<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/digital-natives/pathways/learning-in-higher-education/search_rss">
  <title>Pathways to Higher Education</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/making-voices-heard-project-announcement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-shutdown-stories"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/new-contexts-and-sites-of-humanities-practice-in-the-digital-paper"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/icann-diversity-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/making-voices-heard"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/datafication-of-the-public-distribution-system-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/internet-researchers-conference-2022"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/making-humanities-in-the-digital-embodiment-and-framing-in-bichitra-and-indiancine.ma"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/making-voices-heard-project-announcement">
    <title>Making Voices Heard: Privacy, Inclusivity, and Accessibility of Voice Interfaces in India</title>
    <link>https://cis-india.org/raw/making-voices-heard-project-announcement</link>
    <description>
        &lt;b&gt;We believe that voice interfaces have the potential to democratise the use of internet by addressing barriers such as accessibility concerns, lack of abilities of reading and writing on digital text interfaces, and lack of options for people to interact with digital devices in their own languages. Through the Making Voice Heard Project supported by Mozilla Corporation,  we will examine the current landscape of voice interfaces in India.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/CIS_Mozilla_MakingVoicesHeard_ProjectAnnouncement_01.jpg" alt="null" width="30%" /&gt; &lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/CIS_Mozilla_MakingVoicesHeard_ProjectAnnouncement_02.jpg" alt="null" width="30%" /&gt; &lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/CIS_Mozilla_MakingVoicesHeard_ProjectAnnouncement_03.jpg" alt="null" width="30%" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the project announcement cards (shown above): &lt;a href="https://raw.githubusercontent.com/cis-india/website/master/img/CIS_Mozilla_MakingVoicesHeard_ProjectAnnouncement_01.jpg" target="_blank"&gt;Card 01&lt;/a&gt;, &lt;a href="https://raw.githubusercontent.com/cis-india/website/master/img/CIS_Mozilla_MakingVoicesHeard_ProjectAnnouncement_02.jpg" target="_blank"&gt;Card 02&lt;/a&gt;, and &lt;a href="https://raw.githubusercontent.com/cis-india/website/master/img/CIS_Mozilla_MakingVoicesHeard_ProjectAnnouncement_03.jpg" target="_blank"&gt;Card 03&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Making Voices Heard: Project Announcement&lt;/h3&gt;
&lt;p&gt;Although voice enabled interfaces are being deployed there is a need to understand how they are beneficial, and what have been important knowledge gaps and challenges in their development, adoption, use, and regulation. Through the Making Voice Heard Project &lt;a href="https://blog.mozilla.org/blog/2019/07/05/mozillas-latest-research-grants-prioritizing-research-for-the-internet/" target="_blank"&gt;supported by Mozilla Corporation&lt;/a&gt;, we will be examining the current landscape of voice interfaces in India, and seek to address the following questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What is the broad (sectoral and functional) typology of available voice interfaces in Indian languages? How widely are these voice interfaces (in Indian languages) used, and what barriers prevent their further adoption and use?&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;What are concerns related to privacy and data protection that emerge with the growth of voice interfaces? What kind of protocols for data processing may need to be built into the design of these interfaces?&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;How accessible are these interfaces for persons with disabilities (PWDs)? What kinds of accessibility features, especially for Indian languages, may need to be developed to ensure effective use of voice technologies by PWDs?&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Where do challenges in these three areas intersect? For instance, is compromising on users’ privacy, including weak or missing data protection regulations, required to create comprehensive speech datasets that may help develop better accessibility features, and address linguistic barriers?&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;In order to approach these questions we have begun mapping the various developers and users of voice interfaces in India. In the next stage of the process we will be looking at these interfaces through the lens of privacy, language, accessibility, and design. In order to add to the mapping and questions, we will be conducting interviews and workshops with users, developers, designers and researchers of voice interfaces in India, including the &lt;a href="https://voice.mozilla.org/en" target="_blank"&gt;Common Voice&lt;/a&gt; team at Mozilla.&lt;/p&gt;
&lt;p&gt;We hereby invite researchers, developers and designers of voice interfaces to speak to us and help inform the study. You may contact Shweta Mohandas at shweta@cis-india.org.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;- Shweta Mohandas, Saumyaa Naidu, Puthiya Purayil Sneha, and Sumandro Chattapadhyay (project team)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/making-voices-heard-project-announcement'&gt;https://cis-india.org/raw/making-voices-heard-project-announcement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shweta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Voice User Interface</dc:subject>
    
    
        <dc:subject>Language</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Voice Assisted Interface</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Making Voices Heard</dc:subject>
    

   <dc:date>2019-12-18T12:10:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-shutdown-stories">
    <title>Internet Shutdown Stories</title>
    <link>https://cis-india.org/internet-governance/blog/internet-shutdown-stories</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) has published a collection of stories of the impact of internet shutdowns on people's lives in the country. This book seeks to give a glimpse into the lives of those directly affected by these internet shutdown experiments. When seen in a larger context, we hope that the stories in this book also demonstrate that access to the internet and freedom of speech is not just about an individual’s rights, but are also required for the collective good. This is a project funded by Facebook and MacArthur Foundation, and the stories were provided by 101 Reporters. Case studies from the states of Jammu &amp; Kashmir, Haryana, Rajasthan, Gujarat, Telangana, West Bengal, Tripura, Manipur, Nagaland, and Uttar Pradesh have been highlighted in this compilation.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Read the report here: &lt;a class="external-link" href="https://cis-india.org/internet-shutdown-stories/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;p&gt;The report is shared under Creative Commons Attribution-NoDerivatives 4.0 International license.&lt;/p&gt;
&lt;h4&gt;Edited by Debasmita Haldar, Ambika Tandon, and Swaraj Barooah&lt;/h4&gt;
&lt;h4&gt;Print Design by Saumyaa Naidu&lt;/h4&gt;
&lt;h4&gt;Advisor: Nikhil Pahwa, Founder and Editor at &lt;a href="https://www.medianama.com/" target="_blank"&gt;MediaNama&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2&gt;Foreword&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Aside from the waves of innovation that the digital revolution brought with it, the ever increasing pervasiveness of the internet has had a tremendous impact on empowerment and freedoms in society. We are seeing unprecedented levels of access to information, along with a democratization of the means of creation, production and dissemination of information to anyone with an internet connection. This in turn has greatly amplified, and in many cases even created the ability, particularly for those traditionally left in the margins, to more meaningfully participate in their global as well as local societies. Recognising the significance of the internet to the freedom of expression as well as for the development and exercising of human rights more broadly, the United Nations Human Rights Council unanimously passed a resolution confirming internet access being a fundamental human right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Simultaneously however, we are seeing Indian states discover and experiment with their power to clamp down on these new modes of communication for a variety of reasons, ranging from the ill-intentioned to the ill-informed. An internet shutdown tracker maintained by the Software Freedom Law Centre, shows that the number of shutdowns in India is increasing every year, with 70 shutdowns reported in 2017,and 45 shutdowns already &lt;a class="external-link" href="https://internetshutdowns.in/"&gt;reported from 1st Jan, 2018 to 4th May, 2018&lt;/a&gt;.&amp;nbsp;These shutdowns also come at a significant economic cost. A 2016 &lt;a class="external-link" href="http://www.brookings.edu/wp-content/uploads/2016/10/intenet-shutdowns-v-3.pdf"&gt;Brookings report&lt;/a&gt; estimates that India faced a loss of about $968 million due to internet shutdowns. However, the democratic harms we have been accruing are more difficult to quantify and demonstrate.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This book seeks to give a glimpse into the lives of those directly affected by these internet shutdown experiments. From Jammu and Kashmir to Telangana, from Gujarat to Nagaland, we have collected 30 stories from across the country for an up-close look at how the everyday lives of common citizens have been impacted by internet shutdowns and website blocks. From CRPF members posted in Srinagar who use the internet to connect with their family, to students who have been cut off from education resources for competitive exams; from the disruptions in day to day life brought about by non-functional bank services in Darjeeling, to stock brokers in Ahmedabad who faced costly slowdowns; the idea of a Digital India is facing severe setbacks with these continuously increasing internet shutdowns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;When seen in a larger context, we hope that the stories in this book also demonstrate that access to the internet and freedom of speech is not just about an individual’s rights, but are also required for the collective good. The diversity of perspectives and activities that a healthy democracy demands is not met by the versioning of dominant narratives, but by allowing for, if not directly encouraging, the voices and activities of the unheard, oppressed and marginalised. We hope that in the telling of these personal stories of the day-to-day of people affected by such internet shutdowns, this book joins in the effort to position the dehumanized internet kill switches more aptly as dangers to democracy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Sunil Abraham&lt;/strong&gt;&lt;br /&gt;Executive Director&lt;br /&gt;The Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-shutdown-stories'&gt;https://cis-india.org/internet-governance/blog/internet-shutdown-stories&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2019-09-03T09:57:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/new-contexts-and-sites-of-humanities-practice-in-the-digital-paper">
    <title>New Contexts and Sites of Humanities Practice in the Digital (Paper)</title>
    <link>https://cis-india.org/raw/new-contexts-and-sites-of-humanities-practice-in-the-digital-paper</link>
    <description>
        &lt;b&gt;The ubiquitous presence of the ‘digital’ over the couple of decades has brought with it several important changes in interdisciplinary forms of research and knowledge production. Particularly in the arts and humanities, the role of digital technologies and internet has always been a rather contentious one, with more debate spurred now due to the growth of fields like humanities computing, digital humanities (henceforth DH) and cultural analytics. Even as these fields signal several shifts in scholarship, pedagogy and practice, portending a futuristic imagination of the role of technology in academia and practice on the one hand, they also reflect continuing challenges related to the digital divide, and more specifically politics around the growth and sustenance of the humanities disciplines. A specific criticism within more recent debates around the origin story of DH in fact, has been its Anglo-American framing, drawing upon a history in humanities computing and textual studies, and located within a larger neoliberal imagination of the university and academia. While this has been met with resistance from across different spaces, thus calling for more diversity and representation in the discourse, it is also reflective of the need to trace and contextualize more local forms of practice and pedagogy in the digital as efforts to address these global concerns. This essay by Puthiya Purayil Sneha draws upon excerpts from a study on the field of DH and related practices in India, to outline the diverse contexts of humanities practice with the advent of the digital and explore the developing discourse around DH in the Indian context.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This essay was published in &lt;a href="http://iias.ac.in/ojs/index.php/summerhill/article/view/116" target="_blank"&gt;Vol 22 No 1 (2016): SummerHill&lt;/a&gt;, Indian Institute of Advanced Study, Shimla. Edited by Dr. Bindu Menon. Download the essay &lt;a href="http://iias.ac.in/ojs/index.php/summerhill/article/view/116/99" target="_blank"&gt;here&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The last couple of decades have seen an increasing prevalence of digital technologies and internet in the study and practice of arts and humanities. With the growth of fields like humanities computing, digital humanities (henceforth DH) and cultural analytics, there has been a renewed interest in the increasing role of the ‘digital’ in interdisciplinary forms of research and knowledge production. DH in particular has become a field of much interest and debate in different parts of the world, including in India. Globally, in the last two decades, there have been several efforts to organize the discourse around this field which seeks to explore various intersections between humanities and digital methods, spaces and tools1. But DH also continues to remain a bone of contention, with several perspectives on what exactly constitutes its methodology and scope, and most importantly its epistemological stake.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A specific criticism has been the Anglo-American framing of DH, located within a larger neoliberal imagination of the university and the higher education system at large. As a result, the connection of these two threads—a history of DH located in humanities computing and textual studies and its contextualization within the American university—is often represented as the history of DH. This has been met with resistance from several scholars and practitioners across the world calling for more global perspectives on the field. Drawing upon excerpts from a recently completed study on mapping the field of DH and related practices in India, this essay will attempt to outline the diverse contexts of humanities practice emerging with the digital turn, along with a reading of some of the global debates around DH to understand the discourse around the field in the Indian context.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/new-contexts-and-sites-of-humanities-practice-in-the-digital-paper'&gt;https://cis-india.org/raw/new-contexts-and-sites-of-humanities-practice-in-the-digital-paper&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2019-12-06T05:03:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/icann-diversity-analysis">
    <title>ICANN Diversity Analysis </title>
    <link>https://cis-india.org/internet-governance/blog/icann-diversity-analysis</link>
    <description>
        &lt;b&gt;The by-laws of The Internet Corporation for Assigned Names and Numbers (ICANN) state that it is a non-profit public-benefit corporation which is responsible at the overall level, for the coordination of the “global internet's systems of unique identifiers, and in particular to ensure the stable and secure operation of the internet's unique identifier systems”. As key stakeholders of ICANN are spread across the world, much of the communication discussing the work of ICANN takes place over email. This analysis of the diversity of participation at the ICANN processes, through a study of their mailing lists, was undertaken by  Paul Kurian and Akriti Bopanna.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The by-laws of The Internet Corporation for Assigned Names and Numbers (ICANN) state that it is a non-profit public-benefit corporation which is responsible at the overall level, for the coordination of the “global internet's systems of unique identifiers, and in particular to ensure the stable and secure operation of the internet's unique identifier systems”.&lt;a href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Previously, this was overseen by the Internet Assigned Number Authority (IANA) under a US Government contract but in 2016, the oversight was handed over to ICANN, as a global multi-stakeholder body.&lt;a href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Given the significance of the multistakeholder nature of ICANN, it is imperative that stakeholders continue to question and improve the inclusiveness of its processes. The current blog post seeks to focus on the diversity of participation at the ICANN process.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As stakeholders are spread across the world, much of the communication discussing the work of ICANN takes place over email. Various [or X number of ] mailing lists inform members of ICANN activities and are used for discussions between them from policy advice to organizational building matters. Many of these lists are public and hence can be subscribed to by anyone and also can be viewed by non-members through the archives.&lt;/p&gt;
&lt;p&gt;CIS analysed the five most active mailing lists amongst the working group mailing lists from January 2016 to May 2018, namely:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Outreach &amp;amp; Engagement,&lt;/li&gt;
&lt;li&gt;Technology,&lt;/li&gt;
&lt;li&gt;At-Large Review 2015 - 2019,&lt;/li&gt;
&lt;li&gt;IANA Transition &amp;amp; ICANN Accountability, and&lt;/li&gt;
&lt;li&gt;Finance &amp;amp; Budget mailing lists.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;We looked at the diversity among these active participants by focusing on their gender, stakeholder grouping and region. In order to arrive at the data, we referred to public records such as the Statement of Interests which members have to give to the Generic Names Supporting Organization(GNSO) Council if they want to participate in their working groups. We also used, where available, ICANN Wiki and the LinkedIn profiles of these participants. Given below are some of the observations we made subsequent to surveying the data. We acknowledge that there might be some inadvertent errors made in the categorization of these participants, but are of the opinion that our inference from the data would not be drastically affected by a few errors.&lt;/p&gt;
&lt;h4&gt;The following findings were observed:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;A total of 218 participants were present on the 5 mailing lists that were looked at.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Of these,, 92 were determined to be active participants (participants who had sent more than the median number of mails in their working group) out of which 75 were non-staff members. &lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Among the active non-staff participants:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Out of the 75 participants, &lt;strong&gt;56&lt;/strong&gt; (&lt;strong&gt;74.7%&lt;/strong&gt;) were male and &lt;strong&gt;19&lt;/strong&gt; (&lt;strong&gt;25.3%&lt;/strong&gt;) were female.&lt;br /&gt;&lt;img src="https://cis-india.org/home-images/Gender.png" alt="null" class="image-inline" title="Gender" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src="https://cis-india.org/home-images/StakeholderGroup.png" alt="null" class="image-inline" title="Stakeholder Group" /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;57.3%&lt;/strong&gt; were identified to be members of the industry and technological community and 1.3% were identified as government representatives. 8.0% were representatives from Academia, 25.3% represented civil society and the remaining 8.0% were from fields that were uncategorizable with respect to the above, but were related to law and consultancy.&lt;br /&gt;&lt;img src="https://cis-india.org/home-images/Region.png" alt="null" class="image-inline" title="Region" /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Only 14.7% of the participants were from Asia while the majority belonged to Africa and then North America with 24% and 22.7% participation respectively&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Within Asia, we identified only one active participant from China.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Concerns&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;The vast number of the people participating and as an extension, influencing ICANN work are male constituting three fourth of the participants.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The mailing list are dominated by individuals from industry.. This coupled with the relative minority presence of the other stakeholders creates an environment where concerns emanating from other sections of the society could be overshadowed.&lt;/li&gt;
&lt;li&gt;Only 14.7% of the participants were from Asia, which is concerning since 48.7% of internet users worldwide belong to Asia.&lt;a href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;China which has the world’s largest population of internet users (700 million people)&lt;a href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; had only one active participant on these mailing lists.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;ICANN being a global multistakeholder organization should ideally have the number of representatives from each region be proportionate to the number of internet users in that region. In addition to this, participation of women on these mailing lists need to increase to ensure that there is inclusive contribution in the functioning of the organization. We did not come across any indication of participation of individuals of non binary genders.&lt;/p&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;p&gt;&lt;a href="#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://cis-india.org/telecom/knowledge-repository-on-internet-access/icann&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/news/announcement-2016-10-01-en&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.internetworldstats.com/stats.htm&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.internetworldstats.com/stats3.htm&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/icann-diversity-analysis'&gt;https://cis-india.org/internet-governance/blog/icann-diversity-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akriti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-29T11:19:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/making-voices-heard">
    <title>Making Voices Heard</title>
    <link>https://cis-india.org/internet-governance/blog/making-voices-heard</link>
    <description>
        &lt;b&gt;We are happy to announce the launch of our final report on the study ‘Making Voices Heard: Privacy, Inclusivity, and Accessibility of Voice Interfaces in India. The study was undertaken with support from the Mozilla Corporation.&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/WebsiteHeader.jpg/@@images/8d8ed2a0-f0e4-44d7-8938-493b186402c5.jpeg" alt="Making Voices Heard" class="image-inline" title="Making Voices Heard" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We believe that voice interfaces have the potential to democratise the use of the internet by addressing limitations related to reading and writing on digital text-only platforms and devices. This report examines the current landscape of voice interfaces in India, with a focus on concerns related to privacy and data protection, linguistic barriers, and accessibility for persons with disabilities (PwDs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report features a visual mapping of 23 voice interfaces and technologies publicly available in India, along with a literature survey, a policy brief towards development and use of voice interfaces and a design brief documenting best practices and users’ needs, both with a focus on privacy, languages, and accessibility considerations, and a set of case studies on three voice technology platforms. &lt;span&gt;Read and download the full report &lt;a class="external-link" href="http://voice.cis-india.org/"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Credits&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Research&lt;/strong&gt;: Shweta Mohandas, Saumyaa Naidu, Deepika Nandagudi Srinivasa, Divya Pinheiro, and Sweta Bisht.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Conceptualisation, Planning, and Research Inputs&lt;/strong&gt;: Sumandro Chattapadhyay, and Puthiya Purayil Sneha.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Illustration&lt;/strong&gt;: Kruthika NS (Instagram @theworkplacedoodler). Website Design Saumyaa Naidu. Website Development Sumandro Chattapadhyay, and Pranav M Bidare.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Review and Editing&lt;/strong&gt;: Puthiya Purayil Sneha, Divyank Katira, Pranav M Bidare, Torsha Sarkar, Pallavi Bedi, and Divya Pinheiro.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Copy Editing&lt;/strong&gt;: The Clean Copy&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/making-voices-heard'&gt;https://cis-india.org/internet-governance/blog/making-voices-heard&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shweta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Voice User Interface</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2022-06-27T16:18:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/datafication-of-the-public-distribution-system-in-india">
    <title>Datafication of the Public Distribution System in India</title>
    <link>https://cis-india.org/raw/datafication-of-the-public-distribution-system-in-india</link>
    <description>
        &lt;b&gt;In this study, we look into the datafication of social protection schemes with a special focus on the Public Distribution System in India. Proponents of datafication claim that the benefits will reach the right person and curb leakages through the automation and digitisation of all PDS processes. Aadhaar is the most important link in the datafication; supporters claim that it makes technology people-centric. This study looks at the status of PDS datafication and its impact on the delivery of the scheme in Chhattisgarh and Jharkhand. We also try to understand to what extent the stated objective of portability has been met and how far the challenges faced by the rights holders of the PDS have been resolved. &lt;/b&gt;
        
&lt;p&gt;Read the full report &lt;a href="https://cis-india.org/raw/datafication-of-the-public-distribution-system-in-india-pdf" class="internal-link"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/datafication-of-the-public-distribution-system-in-india'&gt;https://cis-india.org/raw/datafication-of-the-public-distribution-system-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sameet Panda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RAW Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    

   <dc:date>2024-02-12T12:07:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015">
    <title>DeitY says 143 URLs have been Blocked in 2015; Procedure for Blocking Content Remains Opaque and in Urgent Need of Transparency Measures</title>
    <link>https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015</link>
    <description>
        &lt;b&gt;Across India on 30 December 2014, following an order issued by the Department of Telecom (DOT), Internet Service Providers (ISPs) blocked 32 websites including Vimeo, Dailymotion, GitHub and Pastebin.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;In February 2015, the Centre for Internet and Society (CIS) requested the Department of Electronics and Information Technology (DeitY) under the Right to Information Act, 2005 (RTI Act) to provide information clarifying the procedures for blocking in India. We have received a response from DeitY which may be &lt;a href="https://cis-india.org/internet-governance/blog/response-deity.clarifying-procedures-for-blocking.pdf" class="external-link"&gt;seen here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this post, I shall elaborate on this response from DeitY and highlight some of the accountability and transparency measures that the procedure needs. To stress the urgency of reform, I shall also touch upon two recent developments—the response from Ministry of Communication to questions raised in Parliament on the blocking procedures and the Supreme Court (SC) judgment in Shreya Singhal v. Union of India.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Section 69A and the Blocking Rules&lt;/h2&gt;
&lt;p align="JUSTIFY" class="western"&gt;Section 69A of the Information Technology Act, 2008 (S69A hereinafter) grants powers to the central government to issue directions for blocking of access to any information through any computer resource. In other words, it allows the government to block any websites under certain grounds. The Government has notified rules laying down the procedure for blocking access online under the Procedure and Safeguards for Blocking for Access of Information by Public Rules, 2009 (Rules, 2009 hereinafter). CIS has produced a poster explaining the blocking procedure (&lt;a href="http://cis-india.org/internet-governance/blog/blocking-websites.pdf/at_download/file"&gt;download PDF&lt;/a&gt;, 2.037MB).&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;There are &lt;em&gt;three key aspects&lt;/em&gt; of the blocking rules that need to be kept under consideration:&lt;/p&gt;
&lt;h3 align="JUSTIFY" class="western"&gt;Officers and committees handling requests&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Designated Officer (DO)&lt;/strong&gt; – Appointed by the Central government, officer not below the rank of Joint Secretary.&lt;br /&gt;&lt;strong&gt;Nodal Officer (NO)&lt;/strong&gt; – Appointed by organizations including Ministries or Departments of the State governments and Union Territories and any agency of the Central Government. &lt;br /&gt;&lt;strong&gt;Intermediary contact&lt;/strong&gt;–Appointed by every intermediary to receive and handle blocking directions from the DO.&lt;br /&gt;&lt;strong&gt;Committee for Examination of Request (CER)&lt;/strong&gt; – The request along with printed sample of alleged offending information is examined by the CER—committee with the DO serving as the Chairperson and representatives from Ministry of Law and Justice; Ministry of Home Affairs; Ministry of Information and Broadcasting and representative from the Indian Computer Emergency Response Team (CERT-In). The CER is responsible for examining each blocking request and makes recommendations including revoking blocking orders to the DO, which are taken into consideration for final approval of request for blocking by the Secretary, DOT. &lt;br /&gt;&lt;strong&gt;Review Committee (RC) &lt;/strong&gt;– Constituted under rule 419A of the Indian Telegraph Act, 1951, the RC includes the Cabinet Secretary, Secretary to the Government of India (Legal Affairs) and Secretary (Department of Telecom). The RC is mandated to meet at least once in 2 months and record its findings and has to validate that directions issued are in compliance with S69A(1).&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Provisions outlining the procedure for blocking&lt;/h3&gt;
&lt;p&gt;Rules 6, 9 and 10 create three distinct blocking procedures, which must commence within 7 days of the DO receiving the request.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a) Rule 6 lays out the first procedure, under which any person may approach the NO and request blocking, alternatively, the NO may also raise a blocking request. After the NO of the approached Ministry or Department of the State governments and Union Territories and/or any agency of the Central Government, is satisfied of the validity of the request they forward it to the DO. Requests when not sent through the NO of any organization, must be approved by Chief Secretary of the State or Union Territory or the Advisor to the Administrator of the Union Territory, before being sent to the DO.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The DO upon receiving the request places, must acknowledge receipt within 24 four hours and places the request along with printed copy of alleged information for validation by the CER. The DO also, must make reasonable efforts to identify the person or intermediary hosting the information, and having identified them issue a notice asking them to appear and submit their reply and clarifications before the committee at a specified date and time, within forty eight hours of the receipt of notice.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Foreign entities hosting the information are also informed and the CER gives it recommendations after hearing from the intermediary or the person has clarified their position and even if there is no representation by the same and after examining if the request falls within the scope outlined under S69A(1). The blocking directions are issued by the Secretary (DeitY), after the DO forwards the request and the CER recommendations. If approval is granted the DO directs the relevant intermediary or person to block the alleged information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;b) Rule 9 outlines a procedure wherein, under emergency circumstances, and after the DO has established the necessity and expediency to block alleged information submits recommendations in writing to the Secretary, DeitY. The Secretary, upon being satisfied by the justification for, and necessity of, and expediency to block information may issue an blocking directions as an interim measure and must record the reasons for doing so in writing.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;Under such circumstances, the intermediary and person hosting information is not given the opportunity of a hearing. Nevertheless, the DO is required to place the request before the CER within forty eight hours of issuing of directions for interim blocking. Only upon receiving the final recommendations from the committee can the Secretary pass a final order approving the request. If the request for blocking is not approved then the interim order passed earlier is revoked, and the intermediary or identified person should be directed to unblock the information for public access.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;c) Rule 10 outlines the process when an order is issued by the courts in India. The DO upon receipt of the court order for blocking of information submits it to the Secretary, DeitY and initiates action as directed by the courts.&lt;/p&gt;
&lt;h3 style="text-align: justify;" class="western"&gt;Confidentiality clause&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Rule 16 mandates confidentiality regarding all requests and actions taken thereof, which renders any requests received by the NO and the DO, recommendations made by the DO or the CER and any written reasons for blocking or revoking blocking requests outside the purview of public scrutiny. More detail on the officers and committees that enforce the blocking rules and procedure can be found &lt;a href="http://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Response on blocking from the Ministry of Communication and Information Technology&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The response to our RTI from E-Security and Cyber Law Group is timely, given the recent clarification from the Ministry of Communication and Information Technology to a number of questions, raised by parliamentarian  Shri Avinash Pande in the Rajya Sabha. The questions had been raised in reference to the Emergency blocking order under IT Act, the current status of the Central Monitoring System, Data Privacy law and Net Neutrality. The Centre for Communication Governance (CCG), National Law University New Delhi have extracted a set of 6 questions and you can read the full article &lt;a href="https://ccgnludelhi.wordpress.com/2015/04/24/governments-response-to-fundamental-questions-regarding-the-internet-in-india/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;The governments response as quoted by CCG, clarifies under rule 9—the Government has issued directions for emergency blocking of &lt;em&gt;a total number of 216 URLs from 1st January, 2014 till date &lt;/em&gt;and that &lt;em&gt;a total of 255 URLs were blocked in 2014 and no URLs has been blocked in 2015 (till 31 March 2015)&lt;/em&gt; under S69A through the Committee constituted under the rules therein. Further, a total of 2091 URLs and 143 URLs were blocked in order to comply with the directions of the competent courts of India in 2014 and 2015 (till 31 March 2015) respectively. The government also clarified that the CER, had recommended not to block 19 URLs in the meetings held between 1&lt;sup&gt;st&lt;/sup&gt;&lt;sup&gt; &lt;/sup&gt;January 2014 upto till date and so far, two orders have been issued to revoke 251 blocked URLs from 1st January 2014 till date. Besides, CERT-In received requests for blocking of objectionable content from individuals and organisations, and these were forwarded to the concerned websites for appropriate action, however the response did not specify the number of requests.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;We have prepared a table explaining the information released by the government and to highlight the inconsistency in their response.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;colgroup&gt; &lt;col width="331"&gt; &lt;col width="90"&gt; &lt;col width="91"&gt; &lt;col width="119"&gt; &lt;/colgroup&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p align="LEFT"&gt;&lt;strong&gt;Applicable rule and procedure outlined under the Blocking Rules&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p align="CENTER"&gt;&lt;strong&gt;Number of websites&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;&lt;em&gt;2014&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;&lt;em&gt;2015&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;&lt;em&gt;Total&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Rule 6 - Blocking requests from NO and others&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;255&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;None&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;255&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Rule 9 - Blocking under emergency circumstances&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;216&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Rule 10 - Blocking orders from Court&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;2091&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;143&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;2234&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Requests from individuals and orgs forwarded to CERT-In&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Recommendations to not block by CER&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;19&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Number of blocking requests revoked&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;251&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;In a &lt;a href="http://sflc.in/deity-says-2341-urls-were-blocked-in-2014-refuses-to-reveal-more/"&gt;response &lt;/a&gt;to an RTI filed by the Software Freedom Law Centre, DeitY said that 708 URLs were blocked in 2012, 1,349 URLs in 2013, and 2,341 URLs in 2014.&lt;/p&gt;
&lt;h2&gt;Shreya Singhal v. Union of India&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;In its recent judgment, the SC of India upheld the constitutionality of 69A, stating that it was a narrowly-drawn provision with adequate safeguards. The constitutional challenge on behalf of the People’s Union for Civil Liberties (PUCL) considered the manner in which the blocking is done and the arguments focused on the secrecy present in blocking.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The rules may indicate that there is a requirement to identify and contact the originator of information, though as an expert &lt;a href="http://indianexpress.com/article/opinion/columns/but-what-about-section-69a/"&gt;has pointed out&lt;/a&gt;, there is no evidence of this in practice. The court has stressed the importance of a written order so that writ petitions may be filed under Article 226 of the Constitution. In doing so, the court seems to have assumed that the originator or intermediary is informed, and therefore held the view that any procedural inconsistencies may be challenged through writ petitions. However, this recourse is rendered ineffective not only due to procedural constraints, but also because of the confidentiality clause. The opaqueness through rule 16 severely reigns in the recourse that may be given to the originator and the intermediary. While the court notes that rule 16 requiring confidentality was argued to be unconstitutional, it does not state its opinion on this question in the judgment. One expert, holds the &lt;a href="https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act-judgment-and-secret-blocking/"&gt;view&lt;/a&gt; that this, by implication, requires that requests cannot be confidential. However, such a reading down of rule 16 is yet to be tested.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Further, Sunil Abraham has &lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a"&gt;pointed&lt;/a&gt; out, “block orders are unevenly implemented by ISPs making it impossible for anyone to independently monitor and reach a conclusion whether an internet resource is inaccessible as a result of a S69A block order or due to a network anomaly.” As there are no comprehensive list of blocked websites or of the legal orders through which they are blocked exists, the public has to rely on media reports and filing RTI requests to understand the censorship regime in India. CIS has previously &lt;a href="http://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism"&gt;analysed&lt;/a&gt; the leaked block lists and lists received as responses to RTI requests which have revealed that the block orders are full of errors and blocking of entire platforms and not just specific links has taken place.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While the state has the power of blocking content, doing so in secrecy and without judical scrutiny, mark deficiencies that remain in the procedure outlined under the provisions of the blocking rules . The Court could read down rule 16 except for a really narrow set of exceptions, and in not doing so, perhaps has overlooked the opportunities for reform in the existing system. The blocking of 32 websites, is an example of the opaqueness of the system of blocking orders, and where the safeguards assumed by the SC are often not observed such as there being no access to the recommendations that were made by the CER, or towards the revocation of the blocking orders subsequently. CIS filed the RTI to try and understand the grounds for blocking and related procedures and the response has thrown up some issues that must need urgent attention.&lt;/p&gt;
&lt;h2&gt;Response to RTI filed by CIS&lt;/h2&gt;
&lt;p align="JUSTIFY" class="western"&gt;Our first question sought clarification on the websites blocked on 30&lt;sup&gt;th&lt;/sup&gt;&lt;sup&gt; &lt;/sup&gt;December 2014 and the response received from DeitY, E-Security and Cyber Law Group reveals that the websites had been blocked as “they were being used to post information related to ISIS using the resources provided by these websites”. The response also clarifies that the directions to block were issued on &lt;em&gt;18-12-2014 and as of 09-01-2015&lt;/em&gt;, after obtaining an undertaking from website owners, stating their compliance with the Government and Indian laws, the sites were unblocked.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;It is not clear if ATS, Mumbai had been intercepting communication or if someone reported these websites. If the ATS was indeed intercepting communication, then as per the rules, the RC should be informed and their recommendations sought. It is unclear, if this was the case and the response evokes the confidentiality clause under rule 16 for not divulging further details. Based on our reading of the rules, court orders should be accessible to the public and without copies of requests and complaints received and knowledge of which organization raised them, there can be no appeal or recourse available to the intermediary or even the general public.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;We also asked for a list of all requests for blocking of information that had been received by the DO between January 2013 and January 2015, including the copies of all files that had accepted or rejected. We also specifically, asked for a list of requests under rule 9. The response from DeitY stated that since January 1, 2015 to March 31, 2015 directions to block 143 URLs had been issued based on court orders. The response completely overlooks our request for information, covering the 2 year time period. It also does not cover all types of blocking orders under rule 6 and rule 9, nor the requests that are forwarded to CERT-In, as we have gauged from the ministry's response to the Parliament. Contrary to the SC's assumption of contacting the orginator of information, it is also clear from DeitY's response that only the websites had been contacted and the letter states that the “websites replied only after blocking of objectionable content”.&amp;nbsp;&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;Further, seeking clarification on the functioning of the CER, we asked for the recent composition of members and the dates and copies of the minutes of all meetings including copies of the recommendations made by them. The response merely quotes rule 7 as the reference for the composition and does not provide any names or other details. We ascertain that as per the DeitY website Shri B.J. Srinath, Scientist-G/GC is the appointed Designated Officer, however this needs confirmation. While we are already aware of the structure of the CER which representatives and appointed public officers are guiding the examination of requests remains unclear. Presently, there are 3 Joint Secretaries appointed under the Ministry of Law and Justice, the Home Ministry has appointed 19, while 3 are appointed under the Ministry of Information and Broadcasting. Further, it is not clear which grade of scientist would be appointed to this committee from CERT-In as the rules do not specify this. While the government has clarified in their answer to Parliament that the committee had recommended not to block 19 URLs in the meetings held between 1st January 2014 to till date, it is remains unclear who is taking these decisions to block and revoke blocked URLs. The response from DeitY specifies that the CER has met six times between 2014 and March 2015, however stops short on sharing any further information or copies of files on complaints and recommendations of the CER, citing rule 16.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;Finally, answering our question on the composition of the RC the letter merely highlights the provision providing for the composition under 419A of the Indian Telegraph Rules, 1951. The response clarifies that so far, the RC has met once on 7th December, 2013 under the Chairmanship of the Cabinet Secretary, Department of Legal Affaits and Secretary, DOT. Our request for minutes of meetings and copies of orders and findings of the RC is denied by simply stating that “minutes are not available”. Under 419A, any directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 issued by the competent authority shall contain reasons for such direction and a copy of such order shall be forwarded to the concerned RC within a period of seven working days. Given that the RC has met just once since 2013, it is unclear if the RC is not functioning or if the interception of messages is being guided through other procedures. Further, we do not yet know details or have any records of revocation orders or notices sent to intermediary contacts. This restricts the citizens’ right to receive information and DeitY should work to make these available for the public.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;Given the response to our RTI, the Ministry's response to Parliament and the SC judgment we recommend the following steps be taken by the DeitY to ensure that we create a procedure that is just, accountable and follows the rule of law.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;The revocation of rule 16 needs urgent clarification for two reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Under Section 22 of the RTI Act provisions thereof, override all conflicting provisions in any other legislation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In upholding the constitutionality of S69A the SC cites the requirement of reasons behind blocking orders to be recorded in writing, so that they may be challenged by means of writ petitions filed under &lt;a href="http://indiankanoon.org/doc/1712542/"&gt;A&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/1712542/"&gt;rticle 226&lt;/a&gt; of the Constitution of India.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;If the blocking orders or the meetings of the CER and RC that consider the reasons in the orders are to remain shrouded in secrecy and unavailable through RTI requests, filing writ petitions challenging these decisions will not be possible, rendering this very important safeguard for the protection of online free speech and expression infructuous. In summation, the need for comprehensive legislative reform remains in the blocking procedures and the government should act to address the pressing need for transparency and accountability. Not only does opacity curtial the strengths of democracy it also impedes good governance. We have filed an RTI seeking a comprehensive account of the blocking procedure, functioning of committees from 2009-2015 and we shall publish any information that we may receive.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015'&gt;https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>69A</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-04-30T07:37:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements">
    <title>Inclusive Financial Services - Global Trends in Accessibility Requirements</title>
    <link>https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements</link>
    <description>
        &lt;b&gt;Inclusive Financial Services is a G3ict White Paper researched in cooperation with the Centre for Internet and Society. The research paper comprises a Foreword and Introduction, four chapters — Barriers to Access for Persons with Disabilities and Diverse Abilities, International Framework, Integrating Accessibility into the System, and State of Practice - Impact of the Convention on Inclusive Finance and Accessibility Efforts around the Globe.&lt;/b&gt;
        &lt;h2&gt;Foreword&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Global demand for accessibility continues to grow, due in part to the strengthening voice worldwide of more than one billion people with disabilities, including the aging population, and important frameworks, such as the United Nations Convention on the Rights of Persons with Disabilities. From a private sector standpoint, the Convention represents a unique opportunity to ensure equal access to information while achieving global harmonization of standards and economies of scale. Understanding that technology is the great equalizer for underserved populations and having a clear roadmap towards inclusive information and communications technologies (ICT), rather than simple compliance strategies, will benefit everyone in every industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, the financial services sector is faced with the need to transform operations while providing truly exceptional customer experiences. Disruptive trends -- such as the aging population, influx of mobile devices and global regulations – are driving demand for more human-centric technology, and creating an opportunity for innovation that are proving to be differentiators for the institutions embracing them. Consumer demand to be in control of interactions and information is forcing those in financial services to reconsider what’s important to stay competitive. By offering an online experience through any device personalized to individual needs, preferences and abilities, organizations can ensure they are reaching the broadest base of the population, especially the “unbanked” and “underbanked,” to enhance interactions and improve sales opportunities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Customers with lifelong disabilities or age-related impairments represent an increasingly large population among the biggest markets in the world such as OECD countries and China. Also, in many countries aging persons are the holders of a majority of the assets and highly dependent on insurance, retirement and banking services. Ensuring they can use the services they need without encountering accessibility barriers is a powerful way to earn their loyalty in a highly competitive environment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IBM has a long tradition and culture of accessibility and understands the importance of improving the user experience, managing accessibility compliance, and creating an inclusive workplace environment. Consistent with our own experience, this report highlights the organizational and process adjustments needed to ensure everyone has equal access to timely information they need for work and life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By creating a holistic strategy for embedding accessible technology across the entire enterprise - from processes to product development to people – organizations can reinvigorate individual channels and harmonize them across the bank. G3ict has written this timely publication for the financial services sector that provides a clear picture of the global forces at work that are transforming how employee- and client-facing applications, products and services are delivered to reach the broadest set of customers. The report also serves as a useful benchmarking source for governments and advocates based on its review of existing solutions already implemented around the world. We applaud G3ict for taking this first step on the road of advocating for greater accessibility of financial services in cooperation with stakeholders from around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ian Hurst, General Manager, Global Financial Services Sector, IBM Corporation&lt;br /&gt;Frances W. West, Chief Accessibility Officer, IBM Corporation&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Financial services play a necessary and important role in societies by enabling access to products, resources, and services, enabling savings and asset creation, and facilitating economic self-sufficiency. Access to financial services for all is a necessity in today’s world not simply at the community or household level, but at an individual level, to open doors to banking services, credit services, stocks and shares, insurance, and other markets. Access to and inclusion in financial services is crucial to poverty reduction and participation in economic prosperity and growth and development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The increasing pervasiveness of technology in the delivery of financial services and the disruption of traditional channels of delivery through ‘FinTech’ (technology for financial service delivery) have generated new enthusiasm and newer ways for reaching out to persons who remain unbanked. Similarly, the increasing nature of services now available through technology has triggered growing demand among persons who remained marginalized from traditional paper-based banking services, as well as calls to ensure that they do not in turn create new barriers to access. Accompanying this growth spurt in technology there has also been an increasing recognition of the rights of persons with disabilities and the utmost importance of providing equal access to them to all services, including financial services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Persons with disabilities and diverse abilities have been amongst those traditionally marginalized from the financial services sector through a mix of inaccessibility, presumptions of limited need and capacity to manage finances, and mindsets that did not view them as a profitable consumer base. This paradigm is now rapidly changing with growing evidence of their demand and need for access to services as well as the increasing income base of persons with disabilities around the world. Persons with disabilities and diverse abilities are demanding better and easier access to the entire range of financial services. Access to and inclusion in financial services is important to persons across the economic spectrum. And for persons with disabilities who live under the poverty line, it is essential that they are involved in financial inclusion initiatives and programs that will empower them and enable them to become financially independent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A range of factors are serving as drivers to enhance the inclusion of persons with disabilities and diverse abilities through accessible financial services including demographics, attaining a competitive advantage and improving market share nationally and globally, Corporate Social Responsibility, regulations, legislation and compliance, enhancing business value, ensuring  and increasing an inclusive workplace for employees with disabilities, maximizing on technology advances, and ensuring diversity and inclusion for all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report offers an introduction and overview to the need for, and mechanisms to achieve accessibility in financial services:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Chapter 1 offers an understanding of the barriers posed by inaccessible financial services to persons with different disabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Chapter 2 highlights the different international mandates and frameworks that are accelerating the promotion of financial inclusion for persons with disabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Chapter 3 offers in-depth descriptions of the accessibility needs based on the type of technology in use, along with examples of effective practices and solutions to promote inclusion. It also offers a look at how different countries are striving to achieve the accessibility mandate.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Chapter 4 focuses on the state of practice of financial inclusion for persons with disabilities across countries and the implementation of the Convention’s requirements for ICT accessibility and financial inclusion. This chapter describes findings from two major studies undertaken by G3ict that paint a picture of the state of financial accessibility today and offer a glimpse into the financial sector’s commitment to incorporate accessibility into their work and services in the future.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Finally, in the Conclusions section, the report offers recommendations for relevant stakeholders to incorporate the principles of inclusion to drive accessibility through product design and delivery, policy and legal structures, and distribution channels and pathways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/inclusive-financial-services.pdf" class="internal-link"&gt;&lt;b&gt;Download the report&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements'&gt;https://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2015-05-03T06:55:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/internet-researchers-conference-2022">
    <title>Internet Researchers' Conference 2022</title>
    <link>https://cis-india.org/raw/internet-researchers-conference-2022</link>
    <description>
        &lt;b&gt;Due to internal delays related to the pandemic, the Internet Researchers' Conference will now take place online in May 2022. Please see below for a link to the updated call for sessions.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/raw/irc22poster.jpg/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;
&lt;hr /&gt;&lt;/h2&gt;
&lt;h2 id="docs-internal-guid-6b2cca91-7fff-8d10-8f96-da4506b6b1fb" dir="ltr"&gt;IRC22&lt;/h2&gt;
&lt;h2 dir="ltr"&gt;#Home&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The ‘home’ has been a key line of defence in efforts to curtail the spread of COVID-19. Public health recommendations and governmental measures have enforced numerous restrictions on daily living, including physical distancing and isolation, home confinement, and quarantining. These mandates to be at home have relied on the construction, and assumption, of home as a familiar, stable and safe space.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p dir="ltr"&gt;However, home has always been a site of intense political contestation—be it through the temporal frames of belonging, ideas of citizenship and regionalism, role in the reproduction of capital accumulation, or as material signifiers of social status. Over the past 2 years, digital infrastructures have played an intensified role in the meaning making of the home. Coming to terms with the pandemic entailed an accelerated embedding of digital systems in many of our relationships. Be it with the state, educational institutions, workplaces, or each other. Solutions to the many challenges of infrastructure and mobility emerging over the last year have been sought in digital technologies. The digital mediation of the pandemic has ushered in visions of the ‘new normal’ as situated wholly in the digital.&lt;/p&gt;
&lt;div&gt;While the initial anxieties of living through the pandemic may have now eased, and we make forays into a changed world, the spectre of the ‘next normal’ awaits. As we continue to come to terms with, and find ways to reorient the disruption of life, being at home has acquired many new meanings. What has it meant to be at home, and what is home? What is and has been the role of the internet and digital media technologies in navigating the contours of a changing ‘normal’? How have/can digital technologies help overcome, or exacerbate existing social, economic and political challenges during the pandemic? What forms of digital infrastructure—tools, platforms, devices and services—help build, sustain and alter the notion of home?&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;For IRC22, we invite you to pause and reflect on the relational and material linkages between being at home and being connected. We invite sessions across a range of formats and themes to explore and challenge conceptions of the home. Different people imagine and experience the home in various ways—as a space of refuge and comfort, but also as one of violence, care, labour or movement-building. We invite contributions that speak to these provocations through one or more of the above thematic areas.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Read the complete call for sessions, including sub-themes, session formats and timeline &lt;a href="https://cis-india.org/raw/irc22-call-for-sessions-pdf" class="internal-link" title="IRC22 Call for Sessions pdf"&gt;here&lt;/a&gt;. &lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p dir="ltr"&gt;To propose a session, please send the following documents (as attached text files; the file name should include the session title and your name) to &lt;strong&gt;workshops@cis-india.org&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Session Title: The session should be named in the form of a hashtag (check the &lt;a class="external-link" href="https://cis-india.org/raw/irc19-list"&gt;sessions proposed for IRC19&lt;/a&gt; for example).&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Session Type: Please select the session type among the four types mentioned in the call for sessions.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Session Plan: This should describe the objectives of the session (the motivations and expectations driving it), what will be done and discussed during the session, and who among the people organising the session will be responsible for what. This note need not be more than 500 words long. If your session involves inviting others to present their work (say papers), then please provide a description and timeline of the process through which these people will be identified.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Session Team Details: Please share brief biographical notes of each lead of the session team, and their email addresses.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;The deadline for submission of session proposals is 9 March, 2022.&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/internet-researchers-conference-2022'&gt;https://cis-india.org/raw/internet-researchers-conference-2022&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2022-02-11T09:54:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers">
    <title>Data bleeding everywhere: a story of period trackers</title>
    <link>https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers</link>
    <description>
        &lt;b&gt;This is an excerpt from an essay by Sadaf Khan, written for and published as part of the Bodies of Evidence collection of Deep Dives. The Bodies of Evidence collection, edited by Bishakha Datta and Richa Kaul Padte, is a collaboration between Point of View and the Centre for Internet and Society, undertaken as part of the Big Data for Development Network supported by International Development Research Centre, Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Please read the full essay on Deep Dives: &lt;a href="https://deepdives.in/data-bleeding-everywhere-a-story-of-period-trackers-8766dc6a1e00" target="_blank"&gt;Data bleeding everywhere: a story of period trackers&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;Sadaf Khan: &lt;a href="http://mediamatters.pk/the-team/" target="_blank"&gt;Media Matters for Democracy&lt;/a&gt; and &lt;a href="https://twitter.com/nuqsh" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;...By now there are a number of questions buzzing around my head, most of them unasked. Are users comfortable with so much of their data being collected? Are there really algorithms that string together all this data into medically-relevant trends? How reliable can these trends be when usage is erratic? Are period tracking apps pioneering, fundamental elements of a future where medical aid is digital and reliable data is inevitably linked to the provision of medical services? And if so, are privacy and health soon to become conflicting rights?&lt;/p&gt;
&lt;p&gt;I also want to find out how users understand data collection and privacy before giving apps consent to utilize their data and information as they will. Hareem says she gives apps informed consent. ‘If my data becomes a part of the statistics aiding medical research, why not? There is no harm in it. I am getting a good service, and if my data helps create a better understanding as a part of a larger statistical pool, they are welcome to use it.’&lt;/p&gt;
&lt;p&gt;But is she really sure that this information will be used only as anonymised data for medical research? ‘Look at the kind of information that is being collected,’ she answers. ‘Dates, mood, consistency of mucus, basal temperature. What kind of use does one have for this data?’&lt;/p&gt;
&lt;p&gt;Naila, in turn, says: ‘Honestly, I have never really thought about what happens to the data the application collects. Obviously I enter detailed information about my cycle and my moods and my sex life. But a), my account is under a fake name and b), even if it wasn’t, who would have any use for stuff like when my period starts and ends and what my mood or digestive system is like at any given moment?’&lt;/p&gt;
&lt;p&gt;In fact, this sentiment is shared among all the women interviewed for this piece — what use would anyone have for this data?&lt;/p&gt;
&lt;p&gt;As users, we often imagine our own data as anonymised within a huge dataset. But as users, we don’t have enough information about how our data is being used — or will be used in future. The open and at times vague language of a platform’s terms and conditions allows menstrual apps to use data in ways that I may not know of. Some apps continue to hold customer data even after an account is deleted. Even though I may technically ‘agree’ to the terms and conditions, is this fully informed consent?&lt;/p&gt;
&lt;p&gt;One of the big concerns around this kind of medical information being collected is the potential for collaborations with big pharmaceuticals and other health service providers. With apps sitting on a goldmine of users’ fertility and health information, health service providers might mine their data for potential consumers and reach out directly to them. While this is like any targeted marketing campaign, the fact that the advertiser is likely to be offering medical services to women suffering from infertility and are at their most vulnerable, raises totally different ethical concerns.&lt;/p&gt;
&lt;p&gt;And these apps and their businesses might grow in directions that users haven’t taken into consideration. Take Ovia’s health feature for companies to buy premium services for their employees. While the gesture is packaged as a goodwill one, it also means that an employer has access to extremely private and intimate medical information about their women employees. And while the data set is anonymised, it is still possible to figure out the identity of users based on specific information. For example, how many women in any company are pregnant at any given time?...&lt;/p&gt;
&lt;p&gt;Pregnant a year after my miscarriage, I initially downloaded multiple apps in a bid to find a good fit. I don’t know which one of these was in communication with Facebook. But almost immediately, my Facebook timeline started becoming littered with ads for baby stuff — clothes, shoes bibs, prams, cribs, ointments for stretch marks, maternity wear, the works.&lt;/p&gt;
&lt;p&gt;It makes me think of those old school clockwork-style videos. You drop a ball and off it goes: making dominos fall, knocking over pots and pans, setting in motion absurd, synchronized mechanisms. Similarly, I drop my data and watch it hurtle into my life, on to other platforms, off to vendors. Maybe to stalkers? To employers? Who knows.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers'&gt;https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Bodies of Evidence</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-06T05:03:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice">
    <title>Unpacking video-based surveillance in New Delhi</title>
    <link>https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice</link>
    <description>
        &lt;b&gt;Aayush Rathi and Ambika Tandon presented at an international workshop on 'Urban Data, Inequality and Justice in the Global South', on 14 June 2019, at the University of Manchester. The agenda for the workshop and the slides from the presentation by Aayush and Ambika are available below.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Agenda of the workshop: &lt;a href="https://github.com/cis-india/website/raw/master/docs/UDJWorkshop2019_Timetable.docx"&gt;Download&lt;/a&gt; (DOCX)&lt;/h4&gt;
&lt;h4&gt;Slides from the presentation: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_AayushAmbika_UDJWorkshop2019_Slides.pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;The aim of the workshop was to present findings from case studies on urban data justice commissioned by the Sustainable Consumption Institute and Centre for Development Informatics at the University of Manchester, on aspects of justice in data systems in cities across the world. Aayush and Ambika presented their study on video-based surveillance in New Delhi, which was conducted across a period of 3 months earlier this year. The study aimed to assess the extent to which CCTV surveillance systems in Delhi support the needs of women in the city, including lower class women and those from informal settlements. The study will be published as a working paper by the University of Manchester in the coming months.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice'&gt;https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Justice</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Urban Data Justice</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2019-06-20T05:13:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/making-humanities-in-the-digital-embodiment-and-framing-in-bichitra-and-indiancine.ma">
    <title>Making Humanities in the Digital: Embodiment and Framing in Bichitra and Indiancine.ma</title>
    <link>https://cis-india.org/raw/making-humanities-in-the-digital-embodiment-and-framing-in-bichitra-and-indiancine.ma</link>
    <description>
        &lt;b&gt;The growth of the internet and digital technologies in the last couple of decades, and the emergence of new ‘digital objects’ of enquiry has led to a rethinking of research methods across disciplines as well as innovative modes of creative practice. This chapter authored by Puthiya Purayil Sneha (published in 'Making Things and Drawing Boundaries: Experiments in the Digital Humanities' edited by Jentery Sayers) discusses some of the questions that arise around the processes by which digital objects are ‘made’ and made available for arts and humanities research and practice, by drawing on recent work in text and film archival initiatives in India.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Through an exploration of an online film archive, Indiancine.ma, and a digital variorum of Rabindranath Tagore’s works, Bichitra, developed at Jadavpur University, Kolkata, the chapter engages with the processes of making and studying digital objects as creative and analytical, affective, and embodied. Drawing also on observations from a study on mapping digital humanities work in India, the chapter explores conceptual and material processes of the digital to understand how they affect research and practice in the humanities. These also allow for a new perspectives to understand the condition of digitality we inhabit today, as well as the possibilities it offers for the humanities.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;This chapter authored by Puthiya Purayil Sneha was published in &lt;a class="external-link" href="https://www.upress.umn.edu/book-division/books/making-things-and-drawing-boundaries"&gt;&lt;strong&gt;Making Things and Drawing Boundaries: Experiments in the Digital Humanities&lt;/strong&gt;&lt;/a&gt; (2017), edited by Jentery Sayers, University of Minnesota Press, Minneapolis, London.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/making-humanities-in-the-digital-embodiment-and-framing-in-bichitra-and-indiancine.ma'&gt;https://cis-india.org/raw/making-humanities-in-the-digital-embodiment-and-framing-in-bichitra-and-indiancine.ma&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-06-25T12:50:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook">
    <title>Government gives free publicity worth 40k to Twitter and Facebook </title>
    <link>https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook</link>
    <description>
        &lt;b&gt;We conducted a 2 week survey of newspapers for links between government advertisement to social media giants. As citizens, we should be worried about the close nexus between the Indian government and digital behemoths such as Facebook, Google and Twitter. It has become apparent to us after a 2 week print media analysis that our Government has been providing free publicity worth Rs 40,000 to these entities. There are multiple issues with this as this article attempts at pointing out.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/TotalAdvertisementExpenditure.jpg" alt="null" class="image-inline" title="Total Advertisement Expenditure" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We analyzed 5 English language newspapers daily for 2 weeks from March 12&lt;sup&gt;th&lt;/sup&gt; to 26&lt;sup&gt;th&lt;/sup&gt;, one week of the newspapers in Lucknow and the second week in Bangalore. Facebook, Twitter, Instagram and Alphabet backed services such as Youtube and Google Plus were part of our survey. Of a total of 33 advertisements (14 in Lucknow+19 in Bangalore), Twitter stands out as the most prominent advertising platform used by government agencies with 30 ads but Facebook at 29 was more expensive. In order to ascertain the rates of publicity, current advertisement rates for Times of India as our purpose was to solely give a rough estimation of how much the government is spending.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Advertising of this nature is not merely an inherent problem of favoring some social media companies over others but also symptomatic of a bigger problem, the lack of our native e-governance mechanisms which cause the Government to rely and promote others. Where we do have guidelines they are not being followed. By outsourcing their e-governance platforms to Twitter such as TwitterSeva, a feature created by the Twitter India team to help citizens connect better with government services, there is less of an impetus to construct better &lt;a class="external-link" href="https://factordaily.com/twitter-helping-india-reboot-public-services-publicly/"&gt;websites of their own&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If this is so because we currently do not have the capacity to build them ourselves then it is imperative that this changes. We should either be executing government functions on digital infrastructure owned by them or on open and interoperable systems. If anything, the surveyed social media platforms can be used to enhance pre-existing facilities. However, currently the converse is true with these platforms overshadowing the presence of e-governance websites. Officials have started responding to complaints on Twitter, diluting the significance of such complaint mechanisms on their respective department’s portal. Often enough such features are not available on the relevant government website. This sets a dangerous precedent for a citizen management system as the records of such interactions are then in the hands of these companies who may not exist in the future. As a result, they can control the access to such records or worse tamper with them. Posterity and reliability of such data can be ensured only if they are stored within the Government’s reach or if they are open and public with a first copy stored on Government records which ensures transparency as well. Data portability is an important facet to this issue as well as being a right consumers should possess. It provides for support of many devices, transition to alternative technologies and lastly, makes sure that all the data like other public records will be available upon request through the Right to Information procedure. The last is vital to uphold the spirit of transparency envisioned through the RTI process since interactions of government with citizens are then under its ambit and available for disclosure for whomsoever concerned.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Secondly, such practices by the Government are enhancing the monopoly of the companies in the market effectively discouraging competition and eventually, innovation. While a certain elite strata of the population might opt for Twitter or Facebook as their mode of conveying grievance, this may not hold true for the rest of the online India population.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Picking players in a free market is in violation of technology and vendor neutrality, a practice essential in e-governance to provide a level playing field for all and competing technologies. Projecting only a few platforms as de facto mediums of communication with the government inhibits the freedom of choice of citizens to air their grievances through a vendor or technology they are comfortable with. At the same time it makes the Government a mouthpiece for such companies who are gaining free publicity and consolidating their popularity. Government apps such as the SwachBharat one which is an e-governance platform do not offer much more in terms of functionality but either reflect the website or are a less mature version of the same. This leads to the problem of fracturing with many avenues of complaining such as the website, app, Twitter etc. Consequently, the priority of the people dealing with the complaints in terms of platform of response is unsure. Will I be responded to sooner if I tweet a complaint as opposed to putting it up on the app? Having an interoperable system can solve this where the Government can have a dashboard of their various complaints and responses are then made out evenly. Twitter itself could implement this by having complaints from Facebook for example and then the Twitter Seva would be an equal platform as opposed to the current issue where only they are favored.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Recent events have illustrated how detrimental the storage of data by these giants can be in terms of privacy. Data security concerns are also a consequence of such leaks. Not only is this a long overdue call for a better data protection law but at the same time also for the Government to realize that these platforms cannot be trusted. The hiring of Cambridge Analytica to influence voters in the US elections, based on their Facebook profiles and ancillary data, effectively put the governance of the country on sale by exploiting these privacy and security issues. By basing e-governance on their backbone, India is not far from inviting trouble as well. It is unnecessary and dangerous to have a go-between for matters that pertain between an individual and state.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As this article was being written, it was confirmed by the Election Commission that they are partnering with Facebook for the Karnataka Assemby Elections to promote activities such as encourage enrollment of Voter ID and voter participation. Initiatives like these tying the government even closer to these companies are of concern and cementing the latter’s stronghold.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Note: Our survey data and results are attached to this post. All research was collected by Shradha Nigam, a Vth year student at NLSIU, Bangalore.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify;"&gt;Survey Data and Results&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This report is based on a survey of government advertisements in English language newspapers in relation to their use of social media platforms and dedicated websites (“&lt;strong&gt;Survey&lt;/strong&gt;”). For the purpose of this report, the ambit of the social media platforms has been limited to the use of Facebook, Twitter, YouTube, Google Plus and Instagram. The report was prepared by Shradha Nigam, a student from National Law School of India University, Bangalore. &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cis-report-on-social-media"&gt;Read the full report here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook'&gt;https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Akriti Bopanna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Instagram</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Twitter</dc:subject>
    
    
        <dc:subject>YouTube</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Google Plus</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2018-04-27T09:52:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services">
    <title>Response to TRAI Consultation Paper on Regulatory Framework for Over-the-Top (OTT) Services</title>
    <link>https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) sent a joint response to the TRAI Consultation Paper on Regulatory Framework for Over-the-top (OTT) Services with scholars from Indian Institute of Management, Ahmedabad. The response was sent on March 27, 2015.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Executive Summary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The principle objective of net neutrality is that “all the Internet traffic has to be treated equally without any discrimination”; but this has had different interpretations over varied contexts. While the discourse in India has often treated net neutrality as a singular policy construct, we break down net neutrality to its various components. We then individually contextualise each component to the unique characteristics of the Indian telecommunications industry such as dependence on wireless internet access, the fragmented and non-contiguous distribution of spectrum, high competition between TEL-SPs and low digital literacy. The evolving nature of markets and networks are also considered while taking into account various public policy perspectives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this submission, we also argue for the need to introduce reasonable regulatory parity between functionally equivalent communications services provided by OTT-SPs and TEL-SPs. We compare the regulations for OTT-SPs under the Information Technology Act 2000 (as amended) with the regulations for TEL-SPs under the Telegraph Act 1885 (as amended), the license agreements (UL, UASL, ISP-L) and TRAI Regulations. Based on an analysis of the current laws and regulations, we suggest how TRAI needs to intervene to create this regulatory parity (for example in areas such as privacy, spam/UCC, interception etc.).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the above analysis, we recommend an overall regulatory framework that should be adopted by the Government. The framework takes a nuanced approach to various components of net neutrality, contextualised to India, and also attempts to bring reasonable regulatory parity. Instead of compartmentalising TEL-SPs and OTT-SPs as two distinct actors, the recommended framework considers a two-layered approach which recognises that there is an overlap between TEL-SPs and OTT-SPs. The first layer comprises of network and infrastructure (collectively called the network layer) and the second layer comprises of services and applications (collectively called the service layer).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The framework further divides the service layer into “Non-IP Services”, “Specialised Services” and “Internet Based Services”. The concept of “Specialised Services”, which is borrowed from the European Union, refers to traditional services that have migrated to an IP architecture such as facilities-based VoIP calls to PSTN and IPTV, and are either logically distinct from the Internet or have special needs which the “best efforts” delivery of the general Internet cannot satisfy. This concept helps in applying different evaluation criteria to functionally equivalent “Non-IP Services”, “Specialised Services” and “Internet Based Services”. In the framework, “Specialised Services” are also recognised as an exception to net neutrality. The concept of “Specialised Services” also helps to create an incentive for continued investment in underlying infrastructure by TEL-SPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This framework has helped us to bring a more balanced approach from the perspective of both TEL-SPs and OTT-SPs, while also taking into account technological convergence. It has also helped us to bring a more nuanced approach to various issues comprising net neutrality such as zero rating, paid prioritisation etc. We have considered best practices from different international regimes and the pros and cons during implementation in order to determine the exceptions and boundaries of net neutrality that should be adopted in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/trai-response-paper.pdf" class="internal-link"&gt;Download the full text of the Response&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services'&gt;https://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2015-05-09T11:27:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india">
    <title>DesiSec: Cybersecurity and Civil Society in India</title>
    <link>https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india</link>
    <description>
        &lt;b&gt;As part of its project on mapping cyber security actors in South Asia and South East Asia, the Centre for Internet &amp; Society conducted a series of interviews with cyber security actors. The interviews were compiled and edited into one documentary. The film produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Originally the idea was to do 24 interviews with an array of international experts: Technical, political, policy, legal, and activist. The project was initiated at the University of Toronto and over time a possibility emerged. Why not shape these interviews into a documentary about cybersecurity and civil society? And why not focus on the world’s largest democracy, India? Whether in India or the rest of the world there are several issues that are fundamental to life online: Privacy, surveillance, anonymity and, free speech. DesiSec includes all of these, and it examines the legal frameworks that shape how India deals with these  challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the time it was shot till the final edit there has only been one change in the juridical topography: the dreaded 66A of the IT Act has been struck down. Otherwise, all else is in tact. DesiSec was produced by Purba Sarkar, shot and edited by Aaron Joseph, and directed by Oxblood Ruffin. It took our team from Bangalore to Delhi and, Dharamsala. We had the honour of interviewing: Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad. Everyone brought something special to the discussion and we are grateful for their insights. Also, we are particularly pleased to include the music of Charanjit Singh for the intro/outro of DesiSec. Mr. Singh is the inventor of acid house music, predating the Wikipedia entry for that category by five years. Someone should correct that.&lt;/p&gt;
&lt;p&gt;DesiSec is released under the Creative Commons License Attribution 3.0 Unported (CC by 3.0). You can watch it on Vimeo: &lt;a href="https://vimeo.com/123722680" target="_blank"&gt;https://vimeo.com/123722680&lt;/a&gt; or download it legally and free of charge via torrent. Feel free to show, remix, and share with your friends. And let us know what you think!&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/8N3JUqRRvys" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india'&gt;https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Laird Brown</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-06-29T16:25:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
