula.technology/"&gt;Tabula&lt;/a&gt; for converting PDF tables to spreadsheets, &lt;a href="http://openrefine.org/"&gt;Open Refine&lt;/a&gt; for cleaning data, and &lt;a href="http://app.raw.densitydesign.org/"&gt;RAW&lt;/a&gt; and &lt;a href="https://datawrapper.de/"&gt;DataWrapper&lt;/a&gt; for generating web-based dynamic charts. The latter presentation explored the various ways in which geospatial data can be used to inform and support decision-making, and the tools that can be used to render and present geospatial data in forms that are accessible for decision-makers within government and also for individual users. Mr. Ramachandran presented the various free and open source tools available for working with geospatial data, such as &lt;a href="https://www.mapbox.com/mapbox-studio/"&gt;Mapbox Studio&lt;/a&gt;, &lt;a href="http://qgis.org/en/site/"&gt;Quantum GIS&lt;/a&gt;, and &lt;a href="http://leafletjs.com/"&gt;Leaflet JS&lt;/a&gt;. He also gave a brief introduction to &lt;a href="http://openstreetmap.org/"&gt;OpenStreetMap&lt;/a&gt;, the wiki-like user-contributed global map data platform. Both the presentations can be accessed &lt;a href="http://thejeshgn.com/presentations/Data_Journalism_Workshop.html"&gt;here&lt;/a&gt; and &lt;a href="https://drive.google.com/file/d/0B7xi0bhhq-OxQTB3eVpjNmtTUDg/view?usp=sharing"&gt;here&lt;/a&gt;, respectively. After this session, the participants were divided into two groups. One group engaged further with tools and techniques of working with statistical and geospatial data. The second group took part in a series of exercises to identify and document the current data flows and bottlenecks thereof across several key departments of Government of Sikkim.&lt;/p&gt;
&lt;p&gt;The group engaging in applications of various software tools for working with statistical and geospatial data was facilitated by &lt;strong&gt;Mr. Thejesh&lt;/strong&gt; and &lt;strong&gt;Mr. Ramachandran&lt;/strong&gt;. This group worked with a sample statistical data set, taking it across the stages of finding, cleaning, analysing, and visualising as discussed earlier. The participants used the online version of &lt;a href="http://www.tableau.com/"&gt;Tableau&lt;/a&gt; to create dynamic charts. Afterwards, they were introduced to various methods of contributing and downloading data from the OpenStreetMap, including directly adding data points through the online editor named &lt;a href="http://wiki.openstreetmap.org/wiki/ID"&gt;iD&lt;/a&gt;. The participants went out in the NIAS campus to collect geospatial data about various natural and human-made features of the campus, such as trees, pathways, etc.&lt;/p&gt;
&lt;p&gt;The second group working on documenting data flows and identifying bottlenecks was facilitated by &lt;strong&gt;Mr. Chattapadhyay&lt;/strong&gt;, &lt;strong&gt;Mr. Acharya&lt;/strong&gt;, and &lt;strong&gt;Ms. Rajashi Mukherjee&lt;/strong&gt; from Akvo. The group was further divided into department-wise teams, one each for the Department of Health, the Department of Economic Statistics, Monitoring, and Evaluation (DESME), the Human Resource Development Department (HRDD), and representatives from Gram Panchayat Units. The exercise began with each of the teams discussing and drawing the flow of data for one of the major data set maintained by the agency concerned. The data flows were drawn by identifying key moments of its processing (such as primary collection, verification, digitisation, analysis, storage, reporting, etc.), the actors involved in that moment, the tools and data formats relevant for each moment, and which agency finally stores and uses the data. Once these processes were described on paper, the next part of the exercise focused on identifying which challenges exist at which part of these data flows. This was followed up by a ranking of all these challenges, in terms of how critically they affect the ability of the agency concerned to use and share the final data. All the teams worked separately, and conversed with the facilitators as needed, to develop the data flow diagrams and identify the key challenges.&lt;/p&gt;
&lt;p&gt;The major common challenges noted by these teams were: &lt;strong&gt;1)&lt;/strong&gt; delays in collection, verification, and digitisation of data, &lt;strong&gt;2)&lt;/strong&gt; inability of state government agencies to access data collected as part of centrally-funded welfare schemes, and &lt;strong&gt;3)&lt;/strong&gt; parallel systems of data collection employed by different departments leading to duplication of efforts and data.&lt;/p&gt;
&lt;p&gt;Several interesting insights came through in this exercise. For example, data related to education is collected both by the HRDD, and the Sarva Shiksha Abhiyaan (SSA). However, SSA data is not shared with the HRDD. Also, the HRDD publishes all its data, including the name of students, on their &lt;a href="http://sikkimhrdd.org/Home.aspx"&gt;website&lt;/a&gt;, making it publicly available. One of the data challenges identified by the HRDD was their difficulty in tracking if scholarship money is reaching the suitable students. When a student moves from one school to another, the records do not get updated easily. This leads to different schools continuing to receive funds for the same scholarship. Aligning school records is important to prevent such leakages.&lt;/p&gt;
&lt;p&gt;After these two grouped exercises, all the participants gathered back so that the data flows diagrams and identification of key challenges documented by departmental teams could be presented to the entire group. Each team presented their data flow diagram, and discussed challenges and opportunities. This created a context for different departments to discuss what kind of data they often needed from each other, and how there was neither a platform for inter-departmental discussion on such issues, nor systems that facilitate the same. There was an agreement that an open data platform could address this issue to a great extent. The discussion also highlighted that the most significant data collecting government agency in Sikkim is DESME, however, it does not publish any data in machine-readable formats, and does not even have a website.&lt;/p&gt;
&lt;p&gt;This data flow and bottleneck exercise made it very clear that there are several data production and collection processes in place in Sikkim, and also systems that are digesting, processing, and reporting data. Hence, implementing the open data policy will need to negotiate with such complexity.&lt;/p&gt;
&lt;p&gt;In the final session of the day, &lt;strong&gt;Dr. Shiban Ganju&lt;/strong&gt; made a presentation on applications of open data in healthcare. His talk focused on how converting medical information about a patient being stored at various locations to a combined and shareable Electronic Health Record can save the patient as well as the medical practitioners from duplication of medical tests, easier mobility from one medical institute to another, and a clearer macro-level understanding of key public health indicators. Dr. Ganju discussed the open health data initiatives in the United States, in the United Kingdom, and in Sweden, before discussing the challenges faced in implementing interoperable standards for open health data in India. The slides from Dr. Ganju’s presentation can be accessed &lt;a href="https://drive.google.com/file/d/0B7xi0bhhq-OxTTczUTY3MWZFbG8/view?usp=sharing"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Day 03, June 05, 2015&lt;/h2&gt;
&lt;p&gt;The final day started with a set of presentations from &lt;strong&gt;Mr. Garab Dorji&lt;/strong&gt;, Deputy Chief IT Officer, Office of the Prime Minister, Thimphu, Bhutan of the Government of Bhutan, &lt;strong&gt;Mr. Birendra Tiwari&lt;/strong&gt;, Senior Informatic Officer, Department of Information Technology, Government of Meghalaya, and &lt;strong&gt;Mr. Milan Chhetri&lt;/strong&gt; of Melli Dara Paiyong Gram Panchayat Unit, Sikkim, on various technological solutions being explored, implemented, and practiced by the respective governments and administrative units.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mr. Milan Chhetri&lt;/strong&gt;’s presentation was on the operationalisation of Cyber Villages in Sikkim, which had been initiated in 2013 with support from the Honourable Chief Minister of Sikkim, &lt;strong&gt;Pawan Kumar Chamling&lt;/strong&gt;. Cyber Villages aim to address digital divide, by empowering local village units with handheld data devices to collect data from every household and connect the same to a real time dashboard. All village related data is expected to be available in one place. At the same time as part of e-governance initiative, SMS based updates on Government programmes and services will be sent to all villagers. Mr. Chhetri ended his presentation with a short promotional video of the concept, which is embedded below.&lt;/p&gt;
&lt;iframe src="https://www.youtube-nocookie.com/embed/ZOqAl8kDwKY?rel=0" frameborder="0" height="360" width="640"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The second session of the day started with a presentation from &lt;a href="https://twitter.com/DurgaPrMisra"&gt;&lt;strong&gt;Mr. D. P. Misra&lt;/strong&gt;&lt;/a&gt;, National Data Sharing and Accessibility Policy - Programme Management Unit (NDSAP-PMU), National Informatics Centre, Government of India. The presentation focused on the process of implementation of the &lt;a href="http://data.gov.in/sites/default/files/NDSAP.pdf"&gt;National Data Sharing and Accessibility Policy&lt;/a&gt; approved by the Government of India in 2012. Mr. Misra has played a key role in the NDSAP-PMU that was trusted with development of the national open government data platform of India and in setting up the procedures and standards for publication of government data by various central and state government agencies through that Platform. His talk described the technical solutions designed by the NDSAP-PMU to make data accessible for the end-users in various file formats, to make visualisation of available data easy, and to make it possible for users to comment upon existing data and to request for data that is unavailable at the moment. Further, he emphasised the need for outreach initiatives by the government so as to build awareness and activities around the available open government data. The slides from Mr. Misra’s presentation can be accessed &lt;a href="https://drive.google.com/file/d/0B7xi0bhhq-OxZjZrc0c4cmxpZFk/view?usp=sharing"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The presentation by Mr. Misra was followed by a group exercise where various teams, self-selected by the participants, worked on different sections of the SODAAP implementation plan to put together ideas and plans for the first draft of the document. Five groups were formed and each of them worked on a separate section of the implementation plan: &lt;strong&gt;1)&lt;/strong&gt; Governance Framework and Budgetary Support, &lt;strong&gt;2)&lt;/strong&gt; Data Inventory and Negative List, &lt;strong&gt;3)&lt;/strong&gt; Data Acquisition and Open Standards, &lt;strong&gt;4)&lt;/strong&gt; Data Publication Process, Licenses, and Timeframes, and &lt;strong&gt;5)&lt;/strong&gt; Awareness, Capacity, and Demand of Data. The initial section titled ‘Introduction to the Policy and its Principles’ was put together by Vashistha Iyer on the basis of the SODAAP document. The technical section on the ‘Sikkim Open Data Portal’ was left out of this drafting exercise, as it was decided that the representatives of the Department of Information Technology will prepare this section on the basis of their interactions with the NDSAP-PMU later in June.&lt;/p&gt;
&lt;p&gt;The drafting session was followed by presentations by each team working on a separate section, and quick feedbacks from all the participants. These drafts, along with the feedbacks, have been compiled together by Mr. Chattapadhyay, and is shared with the officials from the Government of Sikkim for their further discussion and eventual finalisation of the SODAAP implementation plan document.&lt;/p&gt;
&lt;p&gt;The workshop ended with a round of final words and sharing of learning by the participants, and a vote of thanks on the behalf of the organisers.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/workshop-on-open-data-for-human-development-2015-06-report'&gt;https://cis-india.org/openness/workshop-on-open-data-for-human-development-2015-06-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Sikkim Open Data Acquisition and Accessibility Policy</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2015-08-28T08:16:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology">
    <title>Security: Privacy, Transparency and Technology</title>
    <link>https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has been involved in privacy and data protection research for the last five years. It has participated as a member of the Justice A.P. Shah Committee, which has influenced the draft Privacy Bill being authored by the Department of Personnel and Training. It has organised 11 multistakeholder roundtables across India over the last two years to discuss a shadow Privacy Bill drafted by CIS with the participation of privacy commissioners and data protection authorities from Europe and Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was co-authored by Sunil Abraham, Elonnai Hickok and Tarun Krishnakumar. It was published by Observer Research Foundation, &lt;a href="https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf" class="internal-link"&gt;Digital Debates 2015: CyFy Journal Volume 2&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Our centre’s work on privacy was considered incomplete by some stakeholders because of a lack of focus in the area of cyber security and therefore we have initiated research on it from this year onwards. In this article, we have undertaken a preliminary examination of the theoretical relationships between the national security imperative and privacy, transparency and technology.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Privacy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Daniel J. Solove has identified the tension between security and privacy as a false dichotomy: "Security and privacy often clash, but there need not be a zero-sum tradeoff." &lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; Further unpacking this false dichotomy, Bruce Schneier says, "There is no security without privacy. And liberty requires both security and privacy." &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; Effectively, it could be said that privacy is a precondition for security, just as security is a precondition for privacy. A secure information system cannot be designed without guaranteeing the privacy of its authentication factors, and it is not possible to guarantee privacy of authentication factors without having confidence in the security of the system. Often policymakers talk about a balance between the privacy and security imperatives—in other words a zero-sum game. Balancing these imperatives is a foolhardy approach, as it simultaneously undermines both imperatives. Balancing privacy and security should instead be framed as an optimisation problem. Indeed, during a time when oversight mechanisms have failed even in so-called democratic states, the regulatory power of technology &lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; should be seen as an increasingly key ingredient to the solution of that optimisation problem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data retention is required in most jurisdictions for law enforcement, intelligence and military purposes. Here are three examples of how security and privacy can be optimised when it comes to Internet Service Provider (ISP) or telecom operator logs:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Data Retention&lt;/strong&gt;: We propose that the office of the Privacy Commissioner generate a cryptographic key pair for each internet user and give one key to the ISP / telecom operator. This key would be used to encrypt logs, thereby preventing unauthorised access. Once there is executive or judicial authorisation, the Privacy Commissioner could hand over the second key to the authorised agency. There could even be an emergency procedure and the keys could be automatically collected by concerned agencies from the Privacy Commissioner. This will need to be accompanied by a policy that criminalises the possession of unencrypted logs by ISP and telecom operators.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Privacy-Protective Surveillance&lt;/strong&gt;: Ann Cavoukian and Khaled El Emam &lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; have proposed combining intelligent agents, homomorphic encryption and probabilistic graphical models to provide “a positive-sum, ‘win–win’ alternative to current counter-terrorism surveillance systems.” They propose limiting collection of data to “significant” transactions or events that could be associated with terrorist-related activities, limiting analysis to wholly encrypted data, which then does not just result in “discovering more patterns and relationships without an understanding of their context” but rather “intelligent information—information selectively gathered and placed into an appropriate context to produce actual knowledge.” Since fully homomorphic encryption may be unfeasible in real-world systems, they have proposed use of partially homomorphic encryption. But experts such as Prof. John Mallery from MIT are also working on solutions based on fully homomorphic encryption.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Fishing Expedition Design&lt;/strong&gt;: Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal have proposed a standard &lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; that could be adopted by authorised agencies, telecom operators and ISPs. Instead of giving authorised agencies complete access to logs, they propose a format for database queries, which could be sent to the telecom operator or ISP by authorised agencies. The telecom operator or ISP would then process the query, and anonymise/obfuscate the result-set in an automated fashion based on applicable privacypolicies/regulation. Authorised agencies would then hone in on a subset of the result-set that they would like with personal identifiers intact; this smaller result set would then be shared with the authorised agencies.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;An optimisation approach to resolving the false dichotomy between privacy and security will not allow for a total surveillance regime as pursued by the US administration. Total surveillance brings with it the ‘honey pot’ problem: If all the meta-data and payload data of citizens is being harvested and stored, then the data store will become a single point of failure and will become another target for attack. The next Snowden may not have honourable intentions and might decamp with this ‘honey pot’ itself, which would have disastrous consequences.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If total surveillance will completely undermine the national security imperative, what then should be the optimal level of surveillance in a population? The answer depends upon the existing security situation. If this is represented on a graph with security on the y-axis and the proportion of the population under surveillance on the x-axis, the benefits of surveillance could be represented by an inverted hockey-stick curve. To begin with, there would already be some degree of security. As a small subset of the population is brought under surveillance, security would increase till an optimum level is reached, after which, enhancing the number of people under surveillance would not result in any security pay-off. Instead, unnecessary surveillance would diminish security as it would introduce all sorts of new vulnerabilities. Depending on the existing security situation, the head of the hockey-stick curve might be bigger or smaller. To use a gastronomic analogy, optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India the designers of surveillance projects have fortunately rejected the total surveillance paradigm. For example, the objective of the National Intelligence Grid (NATGRID) is to streamline and automate targeted surveillance; it is introducing technological safeguards that will allow express combinations of result-sets from 22 databases to be made available to 12 authorised agencies. This is not to say that the design of the NATGRID cannot be improved.&lt;/p&gt;
&lt;h3&gt;Security and Transparency&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;There are two views on security and transparency: One, security via obscurity as advocated by vendors of proprietary software, and two, security via transparency as advocated by free/open source software (FOSS) advocates and entrepreneurs. Over the last two decades, public and industry opinion has swung towards security via transparency. This is based on the Linus rule that “given enough eyeballs, all bugs are shallow.” But does this mean that transparency is a necessary and sufficient condition? Unfortunately not, and therefore it is not necessarily true that FOSS and open standards will be more secure than proprietary software and proprietary standards.&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;The recent detection of the Heartbleed &lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; security bug in Open SSL, &lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt; causing situations where more data can be read than should be allowed, and Snowden’s revelations about the compromise of some open cryptographic standards (which depend on elliptic curves), developed by the US National Institute of Standards and Technology, are stark examples. &lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At the same time, however, open standards and FOSS are crucial to maintaining the balance of power in information societies, as civil society and the general public are able to resist the powers of authoritarian governments and rogue corporations using cryptographic technology. These technologies allow for anonymous speech, pseudonymous speech, private communication, online anonymity and circumvention of surveillance and censorship. For the media, these technologies enable anonymity of sources and the protection of whistle-blowers—all phenomena that are critical to the functioning of a robust and open democratic society. But these very same technologies are also required by states and by the private sector for a variety of purposes—national security, e-commerce, e-banking, protection of all forms of intellectual property, and services that depend on confidentiality, such as legal or medical services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In order words, all governments, with the exception of the US government, have common cause with civil society, media and the general public when it comes to increasing the security of open standards and FOSS. Unfortunately, this can be quite an expensive task because the re-securing of open cryptographic standards depends on mathematicians. Of late, mathematical research outputs that can be militarised are no longer available in the public domain because the biggest employers of mathematicians worldwide today are the US military and intelligence agencies. If other governments invest a few billion dollars through mechanisms like Knowledge Ecology International’s proposed World Trade Organization agreement on the supply of knowledge as a public good, we would be able to internationalise participation in standard-setting organisations and provide market incentives for greater scrutiny of cryptographic standards and patching of vulnerabilities of FOSS. This would go a long way in addressing the trust deficit that exists on the internet today.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A techno-utopian understanding of security assumes that more technology, more recent technology and more complex technology will necessarily lead to better security outcomes.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is because the security discourse is dominated by vendors with sales targets who do not present a balanced or accurate picture of the technologies that they are selling. This has resulted in state agencies and the general public having an exaggerated understanding of the capabilities of surveillance technologies that is more aligned with Hollywood movies than everyday reality.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;More Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Increasing the number of x-ray machines or full-body scanners at airports by a factor of ten or hundred will make the airport less secure unless human oversight is similarly increased. Even with increased human oversight, all that has been accomplished is an increase in the potential locations that can be compromised. The process of hardening a server usually involves stopping non-essential services and removing non-essential software. This reduces the software that should be subject to audit, continuously monitored for vulnerabilities and patched as soon as possible. Audits, ongoing monitoring and patching all cost time and money and therefore, for governments with limited budgets, any additional unnecessary technology should be seen as a drain on the security budget. Like with the airport example, even when it comes to a single server on the internet, it is clear that, from a security perspective, more technology without a proper functionality and security justification is counter-productive. To reiterate, throwing increasingly more technology at a problem does not make things more secure; rather, it results in a proliferation of vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Latest Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Reports that a number of state security agencies are contemplating returning to typewriters for sensitive communications in the wake of Snowden’s revelations makes it clear that some older technologies are harder to compromise in comparison to modern technology. &lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; Between iris- and fingerprint-based biometric authentication, logically, it would be easier for a criminal to harvest images of irises or authentication factors in bulk fashion using a high resolution camera fitted with a zoom lens in a public location, in comparison to mass lifting of fingerprints.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Complex Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Fifteen years ago, Bruce Schneier said, "The worst enemy of security is complexity. This has been true since the beginning of computers, and it’s likely to be true for the foreseeable future." &lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt; This is because complexity increases fragility; every feature is also a potential source of vulnerabilities and failures. The simpler Indian electronic machines used until the 2014 elections are far more secure than the Diebold voting machines used in the 2004 US presidential elections. Similarly when it comes to authentication, a pin number is harder to beat without user-conscious cooperation in comparison to iris- or fingerprint-based biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the following section of the paper we have identified five threat scenarios &lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt; relevant to India and identified solutions based on our theoretical framing above.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Threat Scenarios and Possible Solutions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Hacking the NIC Certifying Authority&lt;/strong&gt;&lt;br /&gt;One of the critical functions served by the National Informatics Centre (NIC) is as a Certifying Authority (CA). &lt;a name="fr12" href="#fn12"&gt;[12]&lt;/a&gt; In this capacity, the NIC issues digital certificates that authenticate web services and allow for the secure exchange of information online. &lt;a name="fr13" href="#fn13"&gt;[13]&lt;/a&gt; Operating systems and browsers maintain lists of trusted CA root certificates as a means of easily verifying authentic certificates. India’s Controller of Certifying Authority’s certificates issued are included in the Microsoft Root list and recognised by the majority of programmes running on Windows, including Internet Explorer and Chrome. &lt;a name="fr14" href="#fn14"&gt;[14]&lt;/a&gt; In 2014, the NIC CA’s infrastructure was compromised, and digital certificates were issued in NIC’s name without its knowledge. &lt;a name="fr15" href="#fn15"&gt;[15]&lt;/a&gt; Reports indicate that NIC did not "have an appropriate monitoring and tracking system in place to detect such intrusions immediately." &lt;a name="fr16" href="#fn16"&gt;[16]&lt;/a&gt; The implication is that websites could masquerade as another domain using the fake certificates. Personal data of users can be intercepted or accessed by third parties by the masquerading website. The breach also rendered web servers and websites of government bodies vulnerable to attack, and end users were no longer sure that data on these websites was accurate and had not been tampered with. &lt;a name="fr17" href="#fn17"&gt;[17]&lt;/a&gt; The NIC CA was forced to revoke all 250,000 SSL Server Certificates issued until that date &lt;a name="fr18" href="#fn18"&gt;[18]&lt;/a&gt; and is no longer issuing digital certificates for the time being. &lt;a name="fr19" href="#fn19"&gt;[19]&lt;/a&gt;Public key pinning is a means through which websites can specify which certifying authorities have issued certificates for that site. Public key pinning can prevent man-in-the-middle attacks due to fake digital certificates. &lt;a name="fr20" href="#fn20"&gt;[20]&lt;/a&gt; Certificate Transparency allows anyone to check whether a certificate has been properly issued, seeing as certifying authorities must publicly publish information about the digital certificates that they have issued. Though this approach does not prevent fake digital certificates from being issued, it can allow for quick detection of misuse. &lt;a name="fr21" href="#fn21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;‘Logic Bomb’ against Airports&lt;/strong&gt;&lt;br /&gt;Passenger operations in New Delhi’s Indira Gandhi International Airport depend on a centralised operating system known as the Common User Passenger Processing System (CUPPS). The system integrates numerous critical functions such as the arrival and departure times of flights, and manages the reservation system and check-in schedules. &lt;a name="fr22" href="#fn22"&gt;[22]&lt;/a&gt; In 2011, a logic bomb attack was remotely launched against the system to introduce malicious code into the CUPPS software. The attack disabled the CUPPS operating system, forcing a number of check-in counters to shut down completely, while others reverted to manual check-in, resulting in over 50 delayed flights. Investigations revealed that the attack was launched by three disgruntled employees who had assisted in the installation of the CUPPS system at the New Delhi Airport. &lt;a name="fr23" href="#fn23"&gt;[23]&lt;/a&gt; Although in this case the impact of the attack was limited to flight delay, experts speculate that the attack was meant to take down the entire system. The disruption and damage resulting from the shutdown of an entire airport would be extensive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Adoption of open hardware and FOSS is one strategy to avoid and mitigate the risk of such vulnerabilities. The use of devices that embrace the concept of open hardware and software specifications must be encouraged, as this helps the FOSS community to be vigilant in detecting and reporting design deviations and investigate into probable vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Attack on Critical Infrastructure&lt;/strong&gt;&lt;br /&gt;The Nuclear Power Corporation of India encounters and prevents numerous cyber attacks every day. &lt;a name="fr24" href="#fn24"&gt;[24]&lt;/a&gt; The best known example of a successful nuclear plant hack is the Stuxnet worm that thwarted the operation of an Iranian nuclear enrichment complex and set back the country’s nuclear programme. &lt;a name="fr25" href="#fn25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The worm had the ability to spread over the network and would activate when a specific configuration of systems was encountered &lt;a name="fr26" href="#fn26"&gt;[26]&lt;/a&gt; and connected to one or more Siemens programmable logic controllers. &lt;a name="fr27" href="#fn27"&gt;[27]&lt;/a&gt; The worm was suspected to have been initially introduced through an infected USB drive into one of the controller computers by an insider, thus crossing the air gap. &lt;a name="fr28" href="#fn28"&gt;[28]&lt;/a&gt; The worm used information that it gathered to take control of normal industrial processes (to discreetly speed up centrifuges, in the present case), leaving the operators of the plant unaware that they were being attacked. This incident demonstrates how an attack vector introduced into the general internet can be used to target specific system configurations. When the target of a successful attack is a sector as critical and secured as a nuclear complex, the implications for a country’s security and infrastructure are potentially grave.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Security audits and other transparency measures to identify vulnerabilities are critical in sensitive sectors. Incentive schemes such as prizes, contracts and grants may be evolved for the private sector and academia to identify vulnerabilities in the infrastructure of critical resources to enable/promote security auditing of infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Micro Level: Chip Attacks&lt;/strong&gt;&lt;br /&gt;Semiconductor devices are ubiquitous in electronic devices. The US, Japan, Taiwan, Singapore, Korea and China are the primary countries hosting manufacturing hubs of these devices. India currently does not produce semiconductors, and depends on imported chips. This dependence on foreign semiconductor technology can result in the import and use of compromised or fraudulent chips by critical sectors in India. For example, hardware Trojans, which may be used to access personal information and content on a device, may be inserted into the chip. Such breaches/transgressions can render equipment in critical sectors vulnerable to attack and threaten national security. &lt;a name="fr29" href="#fn29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Indigenous production of critical technologies and the development of manpower and infrastructure to support these activities are needed. The Government of India has taken a number of steps towards this. For example, in 2013, the Government of India approved the building of two Semiconductor Wafer Fabrication (FAB) manufacturing facilities &lt;a name="fr30" href="#fn30"&gt;[30]&lt;/a&gt; and as of January 2014, India was seeking to establish its first semiconductor characterisation lab in Bangalore. &lt;a name="fr31" href="#fn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Macro Level: Telecom and Network Switches&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The possibility of foreign equipment containing vulnerabilities and backdoors that are built into its software and hardware gives rise to concerns that India’s telecom and network infrastructure is vulnerable to being hacked and accessed by foreign governments (or non-state actors) through the use of spyware and malware that exploit such vulnerabilities. In 2013, some firms, including ZTE and Huawei, were barred by the Indian government from participating in a bid to supply technology for the development of its National Optic Network project due to security concerns. &lt;a name="fr32" href="#fn32"&gt;[32]&lt;/a&gt; Similar concerns have resulted in the Indian government holding back the conferment of ‘domestic manufacturer’ status on both these firms. &lt;a name="fr33" href="#fn33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Following reports that Chinese firms were responsible for transnational cyber attacks designed to steal confidential data from overseas targets, there have been moves to establish laboratories to test imported telecom equipment in India. &lt;a name="fr34" href="#fn34"&gt;[34]&lt;/a&gt; Despite these steps, in a February 2014 incident the state-owned telecommunication company  Bharat Sanchar Nigam Ltd’s network was hacked, allegedly by Huawei. &lt;a name="fr35" href="#fn35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Security practitioners and policymakers need to avoid the zero-sum framing prevalent in popular discourse regarding security VIS-A-VIS privacy, transparency and technology.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;A successful hack of the telecom infrastructure could result in massive disruption in internet and telecommunications services. Large-scale surveillance and espionage by foreign actors would also become possible, placing, among others, both governmental secrets and individuals personal information at risk.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While India cannot afford to impose a general ban on the import of foreign telecommunications equipment, a number of steps can be taken to address the risk of inbuilt security vulnerabilities. Common International Criteria for security audits could be evolved by states to ensure compliance of products with international norms and practices. While India has already established common criteria evaluation centres, &lt;a name="fr36" href="#fn36"&gt;[36]&lt;/a&gt; the government monopoly over the testing function has resulted in only three products being tested so far. A Code Escrow Regime could be set up where manufacturers would be asked to deposit source code with the Government of India for security audits and verification. The source code could be compared with the shipped software to detect inbuilt vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyber security cannot be enhanced without a proper understanding of the relationship between security and other national imperatives such as privacy, transparency and technology. This paper has provided an initial sketch of those relationships, but sustained theoretical and empirical research is required in India so that security practitioners and policymakers avoid the zero-sum framing prevalent in popular discourse and take on the hard task of solving the optimisation problem by shifting policy, market and technological levers simultaneously. These solutions must then be applied in multiple contexts or scenarios to determine how they should be customised to provide maximum security bang for the buck.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. Daniel J. Solove, Chapter 1 in Nothing to Hide: The False Tradeoff between Privacy and Security (Yale University Press: 2011), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1827982.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. Bruce Schneier, “What our Top Spy doesn’t get: Security and Privacy aren’t Opposites,” Wired, January 24, 2008, http://archive.wired.com/politics/security commentary/security matters/2008/01/securitymatters_0124 and Bruce Schneier, “Security vs. Privacy,” Schneier on Security, January 29, 2008, https://www.schneier.com/blog/archives/2008/01/security_vs_pri.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. There are four sources of power in internet governance: Market power exerted by private sector organisations; regulatory power exerted by states; technical power exerted by anyone who has access to certain categories of technology, such as cryptography; and finally, the power of public pressure sporadically mobilised by civil society. A technically sound encryption standard, if employed by an ordinary citizen, cannot be compromised using the power of the market or the regulatory power of states or public pressure by civil society. In that sense, technology can be used to regulate state and market behaviour.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. Ann Cavoukian and Khaled El Emam, “Introducing Privacy-Protective Surveillance: Achieving Privacy and Effective Counter-Terrorism,” Information &amp;amp; Privacy Commisioner, September 2013, Ontario, Canada, http://www.privacybydesign.ca/content/uploads/2013/12/pps.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal, “Information Integration and Analysis: A Semantic Approach to Privacy”(presented at the third IEEE International Conference on Information Privacy, Security, Risk and Trust, Boston, USA, October 2011), ebiquity.umbc.edu/_file_directory_/papers/578.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. Bruce Byfield, “Does Heartbleed disprove ‘Open Source is Safer’?,” Datamation, April 14, 2014, http://www.datamation.com/open-source/does-heartbleed-disprove-open-source-is-safer-1.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. “Cybersecurity Program should be more transparent, protect privacy,” Centre for Democracy and Technology Insights, March 20, 2009, https://cdt.org/insight/cybersecurity-program-should-be-more-transparent-protect-privacy/#1.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. “Cracked Credibility,” The Economist, September 14, 2013, http://www.economist.com/news/international/21586296-be-safe-internet-needs-reliable-encryption-standards-software-and.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. Miriam Elder, “Russian guard service reverts to typewriters after NSA leaks,” The Guardian, July 11, 2013, www.theguardian.com/world/2013/jul/11/russia-reverts-paper-nsa-leaks and Philip Oltermann, “Germany ‘may revert to typewriters’ to counter hi-tech espionage,” The Guardian, July 15, 2014, www.theguardian.com/world/2014/jul/15/germany-typewriters-espionage-nsa-spying-surveillance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. Bruce Schneier, “A Plea for Simplicity,” Schneier on Security, November 19, 1999, https://www.schneier.com/essays/archives/1999/11/a_plea_for_simplicit.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. With inputs from Pranesh Prakash of the Centre for Internet and Society and Sharathchandra Ramakrishnan of Srishti School of Art, Technology and Design.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn12" href="#fr12"&gt;12&lt;/a&gt;]. “Frequently Asked Questions,” Controller of Certifying Authorities, Department of Electronics and Information Technology, Government of India, http://cca.gov.in/cca/index.php?q=faq-page#n41.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn13" href="#fr13"&gt;13&lt;/a&gt;]. National Informatics Centre Homepage, Government of India, http://www.nic.in/node/41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn14" href="#fr14"&gt;14&lt;/a&gt;]. Adam Langley, “Maintaining Digital Certificate Security,” Google Security Blog, July 8, 2014, http://googleonlinesecurity.blogspot.in/2014/07/maintaining-digital-certificate-security.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn15" href="#fr15"&gt;15&lt;/a&gt;]. This is similar to the kind of attack carried out against DigiNotar, a Dutch certificate authority. See: http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1246&amp;amp;context=jss.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn16" href="#fr16"&gt;16&lt;/a&gt;]. R. Ramachandran, “Digital Disaster,” Frontline, August 22, 2014, http://www.frontline.in/the-nation/digital-disaster/article6275366.ece.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn17" href="#fr17"&gt;17&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn18" href="#fr18"&gt;18&lt;/a&gt;]. “NIC’s digital certification unit hacked,” Deccan Herald, July 16, 2014, http://www.deccanherald.com/content/420148/archives.php.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn19" href="#fr19"&gt;19&lt;/a&gt;]. National Informatics Centre Certifying Authority Homepage, Government of India, http://nicca.nic.in//.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn20" href="#fr20"&gt;20&lt;/a&gt;]. Mozilla Wiki, “Public Key Pinning,” https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn21" href="#fr21"&gt;21&lt;/a&gt;]. “Certificate Transparency - The quick detection of fraudulent digital certificates,” Ascertia, August 11, 2014, http://www.ascertiaIndira.com/blogs/pki/2014/08/11/certificate-transparency-the-quick-detection-of-fraudulent-digital-certificates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn22" href="#fr22"&gt;22&lt;/a&gt;]. “Indira Gandhi International Airport (DEL/VIDP) Terminal 3, India,” Airport Technology.com, http://www.airport-technology.com/projects/indira-gandhi-international-airport-terminal -3/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn23" href="#fr23"&gt;23&lt;/a&gt;]. “How techies used logic bomb to cripple Delhi Airport,” Rediff, November 21, 2011, http://www.rediff.com/news/report/how-techies-used-logic-bomb-to-cripple-delhi-airport/20111121 htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn24" href="#fr24"&gt;24&lt;/a&gt;]. Manu Kaushik and Pierre Mario Fitter, “Beware of the bugs,” Business Today, February 17, 2013, http://businesstoday.intoday.in/story/india-cyber-security-at-risk/1/191786.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn25" href="#fr25"&gt;25&lt;/a&gt;]. “Stuxnet ‘hit’ Iran nuclear plants,” BBC, November 22, 2010, http://www.bbc.com/news/technology-11809827.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn26" href="#fr26"&gt;26&lt;/a&gt;]. In this case, systems using Microsoft Windows and running Siemens Step7 software were targeted.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn27" href="#fr27"&gt;27&lt;/a&gt;]. Jonathan Fildes, “Stuxnet worm ‘targeted high-value Iranian assets’,” BBC, September 23, 2010, http://www.bbc.com/news/technology-11388018.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn28" href="#fr28"&gt;28&lt;/a&gt;]. Farhad Manjoo, “Don’t Stick it in: The dangers of USB drives,” Slate, October 5, 2010, http://www.slate.com/articles/technology/technology/2010/10/dont_stick_it_in.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn29" href="#fr29"&gt;29&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn30" href="#fr30"&gt;30&lt;/a&gt;]. “IBM invests in new $5bn chip fab in India, so is chip sale off?,” ElectronicsWeekly, February 14, 2014, http://www.electronicsweekly.com/news/business/ibm-invests-new-5bn-chip-fab-india-chip-sale-2014-02/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn31" href="#fr31"&gt;31&lt;/a&gt;]. NT Balanarayan, “Cabinet Approves Creation of Two Semiconductor Fabrication Units,” Medianama, February 17, 2014, http://articles.economictimes.indiatimes.com/2014-02-04/news/47004737_1_indian-electronics-special-incentive-package-scheme-semiconductor-association.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn32" href="#fr32"&gt;32&lt;/a&gt;]. Jamie Yap, “India bars foreign vendors from national broadband initiative,” ZD Net, January 21, 2013, http://www.zdnet.com/in/india-bars-foreign-vendors-from-national-broadband-initiative-7000010055/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn33" href="#fr33"&gt;33&lt;/a&gt;]. Kevin Kwang, “India holds back domestic-maker status for Huawei, ZTE,” ZD Net, February 6, 2013, http://www.zdnet.com/in/india-holds-back-domestic-maker-status-for-huawei-zte-70 00010887/. Also see “Huawei, ZTE await domestic-maker tag,” The Hindu, February 5, 2013, http://www.thehindu.com/business/companies/huawei-zte-await-domesticmaker-tag/article4382888.ece.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn34" href="#fr34"&gt;34&lt;/a&gt;]. Ellyne Phneah, “Huawei, ZTE under probe by Indian government,” ZD Net, May 10, 2013, http://www.zdnet.com/in/huawei-zte-under-probe-by-indian-government-7000015185/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn35" href="#fr35"&gt;35&lt;/a&gt;]. Devidutta Tripathy, “India investigates report of Huawei hacking state carrier network,” Reuters, February 6, 2014, http://www.reuters.com/article/2014/02/06/us-india-huawei-hacking-idUSBREA150QK20140206.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn36" href="#fr36"&gt;36&lt;/a&gt;]. “Products Certified,” Common Criteria Portal of India, http://www.commoncriteria-india.gov.in/Pages/ProductsCertified.aspx.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology'&gt;https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-09-15T10:53:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-activism-in-asia-reader">
    <title> Digital Activism in Asia Reader</title>
    <link>https://cis-india.org/raw/digital-activism-in-asia-reader</link>
    <description>
        &lt;b&gt;The digital turn might as well be marked as an Asian turn. From flash-mobs in Taiwan to feminist mobilisations in India, from hybrid media strategies of Syrian activists to cultural protests in Thailand, we see the emergence of political acts that transform the citizen from being a beneficiary of change to becoming an agent of change. In co-shaping these changes, what the digital shall be used for, and what its consequences will be, are both up for speculation and negotiation. Digital Activism in Asia marks a particular shift where these questions are no longer being refracted through the ICT4D logic, or the West’s attempts to save Asia from itself, but shaped by multiplicity, unevenness, and urgencies of digital sites and users in Asia. It is our great pleasure to present the Digital Activism in Asia Reader.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;The Book&lt;/h2&gt;
&lt;p&gt;The Reader took shape over two workshops with a diverse range of participants, including activists, change-makers, and scholars, organised by the Researchers at Work (RAW) programme in June 2014 and March 2015. During the first workshop, the participants identified the authors, topics, and writings that should be included/featured in the reader, based upon their relevance in the grounded practices of the participants, who came from various Asian countries. The second workshop involved open discussions regarding how the selected readings should be annotated, from key further questions to strategies of introducing them, followed by development of the annotations by the participants of the workshop. The full list of contributors, annotators, and editors is mentioned at the end of the book.&lt;/p&gt;
&lt;p&gt;We are grateful to the &lt;a href="http://meson.press/about/" target="_blank"&gt;Meson Press&lt;/a&gt; for its generous and patience support throughout the development process of the book.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Please download, read, and share this open-access book from the Meson Press &lt;a href="http://meson.press/wp-content/uploads/2015/08/9783957960511-Digital-Activism-Asia-Reader.pdf" target="_blank"&gt;website&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Reader has been edited by Nishant Shah, P.P. Sneha, and Sumandro Chattapadhyay, with support from Anirudh Sridhar, Denisse Albornoz, and Verena Getahun.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Excerpt from the Foreword&lt;/h2&gt;
&lt;p&gt;Compiling this Reader on Digital Activism in Asia is fraught with compelling challenges, because each of the key terms in the formulation of the title is sub-ject to multiple interpretations and fierce contestations. The construction of ‘Asia’ as a region, has its historical roots in processes of colonial technologies of cartography and navigation. Asia was both, a measured entity, mapped for resources to be exploited, and also a measure of the world, promising anorientation to the Western World’s own turbulent encounters. As Chen Kuan-Hsing points out in his definitive history of the region, Asia gets re-imagined as­ a­ ‘method’ in cold-war conflicts, becoming the territory to be assimilated through exports of different ideologies and cultural purports. Asia does not have its own sense of being­ a­region. The transactions, interactions, flows and exchanges between different countries and regions in Asia have been so entirely mediated by powers of colonisation that the region remains divided and reticent in its imagination of itself. However, by the turn of the 21st century, Asia has seen­ a­ new awakening. It finds­ a­ regional identity, which, surprisingly did not emerge from its consolidating presence in global economics or in globalised structures of trade and commerce. Instead, it finds­ a­ presence, for itself, through a series of crises of governance, of social order, of political rights, and of cultural productions, that binds it together in unprecedented ways.&lt;/p&gt;
&lt;p&gt;The digital turn might as well be marked as an Asian turn, because with the new networks of connectivity, with Asian countries marking themselves as informatics hubs, working through a circulated logic of migrant labour and dis-tributed resources, there came a sense of immediacy, proximity, and urgencythat continues to shape the Asian imagination in a new way. In the last decade or so, the rapid changes that have emerged, creating multiple registers of modernity, identity, and community in different parts of Asia, accelerated by a­ seamless exchange of ideas, commodities, cultures, and people have created a new sense of the region as emerging through co-presence rather than competition and conflict. Simultaneously, the emergence of global capitals of information, labour and cultural export, have created new reference points by which the region creates its identities and networks that are no longer subject to the tyranny of Western hegemony...&lt;/p&gt;
&lt;p&gt;While the digital remains crucial to this shaping of contemporary Asia, both in sustaining the developmental agenda that most of the countries espouse, and in opening up an inward looking gaze of statecraft and social organisation, the digital itself remains an ineffable concept. Largely because the digital is like­ a­ blackbox that conflates multiple registers of meaning and layers of life, it becomes important to unengineer it and see what it enables and hides. The economic presence of the digital is perhaps the most visible in telling the story of Asia in the now. Beginning with the dramatic development of Singapore as the centre of informatics governance and the emergence of a range of cities from Shanghai to Manilla and Bangalore to Tehran, there has been an accelerated narrative of economic growth and accumulation of capital that is often the global face of the Asian turn. However, this economic reordering is not a practice in isolation. It brings with it, a range of social stirrings that seek to overthrow traditional structures of oppression, corruption, control, and injustice that have often remained hidden in the closed borders of Asian countries. However, the digital marks a particular shift where these questions are no longer being excavated by the ICT4D logic, of the West’s attempts to save Asia from itself. These are questions that emerge from the ground, as more people interact with progressive and liberal politics and aspire not only for higher purchase powers but a better quality of rights. The digital turn has opened up a range of social and political rights based discourses, practices, and movements, where populations are holding their governments and countries responsible, accountable, and culpable in the face of personal and collective loss and injustice...&lt;/p&gt;
&lt;p&gt;In the face of this multiplicity of digital sites and usages that are reconfiguring Asia, it is obvious then, that the very nature of what constitutes activism is changing as well. Organised civil society presence in Asia has often had a strong role in shaping modern nation states, but more often than not these processes were defined in the same vocabulary as that of the powers that they were fighting against.­ Marked by­ a­ strong sense of developmentalism and often working in complement to the state rather than keeping a check on the state’s activities, traditional activism in Asia has often suffered from the incapacity to scale and the inability to find alternatives to the state-defined scripts of development, growth and progress. In countries where literacy rates have been low, these movements also suffer from being conceived in philosophical and linguistic sophistry that escapes the common citizen and remains the playground of the few who have privileges afforded to them by class and region. Digital Activism, however, seems to have broken this language barrier, both internally and externally, allowing for new visualities enabled by ubiquitous computing to bring various stakeholders into the fray... At the same time, the digital itself has introduced new problems and concerns that are often glossed over, in the enthralling tale of progress. Concerns around digital divide, invasive practices of personal data gathering, the nexus of markets and governments that install the citizen/consumer in precarious conditions, and the re-emergence of organised conservative politics are also a part of the digital turn. Activism has had to focus not only on digital as a tool, but digital also as a site of protest and resistance...&lt;/p&gt;
&lt;p&gt;The Reader does not offer an index of the momentous emergence with the growth of the digital or a chronological account of how digital activism in Asia has grown and shaped the region. Instead, the Reader attempts a crowd-sourced  compilation that presents critical tools, organisations, theoretical concepts, political analyses, illustrative case-studies and annotations, that an emerging network of changemakers in Asia have identified as important in their own practices within their own contexts.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-activism-in-asia-reader'&gt;https://cis-india.org/raw/digital-activism-in-asia-reader&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Activism in Asia Reader</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-10-24T14:36:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/studying-the-emerging-database-state-in-india-accepted-abstract">
    <title>Studying the Emerging Database State in India: Notes for Critical Data Studies (Accepted Abstract)</title>
    <link>https://cis-india.org/raw/studying-the-emerging-database-state-in-india-accepted-abstract</link>
    <description>
        &lt;b&gt;"Critical Data Studies (CDS) is a growing field of research that focuses on the unique theoretical, ethical, and epistemological challenges posed by 'Big Data.' Rather than treat Big Data as a scientifically empirical, and therefore largely neutral phenomena, CDS advocates the view that data should be seen as always-already constituted within wider data assemblages." The Big Data and Society journal has provisionally accepted a paper abstract of mine for its upcoming special issue on Critical Data Studies.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Through the last decade, the Government of India has given shape to an digital identification infrastructure, developed and operated by the Unique Identification Authority of India (UIDAI). The infrastructure combines the task of assigning unique identification numbers, called Aadhaar numbers, to individuals submitting their biometric and demographic details, and the task of authenticating their identity when provided with an Aadhaar number and  associated data (biometric data, One Time Pin sent to the pre-declared mobile number, etc.). The aim of UIDAI is to provide universal authentication-as-a-service for all residents of India who approach any public or private agencies for any kind of service or transaction. Simultaneously, the Aadhaar numbers will function as unique identifiers for joining up databases of different government agencies, and hence allow the Indian government to undertake big data analytics at a governmental scale, and not only at a departmental one.&lt;/p&gt;
&lt;p&gt;In this paper, I am primarily motivated by the challenge of finding points and objects to enter into a critical study of such an in-progress data infrastructure. As I proceed with an understanding that data is produced within its specific social and material context, the question then is to read through the data to reflect on its possible social and material context. This is complicated when approaching a big data infrastructure that is meant to produce data for explicitly intra-governmental consumption and circulation. The problem then is not one of reading through available big data, but one of reading through the assemblage and imaginaries of big data to reflect on the kind of data it will give rise to, and thus on the politics of the data assemblage and the database state it enables.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Logic of the Database State&lt;/h2&gt;
&lt;p&gt;Application of data to inform governmental acts have taken place at least since government has been understood as responsible for the welfare of the population and the territory. The measurement of the population and the territory – the number of people, their demographic features, amounts and locations of natural resources, and so on – have always been integral to the functioning of the modern nation-state. Database state is used in this paper to identify a particular mode of mobilisation of data within governmental acts, which is fundamentally shaped by the possibilities of big data extraction, appropriation, and analytics pioneered by a range of companies since late 1990s. The reason for not using big data state but database dtate is that big data refers to a body of technologies emerging in response to  a set of data management and analysis challenges situated in a certain moment of development of information technologies, whereas database refers to a symbolic form (Manovich 1999): a form in which not only the population is made visible to the government (as a collection of visual, textual, numeric, and other forms of records), but also how the acts of government are made visible to the population (as a collection of performance indicators, budget allocation and utilisation tables, and other data visualised through dashboards, analog and digital).&lt;/p&gt;
&lt;p&gt;The data production and management logic of this database state is specifically inspired by the notion of platform introduced by the so-called Web 2.0 companies: providing a common service layer upon which various other applications may also run, but under specific arrangements (including distribution of generated user data) with the original common layer provider. Data assemblages of the database state are expected to enable the government to function as a platform, as an intensely data-driven layer that widely gathers data about population individuals and feeds it back selectively to various providers of public and private services. This transforms the data assemblage from one vertical of governmental activities to a horizontal critical infrastructure for modularisation of governmental activities.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Studying the Emerging Database State in India&lt;/h2&gt;
&lt;p&gt;Government of India is presently debating the legal and technical validity of the digital identity infrastructure programme in the Supreme Court, while simultaneously carrying out the enrollment drive for the same, linking up assignment  of unique identity numbers with a national drive for population registration, and rolling out citizen-facing services and applications that implement the Aadhaar number as a necessary key to access them. With the enrollment process going on and the integration with various governmental processes (termed seeding by Aadhaar policy literature) just beginning, I enter this study through two key sets of objects reflecting the imaginaries and the technical specifications of the emerging database state in India. The first entry point is through the various official documents of vision, intentions, plans, and reconsiderations, and the second entry point is through the Application Programming Interface (API) documentations published by UIDAI to specify how its identity authentication platform will collaborate with various public and private services.&lt;/p&gt;
&lt;p&gt;The first section of the paper provides a brief survey of pre-UIDAI attempts by the Government of India to deploy unique identification numbers and Smart Cards for specific population groups, so as to understand the initial conceptualisation of this data assemblage of a digital identification platform. The second section foregrounds how this platform undertakes a transformation of the components and relations of the pre-existing data assemblage of the Government of India, as articulated in various official documents of promised utility and proposed collaborations. The third section studies the API documentations to track how such imaginaries are materially interpreted and operationalised through the design of protocols of data interactions with various public and private agencies offering services utilising the identity authentication platform.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Notes for Critical Data Studies&lt;/h2&gt;
&lt;p&gt;Expanding the early agenda note on Critical Data Studies by Craig Dalton and Jim Thatcher (2014), Rob Kitchin and Tracey P. Lauriault have taken steps towards emphasising the responsibility of this nebulous research strategy to chart and unpack the data assemblages (2014). This is exactly what I propose to do in this paper. While Kitchin and Lauriault provide a detailed list of the components of the apparatus of a data assemblage (2014: 7), I find the concepts of infrastructural components and infrastructural relations very useful in thinking through the emerging infrastructure of authentication. Thus, my approach to these tasks of charting and unpacking is focused on the infrastructural relations that the digital identity infrastructure re-configures, instead of the infrastructural components it mobilises (Bowker et al 2010). This tactical choice of focusing on the infrastructural relations is also necessitated by the practical difficulty in having comprehensive access to the individual components of the data assemblage concerned. Addressing questions of causality and quality becomes difficult when studying the assemblage sans the produced data, and rigorously analysing concerns of security and uncertainty pre-requires an actually existing data assemblage, with a public interface to investigating its leakages, breakages, and internal functioning. In the absence of such points of entry into the data assemblage, which I fear may not be an exceptional case, I attempt an inverted reading. Turning the data infrastructure inside out, in this paper I describe how the digital identity platform is critically reshaping the basis of governmental acts in India, through a specific model of production, extraction and application of big data.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Bibliography&lt;/h2&gt;
&lt;p&gt;Bowker, Geoffrey C., Karen Baker, Florence Millerand, &amp;amp; David Ribes. 2010. Toward Information Infrastructure Studies: Ways of Knowing in a Networked Environment. Jeremy Hunsinger, Lisbeth Klastrup, &amp;amp; Matthew Allen (Eds.) International Handbook of 	Internet Research. Springer Dordrecht Heidelberg London New York. Pp. 97-117.&lt;/p&gt;
&lt;p&gt;Dalton, Craig, &amp;amp; Jim Thatcher. 2014. What does a Critical Data Studies Look Like, and Why do We Care? Seven Points for a Critical Approach to ‘Big Data.’ Society and Space. May 19. Accessed on July 08, 2015, from &lt;a href="http://societyandspace.com/material/commentaries/craig-dalton-and-jim-thatcher-what-does-a-critical-data-studies-look-like-and-why-do-we-care-seven-points-for-a-critical-approach-to-big-data/" target="_blank"&gt;http://societyandspace.com/material/commentaries/craig-dalton-and-jim-thatcher-what-does-a-critical-data-studies-look-like-and-why-do-we-care-seven-points-for-a-critical-approach-to-big-data/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Kitchin, Rob, &amp;amp; Tracey P. Lauriault. 2014. Towards Critical Data Studies: Charting and Unpacking Data Assemblages and their Work. The Programmable City Working Paper 2. July 29. National University of Ireland Maynooth, Ireland. Accessed on July 08, 2015 from &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2474112" target="_blank"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2474112&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Manovich, Lev. 1999. Database as Symbolic Form. Convergence. Volume 5, Number 2. Pp. 80-99.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Note: Call for Papers for the special issue can found here: &lt;a href="http://bigdatasoc.blogspot.in/2015/06/call-for-proposals-special-theme-on.html" target="_blank"&gt;http://bigdatasoc.blogspot.in/2015/06/call-for-proposals-special-theme-on.html&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/studying-the-emerging-database-state-in-india-accepted-abstract'&gt;https://cis-india.org/raw/studying-the-emerging-database-state-in-india-accepted-abstract&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2015-11-13T05:54:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/konkani-wikipedia-goes-live">
    <title>Konkani Wikipedia Goes Live After 'Nine Years' of Incubation</title>
    <link>https://cis-india.org/openness/blog-old/konkani-wikipedia-goes-live</link>
    <description>
        &lt;b&gt;Konkani Wikipedia is the second Wikimedia project after Odia Wikisource that has gone live out of incubation. The project stayed in the incubation for nine long years and the community has gone through a long debate to have a Wikipedia of their own. Here is a blog highlighting three Konkani Wikimedians and an advocate of the Wikipedia movement whose efforts finally paid off.&lt;/b&gt;
        
&lt;p&gt;Read the original blog entry published on Wikimedia Blog on July 15, 2015 &lt;a class="external-link" href="http://blog.wikimedia.org/2015/07/15/konkani-wikipedia-goes-live/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The Goan Konkani Wikipedia (available at &lt;a href="https://gom.wikipedia.org"&gt;gom.wikipedia.org&lt;/a&gt;) has gone live after spending nine long years in incubation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;An Indo-Aryan language, of the Indo-European family of languages, Konkani is the official language of &lt;a title="w:Goa" href="https://en.wikipedia.org/wiki/Goa"&gt;Goa&lt;/a&gt;. It is a minority language in other Indian states, such as &lt;a title="w:Maharashtra" href="https://en.wikipedia.org/wiki/Maharashtra"&gt;Maharashtra&lt;/a&gt;, &lt;a title="w:Karnataka" href="https://en.wikipedia.org/wiki/Karnataka"&gt;Karnataka&lt;/a&gt;, northern &lt;a title="w:Kerala" href="https://en.wikipedia.org/wiki/Kerala"&gt;Kerala&lt;/a&gt;, &lt;a title="w:Dadra and Nagar Haveli" href="https://en.wikipedia.org/wiki/Dadra_and_Nagar_Haveli"&gt;Dadra and Nagar Haveli&lt;/a&gt;, and &lt;a title="w:Daman and Diu" href="https://en.wikipedia.org/wiki/Daman_and_Diu"&gt;Daman and Diu.&lt;/a&gt; It is spoken by about 7.4 million people.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Konkani can be written in five different scripts: Devanagari—officially used by the Government of Goa—as well as Latin (locally known as &lt;a href="https://en.wikipedia.org/wiki/Konkani_in_the_Roman_script"&gt;Romi Konkani&lt;/a&gt;), Kannada, Malayalam, and Persian. Of these, the Goan Antruz dialect of the language, in the Devanagari script, is considered &lt;a title="en:Konkani alphabets" href="https://en.wikipedia.org/wiki/Konkani_alphabets"&gt;standard&lt;/a&gt; by the Indian constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Konkani Wikipedia has many heroes, as we see them. &lt;a title="gom:User:Melissa Simoes" href="https://gom.wikipedia.org/wiki/User:Melissa_Simoes"&gt;Melissa Simoes&lt;/a&gt; and &lt;a title="gom:User:Darshan kandolkar" href="https://gom.wikipedia.org/wiki/User:Darshan_kandolkar"&gt;Darshan Kandolkar&lt;/a&gt; are two of the many long-term contributors who joined during the &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Konkani_Wikipedia_@Goa_University"&gt;Konkani Wikipedia @ Goa University&lt;/a&gt; program and are still active even after the program formally concluded. Darshan is an assistant professor at the &lt;a title="w:Government College Pernem" href="https://en.wikipedia.org/wiki/Government_College_Pernem"&gt;Government College Pernem&lt;/a&gt; in Goa. His professor at &lt;a title="w:Goa University" href="https://en.wikipedia.org/wiki/Goa_University"&gt;Goa University&lt;/a&gt;, Dr. Madhavi Sardesai—who passed away last year—played a vital role in inspiring him to go for higher studies in Konkani. Darshan realized that there is a lot to be written in Konkani when he was introduced to Wikipedia, and after that, he became dedicated to contributing to the project.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“I would like to bring more students as contributors to our Konkani Wikipedia,” Darshan says. “My aim is to start with my students at Government College Pernem. Being an alumnus of Goa University, I also want my juniors there to join our community and enrich Konkani Wikipedia.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“I have a dream to start a project for the freedom fighters of Goa and involve a diverse set of people, from students to journalists and columnists. I also want to build partnership with educational institutions so we could engage with the students for a longer run and the existing Konkani community could mentor them,” he continues.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“Being a new Wikipedia project, Konkani Wikipedia needs more quality measures and the articles have to grow to good quality articles with more images and templates, I want to take it to the level of English Wikipedia with both quantitative and qualitative growth in articles!”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Konkani Wikimedia community has been using social media actively to promote the Konkani Wikipedia project, and to celebrate the successes of its contributors. After Melissa became the top contributor to the project, her fellow editor &lt;a title="incubator:User:Konknni mogi 24" href="https://incubator.wikimedia.org/wiki/User:Konknni_mogi_24"&gt;Luis Gomes&lt;/a&gt; &lt;a href="https://www.facebook.com/groups/konkaniwikipedia/permalink/485802771575565"&gt;congratulated&lt;/a&gt; her. That brought Melissa into the spotlight, gaining the attention of editors from the global Wikimedia community. The community is continuing a tradition to rewarding the most prolific contributor of each month as the “Wikipedian of the Month”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Melissa was introduced to the Wikipedia program at her university where the target for each participating student was to write one article each about a village in Goa. “I wrote my article just for the sake of the marks, but never bothered to think about why I am writing it. After the program was over, I became inactive on Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“After some time, I met Father [Luis Gomes] in parish and then Darshan and Father inspired me to resume editing. Then, it became an addiction and I never stopped even for a day. I would come back from work and sit in front of my computer.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“Now, I am a teacher, and my fellow teachers are mostly women. I would like to introduce the Goan Konkani Wikipedia to them so they could also contribute to Wikipedia,” Melissa says.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As Konkani Wikipedia went live, long term Wikimedian Fredrick Noronha, an early advocate of Konkani Wikipedia, said, “It is a wonderful feeling to see the Goan Konkani Wikipedia live. I would like to congratulate all who have been involved in some or the other way with the making of Konkani Wikipedia live from the days of its inception and incubation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“I am not a great contributor or even a language expert. I come from a content background and found my interest in Wikipedia, Wikimedia Commons and Creative Commons long ago. But this helped me to associate myself in some way with the Konkani Wikipedia incubator. I am happy that CIS-A2K chipped in to help build a community and help it grow in collaboration with the Goa University.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“Students of the Konkani department in the university are the real heroes to take this effort forward by filling the Wikipedia incubator with more editing activity to which the institutional backing acted as catalyst,” he added.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Fredrick feels there are major challenges that the community now has to start taking measures for: “The macrolanguage is written in multiple scripts. Out of five of the scripts three—Devanagari, Romi/Latin and Kannada—are actively used in printing and publication currently. People using all the scripts should be equally participating in a movement like Wikipedia to take their languages to other native speakers using Wikipedia as a digital tool.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The second challenge is with the contributors. Goa, being home to majority of the Konkani language speakers, has English education from the primary level. This means many have a great level of technical ability. The technical contributor community here would be of great use to Konkani Wikipedia if tapped,” he adds.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The technical contributors are eager to contribute but have not been approached in a manner that would interest them. Similarly the Konkani authors who are helping propagate the language to masses have sadly no or very little clue about Wikipedia’s existence in Konkani. This disparity is stopping a massive flow of local encyclopedic content to the Konkani Wikipedia. Unless we tap into the technological and the linguistic groups it will be only a tip of the iceberg.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Fredrick explains that the the current Konkani Wikipedia community is primarily made up of students of Goa University. “This is both good and bad,” he says. “Having young and enthusiastic students as Wikipedia editors is helping the project to leap forward, which might not have happened if the faculty were targeted instead. There is, however, a great need for diversification.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The approach to bring in authors in the 60–70 years age group will vary from the approach to bring in, for example, technical people. Our outreach strategies should ultimately fulfill both the literary and technological contributors, so that their work can help us to both grow content and to solve the problem of the multiple scripts, respectively,” Fredrick adds.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Konkani Wikipedia community is organizing a &lt;a href="https://www.facebook.com/events/1449555445347537/"&gt;public seminar&lt;/a&gt; on July 18 at &lt;a href="https://www.unigoa.ac.in/"&gt;Goa University&lt;/a&gt; to celebrate the launch of the Konkani Wikipedia and to pay tribute to Dr. Madhavi Sardesai, who always dreamed of the Konkani Wikipedia getting out of incubation.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center;"&gt;&lt;iframe src="https://commons.wikimedia.org/wiki/File%3ADarshan_Kandolkar_talks_about_Konkani_Wikipedia.webm?embedplayer=yes" frameborder="0" height="288" width="512"&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Wikimedian &lt;a title="w:gom:User:Darshan Kandolkar" href="https://en.wikipedia.org/wiki/gom:User:Darshan_Kandolkar"&gt;Darshan Kandolkar&lt;/a&gt; shares his experience of contributing to Konkani Wikipedia. &lt;br /&gt;Video in Konkani. &lt;a href="https://commons.wikimedia.org/wiki/File:Darshan_Kandolkar_talks_about_Konkani_Wikipedia.webm"&gt;Video&lt;/a&gt; by &lt;a title="m:Wikimedia India" href="https://meta.wikimedia.org/wiki/Wikimedia_India"&gt;Wikimedia India&lt;/a&gt;, freely licensed under &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"&gt;CC-BY-SA 4.0.&lt;/a&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/konkani-wikipedia-goes-live'&gt;https://cis-india.org/openness/blog-old/konkani-wikipedia-goes-live&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Creative Commons</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Konkani Wikipedia</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-06-18T18:15:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india">
    <title>DesiSec: Cybersecurity and Civil Society in India</title>
    <link>https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india</link>
    <description>
        &lt;b&gt;As part of its project on mapping cyber security actors in South Asia and South East Asia, the Centre for Internet &amp; Society conducted a series of interviews with cyber security actors. The interviews were compiled and edited into one documentary. The film produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Originally the idea was to do 24 interviews with an array of international experts: Technical, political, policy, legal, and activist. The project was initiated at the University of Toronto and over time a possibility emerged. Why not shape these interviews into a documentary about cybersecurity and civil society? And why not focus on the world’s largest democracy, India? Whether in India or the rest of the world there are several issues that are fundamental to life online: Privacy, surveillance, anonymity and, free speech. DesiSec includes all of these, and it examines the legal frameworks that shape how India deals with these  challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the time it was shot till the final edit there has only been one change in the juridical topography: the dreaded 66A of the IT Act has been struck down. Otherwise, all else is in tact. DesiSec was produced by Purba Sarkar, shot and edited by Aaron Joseph, and directed by Oxblood Ruffin. It took our team from Bangalore to Delhi and, Dharamsala. We had the honour of interviewing: Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad. Everyone brought something special to the discussion and we are grateful for their insights. Also, we are particularly pleased to include the music of Charanjit Singh for the intro/outro of DesiSec. Mr. Singh is the inventor of acid house music, predating the Wikipedia entry for that category by five years. Someone should correct that.&lt;/p&gt;
&lt;p&gt;DesiSec is released under the Creative Commons License Attribution 3.0 Unported (CC by 3.0). You can watch it on Vimeo: &lt;a href="https://vimeo.com/123722680" target="_blank"&gt;https://vimeo.com/123722680&lt;/a&gt; or download it legally and free of charge via torrent. Feel free to show, remix, and share with your friends. And let us know what you think!&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/8N3JUqRRvys" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india'&gt;https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Laird Brown</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-06-29T16:25:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/open-data-intermediaries-in-developing-countries">
    <title>Open Data Intermediaries in Developing Countries - A Synthesis Report</title>
    <link>https://cis-india.org/openness/blog-old/open-data-intermediaries-in-developing-countries</link>
    <description>
        &lt;b&gt;The roles of intermediaries in open data is insufficiently explored; open data intermediaries are often presented as
single and simple linkages between open data supply and use. This synthesis research paper offers a more
socially nuanced approach to open data intermediaries using the theoretical framework of Bourdieu’s social model, in particular, his concept of species of capital as informing social interaction...  Because no single
intermediary necessarily has all the capital available to link effectively to all sources of power in a field, multiple
intermediaries with complementary configurations of capital are more likely to connect between power
nexuses. This study concludes that consideration needs to be given to the presence of multiple intermediaries in an open data ecosystem, each of whom may possess different forms of capital to enable the use and unlock the
potential impact of open data.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This synthesis report is prepared by François van Schalkwyk, Michael Caňares, Sumandro Chattapadhyay, and Alexander Andrason, based on the analysis of a sample of cases from the &lt;a href="http://opendataresearch.org/" target="_blank"&gt;Exploring the Emerging Impacts of Open Data in Developing Countries&lt;/a&gt; (ODDC) research network managed by the World Wide Web Foundation and supported by the International Development Research Centre, Canada. Data on intermediaries were extracted from the ODDC reports according to a working definition of an open data intermediary presented in this paper, and with a focus on how intermediaries link actors in an open data supply chain.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Below is an excerpt from the report. The full report can be accessed from &lt;a href="http://figshare.com/articles/Open_Data_Intermediaries_in_Developing_Countries/1449222" target="_blank"&gt;Figshare&lt;/a&gt; or from &lt;a href="https://github.com/ajantriks/docs/raw/master/ODDC_2_Open_Data_Intermediaries_15_June_2015_FINAL.pdf" target="_blank"&gt;Github&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Implications for Policy&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The practical implications of the findings presented here are not insignificant. Given that most of the open data intermediaries in this study were found to rely on donor in order to execute their open data-related social benefit activities, it is perhaps funders who should take heed of the findings presented here when making grants. For example, where a single agency is awarded a funding grant to improve the lives of citizens using open data, questions need to be asked whether the grantee possesses all the types of capital required not only to re-use open data but to connect open data to specific user groups in order to
ensure the use and impact of open data. Questions to be asked of grantees could include: “Who are the specific user groups or communities that you expect to use the data, information or product you are making available?”; “Does your organisation have existing links to these user groups or communities?”; and “What types of channels are in place for you to communicate with these user groups or communities?”. Alternatively donor funders may rethink awarding funding to single agencies in favour of funding partnerships or collaborations in which there is a greater spread of types of capital across multiple actors thereby
increasing the likelihood of effectively linking the supply and use of open data. Such an approach would be more in line with an ecosystems approach to multiple actors being participants in the data supply and (re)use of open data, and the importance of keystone species and positive feedback loops to ensure a healthy system.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to highlighting the importance of social capital in developing-country innovations systems, Intarakummerd and Chaoroenporn (2013) point to the importance of government initiating and coordinating the activities of both public and private intermediaries. Our findings indicate that should governments adopt such a co-ordinating role in the case of open data intermediaries, they would do well to engage with a broad spectrum of intermediaries, and not simply focus on intermediaries who possess only the technical capital required to interpret and repackage open government data. To be sure, this will be a challenging role for government to assume as conflicting vested interests are likely to surface. Although speculative, it is possible that such a coordinating role is likely to work best when there is a strong pact between all actors involved. And this, in turn, will require a common vision of the value and benefits of open data – something that cannot be taken for granted.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Should there be agreement on the value and benefits of open data, our findings show that most of the
intermediaries in our study are NGOs that rely on donor funding. This should raise serious questions about the sustainability of open data initiatives that are civic-minded in conjunction with questions about what incentives other than that of donor funding could ensure the supply and use of open data beyond project funding. Funders and supporters of open data initiatives may have to think not only about the value and benefits or funding projects, but of the sustainability and the impacts of the products produced by the projects they fund.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/open-data-intermediaries-in-developing-countries'&gt;https://cis-india.org/openness/blog-old/open-data-intermediaries-in-developing-countries&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Open Data Community</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2015-06-16T09:40:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/workshop-on-open-data-for-human-development-2015-06">
    <title>Workshop on Open Data for Human Development</title>
    <link>https://cis-india.org/openness/blog-old/workshop-on-open-data-for-human-development-2015-06</link>
    <description>
        &lt;b&gt;Sumandro Chattapadhyay and Sunil Abraham will take part in the workshop being organised for government officials from Bhutan, Maldives, Meghalaya, Sikkim, and Tripura, by the International Centre for Human Development (IC4HD) of UNDP India, during June 3-6, 2015. The workshop will be held at the National Institute of Advanced Studies Campus in Bengaluru. Sunil will be one of the panelists in the opening discussion on 'data and transparency in governance,' and Sumandro will provide input for and lead the sessions on developing the draft implementation plan for the Sikkim Open Data Acquisition and Accessibility Policy. Sumandro worked with the IC4HD team to design the objectives and the agenda of the workshop.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Sikkim Open Data Acquisition and Accessibility Policy&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Government of Sikkim passed the &lt;a href="http://www.sikkim.gov.in/stateportal/Link/SODAAP%20Policy%20Document.pdf" target="_blank"&gt;SODAA Policy&lt;/a&gt; in 2014 so as to streamline and open up the availability of “authentic data to buttress the achievements of the Government of Sikkim and to gather data on key metrics to be able to spur growth in all the areas of human development.” The Policy mandates setting up an open data portal, hosted by the State Data Centre of Sikkim, where data contributed by all the state government agencies will reside, and from which the same data will be made openly accessible to government agencies, non-government organisations, and private individuals alike. Only data that is shareable – data that is not part of negative list prepared by any government agency – and that is non-sensitive – data that does not contain information that can be used to identify any private individual – will be made available through this Sikkim open data portal. The Department of Information Technology of the Government of Sikkim has been assigned the role of being the nodal agency for coordinating and monitoring the implementation “of policy through close collaboration with all State Government Departments and agencies.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Objectives of the Workshop&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Government of Sikkim understands that data collection, management, and reporting processes at the different departments must go through a structural reconfiguration before systematic and sustainable publication of data through this open data portal can be possible. This work will of course involve a long duration of change, and participation of a wide range of actors. The &lt;a href="http://www.in.undp.org/content/india/en/home/operations/projects/human-development/the-international-centre-for-human-development.html" target="_blank"&gt;International Centre for Human Development&lt;/a&gt;, at UNDP India, is organising this workshop for Sikkim government officials to conceptualise and develop the outlines of an action strategy towards this goal of streamlining data acquisition and publication processes across government departments.&lt;/p&gt;
&lt;p&gt;Discussions in this workshop will focus on the activities of four departments of the Government of Sikkim – Department of Health, Rural Management and Development Department (RMDD), Human Resource Development Department (HRDD), and Department of Agriculture. At least two officials from each of these departments would take part in the workshop. Apart from these departments, officials from Department of Information Technology (DIT), Department of Economic Statistics, Monitoring, and Evaluation (DESME), and others, will also participate.&lt;/p&gt;
&lt;p&gt;Apart from government officials from Sikkim, those from Bhutan, Maldives, Meghalaya, and Tripura will also attend the workshop, so as to think ahead towards their respective open data initiatives.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Agenda of the Workshop&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Day 1: June 3, 2015&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;0930-1000&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Welcome and Introductions&lt;/strong&gt;&lt;br /&gt;
A.K. Shiva Kumar, Director, IC4HD&lt;br /&gt;
P.D. Rai, Honourable Member of Parliament (LS) from Sikkim&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1000-1100&lt;br /&gt;
&lt;strong&gt;Session 1&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel Discussion&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Data and Transparency in Governance&lt;/strong&gt;&lt;br /&gt;
Moderator: P. D. Rai&lt;br /&gt;
Panellists:
&lt;ul&gt;&lt;li&gt;Srivatsa Krishna, Secretary, Department of Information Technology, Biotechnology and Science &amp;amp; Technology, Government of Karnataka&lt;/li&gt;
&lt;li&gt;B. Gangaiah, Additional Director General, Centre for Good Governance, Hyderabad&lt;/li&gt;
&lt;li&gt;Sunil Abraham, Executive Director, The Centre for Internet and Society&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1100-1130&lt;br /&gt;
&lt;strong&gt;Session 2&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Sikkim Open Data Acquisition and Accessibility Policy&lt;/strong&gt;&lt;br /&gt;
Moderator: P. D. Rai&lt;br /&gt;
Presentation by: T. Samdup, Joint Director, Department of Information Technology, Sikkim&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1130-1200&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1200-1300&lt;br /&gt;
&lt;strong&gt;Session 3&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Implementing an Open Data Policy - Key Components&lt;/strong&gt;&lt;br /&gt;
Moderator: A. K. Shiva Kumar&lt;br /&gt;
Presentation by: Sumandro Chattapadhyay, The Centre for Internet and Society&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1300-1400&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1400-1430&lt;br /&gt;
&lt;strong&gt;Session 4&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Group Exercise 1&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Challenges of Opening up Government Data in Sikkim&lt;/strong&gt;&lt;br /&gt;
Facilitated by: Sumandro Chattapadhyay&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1430-1530&lt;br /&gt;
&lt;strong&gt;Session 5&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Mobile Phone-based Data Collection&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Introduction to Akvo FLOW&lt;/strong&gt;&lt;br /&gt;
Moderator: Meenaz Munshi, IC4HD&lt;br /&gt;
Presentation by: Joy Ghosh and Amitangshu Acharya, AKVO&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1530-1600&lt;/td&gt;
&lt;td&gt;Tea Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00-1730&lt;br /&gt;
&lt;strong&gt;Session 6&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Group Exercise 2&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Collecting Data Using Akvo FLOW&lt;/strong&gt;&lt;br /&gt;
Facilitated by: Joy Ghosh and Amitangshu Acharya, AKVO&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Day 2: June 4, 2015&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;0930-1000&lt;br /&gt;
&lt;strong&gt;Session 7&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Analysing, Visualising, and Publishing Data&lt;/strong&gt;&lt;br /&gt;
Moderator: Amitangshu Acharya&lt;br /&gt;
Presentation by: Thejesh GN, DataMeet&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1000-1045&lt;br /&gt;
&lt;strong&gt;Session 8&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Collecting, Visualising, and Publishing Geographic Data&lt;/strong&gt;&lt;br /&gt;
Moderator: Amitangshu Acharya&lt;br /&gt;
Presentation by: Shiv Ramachandran, MapBox&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1045-1145&lt;br /&gt;
&lt;strong&gt;Session 9&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Group Exercise 3&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Organising, Analysing, Visualising, and Publishing Data&lt;/strong&gt;&lt;br /&gt;
Facilitated by: Thejesh GN and Shiv Ramachandran&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1145-1200&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1200-1300&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Group Exercise 3&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Organising, Analysing, Visualising, and Publishing Data&lt;/strong&gt;&lt;br /&gt;
(Continued)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1300-1400&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1400-1500&lt;br /&gt;
&lt;strong&gt;Session 10&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Open Data and Health Management&lt;/strong&gt;&lt;br /&gt;
Presentation by: Dr. Shiban Ganju, Consultant, Ingalls Health, Harvey, Illinois, Chicago; Chair, Atrimed Health Consulting, Bangalore&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1500-1600&lt;br /&gt;
&lt;strong&gt;Session 11&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Open Data and Primary Education&lt;/strong&gt;&lt;br /&gt;
Presentation by: Gautam John, Karnataka Learning Partnership&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Day 3: June 5, 2015&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;0930-1030&lt;br /&gt;
&lt;strong&gt;Session 12&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel Discussion&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Regional Experiences and Reflections on Open Data&lt;/strong&gt;&lt;br /&gt;
Panellists: representative from Bhutan, and from Meghalaya&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1030-1115&lt;br /&gt;
&lt;strong&gt;Session 13&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Implementing National Data Sharing and Accessibility Policy&lt;/strong&gt;&lt;br /&gt;
Presentation by: D. P. Misra, National Informatics Centre&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1115-1130&lt;br /&gt;
&lt;strong&gt;Session 14&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Group Exercise 4&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Drafting the SODAAP Implementation Plan&lt;/strong&gt;&lt;br /&gt;
Facilitated by: Sumandro Chattapadhyay&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1130-1200&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1200-1300&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Group Exercise 4&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Drafting the SODAAP Implementation Plan&lt;/strong&gt;&lt;br /&gt;
(Continued)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1300-1400&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1400-1500&lt;br /&gt;
&lt;strong&gt;Session 15&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Group Presentations&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Draft SODAAP Implementation Plan&lt;/strong&gt;&lt;br /&gt;
Moderator: P. D. Rai&lt;br /&gt;
Facilitated by: Sumandro Chattapadhyay&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1500-1530&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Wrap-Up and Vote of Thanks&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/workshop-on-open-data-for-human-development-2015-06'&gt;https://cis-india.org/openness/blog-old/workshop-on-open-data-for-human-development-2015-06&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    

   <dc:date>2015-06-02T15:34:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation">
    <title>Joining the Dots in India's Big-Ticket Mobile Phone Patent Litigation (Updated)</title>
    <link>https://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation</link>
    <description>
        &lt;b&gt;An analysis of the significant commonalities and differences in various big-ticket lawsuits in India over the alleged infringement of mobile device patents. &lt;/b&gt;
        &lt;p&gt;This blog post has been merged with &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt;another on the same topic&lt;/a&gt; and published as a paper. The paper was last updated in October 2017.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;&lt;a class="external-link" href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3120364"&gt;View paper on SSRN.&lt;/a&gt;&lt;/strong&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation'&gt;https://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2018-05-06T03:51:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/making-in-the-humanities-2013-some-questions-and-conflicts">
    <title>Making in the Humanities – Some Questions and Conflicts</title>
    <link>https://cis-india.org/raw/making-in-the-humanities-2013-some-questions-and-conflicts</link>
    <description>
        &lt;b&gt;The following is an abstract for a proposed chapter on 'making' in the humanities, which has been accepted for publication in a volume titled 'Making Humanities Matter'. This is part of a new book series titled 'Debates in the Digital Humanities 2015' to be published by University of Minnesota Press (http://dhdebates.gc.cuny.edu/cfps/cfp_2015_mhm). The first draft of the chapter will be shared by mid-August 2015.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The object of enquiry in the humanities has traditionally been defined in the form of text, audio-visual or other kinds of ‘objects’ or cultural artifacts. With the growth of information and communication technologies, and the advent of the digital, the emergence of a ‘digital object’, as ambiguous as the term may sound, in the last couple of decades, has led to a rethinking of the conventional notion of research objects as well as modes of questioning, with larger consequences for the production and dissemination of knowledge. The rise of fields like ‘humanities computing’, ‘digital humanities’ and ‘cultural analytics’, suggest a combining of two separate domains, or polarized binaries (such as old and new media), and point to the availability of new objects of study, and therefore the need for new methods to study them. A large part of the discourse around these objects however, in trying to read them closely, obfuscates the processes by which they are constituted, which are often as novel and innovative as the artifacts themselves.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This paper will attempt to explore the processes of ‘making’ of these digital objects in the context of several sites of recent humanities scholarship in India that mobilise digital techniques as key methods. These will include two online video archival initiatives (Indiancine.ma and Pad.ma), a digital variorum of Rabindranath Tagore's literary works (Bichitra) developed at the University of Jadavpur, Kolkata, and curatorial work undertaken by the Centre for Public History, Srishti School of Art, Design and Technology, Bengaluru. Film, text and archival objects acquire several nuances as they are ‘made’ into digital objects, which are also reflected in the methods of working with and studying them. At the same time, problems of authorship, authenticity, accessibility, and a lack of adequate methods to study these objects are some challenges faced across disciplines. The objective of the study is to outline some of the questions related to form and methods that emerge with the digital object, and in the process undertake a critical reading of the politics of making in the humanities. What is the role of ‘making’ in the humanities? Where does humanities research using digital technologies intersect with art and creative practices? How is this research manifested in new forms or objects and methods, and to what effects on the humanities? The paper will aim to respond to some of these questions through a discussion of the initiatives mentioned above.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/making-in-the-humanities-2013-some-questions-and-conflicts'&gt;https://cis-india.org/raw/making-in-the-humanities-2013-some-questions-and-conflicts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Mapping Digital Humanities in India</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-11-13T05:46:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/studying-internet-in-india-selected-abstracts">
    <title>Studying Internet in India: Selected Abstracts</title>
    <link>https://cis-india.org/raw/studying-internet-in-india-selected-abstracts</link>
    <description>
        &lt;b&gt;We received thirty five engaging abstracts in response to the call for essays on 'Studying Internet in India.' Here are the ten selected abstracts. The final essays will be published from June onwards.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Deva Prasad M - 'Studying the Internet Discourse in India through the Prism of Human Rights'&lt;/h3&gt;
&lt;p&gt;Exploring Internet from the perspective of human rights gives rise to the multitude of issues such as right to privacy, freedom of expression, accessibility. Pertinent socio-political and legal issues related to Internet which was widely debated upon in the past one year in India includes lack of freedom of expression on Internet and Section 66A of Information Technology Act, 2000. The recent net neutrality debate in India has also evoked deliberation about the right of equal accessibility to Internet and to maintain Internet as a democratic space. The repercussions of ‘Right to be Forgotten’ law of European Union also had led to debate of similar rights in Indian context. Interestingly all these issues have an underlying thread of human right perspective connecting them and need pertinent deliberation from human rights perspective.&lt;/p&gt;
&lt;p&gt;This paper is an attempt to understand and analyze theses issues from the human rights angle and also how they have contributed in evolving an understanding and perspective amongst the digitally conscious Indian’s to ensure the democratic nature of “Internet” is perceived. Moreover, analysis of these three issues would also help in emphasizing upon the need for a right-based approach in studying Internet in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Dibyajyoti Ghosh - 'Indic Scripts and the Internet'&lt;/h3&gt;
&lt;p&gt;Whereas the status of the internet in India is similar to the status of the internet in similar economies with low-penetration and a primarily mobile-based future, an alphabetically diverse nation such as India has its added worries. Whereas the 1990s saw an overdomination of English given the linguistic communities which were developing the world of computers and the world of the internet, by 2015, some of the disparity with offline linguistic patterns has been reduced. However, for Indic scripts, much less development has taken place. If one is studying the internet in India, chances are one is studying it in English.&lt;/p&gt;
&lt;p&gt;What does this hold for the future of these Indic scripts? Given the multilingual skills of Indian school-goers and the increasing amount of daily reading time of those connected to the internet (which is somewhere between 12% and 20% of the population) being devoted to reading on the internet, chances are reading is increasingly in English. In this essay, I shall attempt to study the effects this has on the internet population of India, some of which are as follows.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The kind of mimetic desire it causes&lt;/li&gt;
&lt;li&gt;The degneration in spelling skills caused due to transliteration&lt;/li&gt;
&lt;li&gt;The effacement of non-digitised Indic verbal texts&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Divij Joshi - 'The Internet in the Indian Judicial Imagination'&lt;/h3&gt;
&lt;p&gt;The first mention of the 'Internet' in the vocabulary of Indian judicial system was a fleeting reference to its radical capability to allow access to knowledge. In one of its most recent references, it expounded upon and upheld the idea of the Internet as a radical tool for free expression, announcing its constitutional significance for free speech.&lt;/p&gt;
&lt;p&gt;The judicial imagination of the Internet – the understanding of its capabilities and limitations, its actors and constituents, as reflected in the judgements of Indian courts – plays a major role in shaping the Internet in India, both reflecting and defining conceptions of the Internet and its relationship with society, law, and public policy.&lt;/p&gt;
&lt;p&gt;This essay is an attempt to use legal and literary theory to study the archives of judicial decisions, tracing the history of the Internet in India through the lens of judicial trends, and also to look at how the judiciary has defined its own role in relation to the Internet. It attempts a vital study of how courts in India have conceptualized and understood the Internet, and how these conceptions have, in turn, impacted the influence of the Internet on Indian society.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Ipsita Sengupta&lt;/h3&gt;
&lt;p&gt;The proposed essay will make observations of a specific kind of conversation that takes place on the social media platform of YouTube. The conclusive argument is imagined along questions of high versus low culture, as described below.&lt;/p&gt;
&lt;p&gt;Under study are two objects- one, particular YouTube videos which play Rabindra-Sangeet, i.e. songs penned and composed in the late 19- early 20th centuries by the Bengali writer and artist Rabindranath Tagore, the body of work which today has become a genre of Indian music; and the second, comments that these videos receive from users of the site.&lt;/p&gt;
&lt;p&gt;Visuals of YouTube song videos of Rabindra-Sangeet are of many kinds. So are renditions, with solitary or duet or band performances, and with varying pace and instrumental accompaniment.&lt;/p&gt;
&lt;p&gt;The videos which have visuals from contemporary cinema, like images of urban youth, and the remixed renditions have often been found to receive comments which reflect/ reveal hurt sentiments of people trying to preserve some kind of sanctity of Rabindra-Sangeet, comments which state how the ethics of presenting the genre have been violated, via their notation and design, by either makers of the film in the song’s incorporation, or by the way young pop stars have been placed in particular montages.&lt;/p&gt;
&lt;p&gt;Some examples:&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/1aGwOBgyWTo?rel=0" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/8_z3blCxCCQ?rel=0" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;In such a scenario, YouTube as medium of user-generated expression becomes interesting to analyse individual and group dynamics- given the space for commenting (below the video), and statistical data such as “Likes”, “Dislikes”, and “Views”. The debate here is that in Tagore’s “Nationalism”, when he himself is seen to have an imagination of the human race beyond patriotic groupings and consequent othering, does this apparent need to avoid “insulting” his compositions by preserving an intangible art form in a particular way, become then a type of jingoism of region or identity? And what is this Benjaminian “aura” of the “original” that listeners look for in their experience of these videos?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Laird Brown - 'Dharamsala Networked'&lt;/h3&gt;
&lt;p&gt;Three hours after regulations governing public access to WiFi in India were changed in 2005 the first router went up in Dharamsala. It was homemade, open source, and eventually, “monkey proof.”  Something unimaginable had happened: high-speed Internet access in one of India’s most difficult physical geographies. Dharamsala has also become one of India's interesting information networks and has a burgeoning, unlikely 'tech scene’. But is it so unlikely?&lt;/p&gt;
&lt;p&gt;Since 1959 Dharamsala has been home to the Dalai Lama, the Tibetan people and, government in exile. This single, significant incident possibly set in motion a number of factors that made it possible for the mountain-town to become a political, global, communications. However, much like the rest of India, the region struggles for human and environmental rights against fractured ideas of 'development'. This essay will draw on archives and interviews to unpack this microcosmic tale of Internet access, its histories and economics and the factors at play in shaping it - mundane and maverick, familiar and outlier.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Maitrayee Deka - 'WhatsApp Economy'&lt;/h3&gt;
&lt;p&gt;Everyone around us is connected to the Internet through some or other electronic devices, phones, laptops, and tablets. However, not everyone use Internet for the same purpose. Through an ethnographic account of the usage of WhatsApp messages by the traders in three electronic bazaars in Delhi, Palika Bazaar, Nehru Place and Lajpat Rai Market, we see how Internet on the phone is used predominantly for business purpose. The paper seeks to examine how Whatsapp messages, which are for most of the users a medium for social communication, for the traders in Delhi, become a mode to establish business contact with their counterparts in China. From sharing of pictures of new tools to quoting prices of different products, Whatsapp messages become the lifeline of what many has termed as ‘globalization from below’. This paper argues what has started as economic exchanges through Whatsapp messages may start a new political alliance of similar mass markets in Asia. With the electronic bazaars in Delhi facing stiff competition from formal business actors both online and offline, the WhatsApp messages that is a space of new innovations and trade alliances could sustain the mass markets in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Purbasha Auddy - 'Citizens and their Internet'&lt;/h3&gt;
&lt;p&gt;Suddenly it seems internet data package on mobile phones is the reply to the problems in India. As mobile phones remain with us most of the time, it is as if we are ready to face the world if our mobile phones have a data package. Yes, several television commercials in India are gleefully harping on the notes of knowledge, empowerment and freedom. Moreover, internet is being identified as a virtual institution.&lt;/p&gt;
&lt;p&gt;The essay proposes to look into those advertisements which talk about the internet to promote data packages, mobile phones or apps. Through this, the essay firstly, would like to construct the idea of the internet using the Indian citizen who is depicted as smart and almost infallible. Secondly, on the other hand, the essay would analyse how an affirmative and constructive view of using the internet in the minds of citizens has been generated by these advertisements, like the virtual world of the internet can save you from any drastic situation.&lt;/p&gt;
&lt;p&gt;Advertisements are creative constructs, which have a strong aptitude to entice target consumers. While studying the internet in India, studying the ‘texts’ of Indian advertisements which refer to the act of ‘consuming’ the internet could result in an interesting study.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Sailen Routray - 'The Many Lives and Sites of Internet in Bhubaneswar'&lt;/h3&gt;
&lt;p&gt;Those of us who have jumped or meandered across to the wrong (or perhaps the right) side of thirty by now, first came to consume internet in what were called, and are still called, cyber cafes or internet cafes. Their numbers in big Indian cities is dwindling because of the increasing ubiquity of smartphone, and netbooks and data cards. The cyber café seems to be inexorably headed the way of the STD booth in the geography of large Indian cities. The present paper is a preliminary step towards capturing some of the experience of running and using internet cafes. With ethnographic fieldwork with cyber café owners and internet users in these cafes in the Chandrasekharpur area of Bhubaneswar (where the largest section of the computer industry in the state of Odisha is located), this paper tries to capture experiences that lie at the interstices of ‘objects’ and spaces - experiences that are at the same time a history of the internet as well as a personal history of the city.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Sarah McKeever - 'Quantity over Quality: Social Media and the New Class System in India'&lt;/h3&gt;
&lt;p&gt;From the humblest mobile phones to the most sophisticated computers, the Internet is everywhere and nowhere in India. The boundaries, the contours of the space remain nebulous and opaque. When engaging with social media in urban India in particular, we are bound to the conventions of corporations which demand quantity over quality creating a new class system of the Internet: those who are “active” – and therefore a “better” user – and those who have seemingly failed to keep up with the demands of the medium, buried in the ever­‐growing noise and chaos. The creation of a new class system on the Internet, based on Western corporate desire for data, has shaped who is seen and heard on the Internet in India.&lt;/p&gt;
&lt;p&gt;Based on fieldwork in New Delhi which examines the impact of the Internet on offline social movements – including the anti corruption movement in 2011 and the Delhi Rape Case in 2012 – I will argue that the study of the Internet in India can reinforce Western corporate conceptions of how to use the Internet properly among various users involved in the movements. By challenging these preconceptions, this essay will engage with issues of Western corporate notions of Internet use and how we engage with and find participants, how we evaluate what is “good” use of the Internet, and the creation of a new class system on the Internet in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Smarika Kumar - 'Governing Speech on the Internet: Transforming the Public Sphere through Policymaking'&lt;/h3&gt;
&lt;p&gt;In the privatised spaces of the World Wide Web and the internet, how does one make sense of speech? Should speech in such a space be understood as the product of a marketplace of ideas? Or should its role in democratic participation be recognised by contextualising the internet as part of the Habermasian public sphere? These questions have interesting implications for the regulation of speech on the internet, as they employ different principles in understanding speech. Recent scholarship has argued for the benefits of employing the public sphere approach to the internet and thus recognising its democratic potential. But taking into account that all speech is inherently made in private spaces on the internet, the application of this
approach is far from simple.&lt;/p&gt;
&lt;p&gt;This creates a tension between the marketplace of ideas and the public sphere approaches to speech on the internet in policymaking. I propose to explore how legal and regulatory mechanisms manage these tensions by
creating governance frameworks for the internet: I argue that through the use of policy and regulation, the private marketplace of the internet is sought to be reined in and reconciled to the public sphere, which is mostly represented through legislations governing the internet. I propose that this less-than-perfect reconciliation then manages to modify the very idea of the public sphere itself in the Indian context, by infusing participation of the "other" on the internet through indirect means.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/studying-internet-in-india-selected-abstracts'&gt;https://cis-india.org/raw/studying-internet-in-india-selected-abstracts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    

   <dc:date>2015-08-28T06:53:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services">
    <title>Response to TRAI Consultation Paper on Regulatory Framework for Over-the-Top (OTT) Services</title>
    <link>https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) sent a joint response to the TRAI Consultation Paper on Regulatory Framework for Over-the-top (OTT) Services with scholars from Indian Institute of Management, Ahmedabad. The response was sent on March 27, 2015.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Executive Summary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The principle objective of net neutrality is that “all the Internet traffic has to be treated equally without any discrimination”; but this has had different interpretations over varied contexts. While the discourse in India has often treated net neutrality as a singular policy construct, we break down net neutrality to its various components. We then individually contextualise each component to the unique characteristics of the Indian telecommunications industry such as dependence on wireless internet access, the fragmented and non-contiguous distribution of spectrum, high competition between TEL-SPs and low digital literacy. The evolving nature of markets and networks are also considered while taking into account various public policy perspectives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this submission, we also argue for the need to introduce reasonable regulatory parity between functionally equivalent communications services provided by OTT-SPs and TEL-SPs. We compare the regulations for OTT-SPs under the Information Technology Act 2000 (as amended) with the regulations for TEL-SPs under the Telegraph Act 1885 (as amended), the license agreements (UL, UASL, ISP-L) and TRAI Regulations. Based on an analysis of the current laws and regulations, we suggest how TRAI needs to intervene to create this regulatory parity (for example in areas such as privacy, spam/UCC, interception etc.).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the above analysis, we recommend an overall regulatory framework that should be adopted by the Government. The framework takes a nuanced approach to various components of net neutrality, contextualised to India, and also attempts to bring reasonable regulatory parity. Instead of compartmentalising TEL-SPs and OTT-SPs as two distinct actors, the recommended framework considers a two-layered approach which recognises that there is an overlap between TEL-SPs and OTT-SPs. The first layer comprises of network and infrastructure (collectively called the network layer) and the second layer comprises of services and applications (collectively called the service layer).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The framework further divides the service layer into “Non-IP Services”, “Specialised Services” and “Internet Based Services”. The concept of “Specialised Services”, which is borrowed from the European Union, refers to traditional services that have migrated to an IP architecture such as facilities-based VoIP calls to PSTN and IPTV, and are either logically distinct from the Internet or have special needs which the “best efforts” delivery of the general Internet cannot satisfy. This concept helps in applying different evaluation criteria to functionally equivalent “Non-IP Services”, “Specialised Services” and “Internet Based Services”. In the framework, “Specialised Services” are also recognised as an exception to net neutrality. The concept of “Specialised Services” also helps to create an incentive for continued investment in underlying infrastructure by TEL-SPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This framework has helped us to bring a more balanced approach from the perspective of both TEL-SPs and OTT-SPs, while also taking into account technological convergence. It has also helped us to bring a more nuanced approach to various issues comprising net neutrality such as zero rating, paid prioritisation etc. We have considered best practices from different international regimes and the pros and cons during implementation in order to determine the exceptions and boundaries of net neutrality that should be adopted in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/trai-response-paper.pdf" class="internal-link"&gt;Download the full text of the Response&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services'&gt;https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2015-05-09T11:27:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements">
    <title>Inclusive Financial Services - Global Trends in Accessibility Requirements</title>
    <link>https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements</link>
    <description>
        &lt;b&gt;Inclusive Financial Services is a G3ict White Paper researched in cooperation with the Centre for Internet and Society. The research paper comprises a Foreword and Introduction, four chapters — Barriers to Access for Persons with Disabilities and Diverse Abilities, International Framework, Integrating Accessibility into the System, and State of Practice - Impact of the Convention on Inclusive Finance and Accessibility Efforts around the Globe.&lt;/b&gt;
        &lt;h2&gt;Foreword&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Global demand for accessibility continues to grow, due in part to the strengthening voice worldwide of more than one billion people with disabilities, including the aging population, and important frameworks, such as the United Nations Convention on the Rights of Persons with Disabilities. From a private sector standpoint, the Convention represents a unique opportunity to ensure equal access to information while achieving global harmonization of standards and economies of scale. Understanding that technology is the great equalizer for underserved populations and having a clear roadmap towards inclusive information and communications technologies (ICT), rather than simple compliance strategies, will benefit everyone in every industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, the financial services sector is faced with the need to transform operations while providing truly exceptional customer experiences. Disruptive trends -- such as the aging population, influx of mobile devices and global regulations – are driving demand for more human-centric technology, and creating an opportunity for innovation that are proving to be differentiators for the institutions embracing them. Consumer demand to be in control of interactions and information is forcing those in financial services to reconsider what’s important to stay competitive. By offering an online experience through any device personalized to individual needs, preferences and abilities, organizations can ensure they are reaching the broadest base of the population, especially the “unbanked” and “underbanked,” to enhance interactions and improve sales opportunities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Customers with lifelong disabilities or age-related impairments represent an increasingly large population among the biggest markets in the world such as OECD countries and China. Also, in many countries aging persons are the holders of a majority of the assets and highly dependent on insurance, retirement and banking services. Ensuring they can use the services they need without encountering accessibility barriers is a powerful way to earn their loyalty in a highly competitive environment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IBM has a long tradition and culture of accessibility and understands the importance of improving the user experience, managing accessibility compliance, and creating an inclusive workplace environment. Consistent with our own experience, this report highlights the organizational and process adjustments needed to ensure everyone has equal access to timely information they need for work and life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By creating a holistic strategy for embedding accessible technology across the entire enterprise - from processes to product development to people – organizations can reinvigorate individual channels and harmonize them across the bank. G3ict has written this timely publication for the financial services sector that provides a clear picture of the global forces at work that are transforming how employee- and client-facing applications, products and services are delivered to reach the broadest set of customers. The report also serves as a useful benchmarking source for governments and advocates based on its review of existing solutions already implemented around the world. We applaud G3ict for taking this first step on the road of advocating for greater accessibility of financial services in cooperation with stakeholders from around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ian Hurst, General Manager, Global Financial Services Sector, IBM Corporation&lt;br /&gt;Frances W. West, Chief Accessibility Officer, IBM Corporation&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Financial services play a necessary and important role in societies by enabling access to products, resources, and services, enabling savings and asset creation, and facilitating economic self-sufficiency. Access to financial services for all is a necessity in today’s world not simply at the community or household level, but at an individual level, to open doors to banking services, credit services, stocks and shares, insurance, and other markets. Access to and inclusion in financial services is crucial to poverty reduction and participation in economic prosperity and growth and development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The increasing pervasiveness of technology in the delivery of financial services and the disruption of traditional channels of delivery through ‘FinTech’ (technology for financial service delivery) have generated new enthusiasm and newer ways for reaching out to persons who remain unbanked. Similarly, the increasing nature of services now available through technology has triggered growing demand among persons who remained marginalized from traditional paper-based banking services, as well as calls to ensure that they do not in turn create new barriers to access. Accompanying this growth spurt in technology there has also been an increasing recognition of the rights of persons with disabilities and the utmost importance of providing equal access to them to all services, including financial services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Persons with disabilities and diverse abilities have been amongst those traditionally marginalized from the financial services sector through a mix of inaccessibility, presumptions of limited need and capacity to manage finances, and mindsets that did not view them as a profitable consumer base. This paradigm is now rapidly changing with growing evidence of their demand and need for access to services as well as the increasing income base of persons with disabilities around the world. Persons with disabilities and diverse abilities are demanding better and easier access to the entire range of financial services. Access to and inclusion in financial services is important to persons across the economic spectrum. And for persons with disabilities who live under the poverty line, it is essential that they are involved in financial inclusion initiatives and programs that will empower them and enable them to become financially independent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A range of factors are serving as drivers to enhance the inclusion of persons with disabilities and diverse abilities through accessible financial services including demographics, attaining a competitive advantage and improving market share nationally and globally, Corporate Social Responsibility, regulations, legislation and compliance, enhancing business value, ensuring  and increasing an inclusive workplace for employees with disabilities, maximizing on technology advances, and ensuring diversity and inclusion for all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report offers an introduction and overview to the need for, and mechanisms to achieve accessibility in financial services:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Chapter 1 offers an understanding of the barriers posed by inaccessible financial services to persons with different disabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Chapter 2 highlights the different international mandates and frameworks that are accelerating the promotion of financial inclusion for persons with disabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Chapter 3 offers in-depth descriptions of the accessibility needs based on the type of technology in use, along with examples of effective practices and solutions to promote inclusion. It also offers a look at how different countries are striving to achieve the accessibility mandate.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Chapter 4 focuses on the state of practice of financial inclusion for persons with disabilities across countries and the implementation of the Convention’s requirements for ICT accessibility and financial inclusion. This chapter describes findings from two major studies undertaken by G3ict that paint a picture of the state of financial accessibility today and offer a glimpse into the financial sector’s commitment to incorporate accessibility into their work and services in the future.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Finally, in the Conclusions section, the report offers recommendations for relevant stakeholders to incorporate the principles of inclusion to drive accessibility through product design and delivery, policy and legal structures, and distribution channels and pathways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/inclusive-financial-services.pdf" class="internal-link"&gt;&lt;b&gt;Download the report&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements'&gt;https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2015-05-03T06:55:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
