<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1321 to 1335.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/elite-capture-of-governance-in-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/what-are-peoples-rights-in-digital-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/governance-now-pratap-vikram-singh-and-taru-bhatia-january-6-2015-will-india-win-net-neutrality-battle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/human-rights-in-the-age-of-digital-technology-a-conference-to-discuss-the-evolution-of-privacy-and-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/catchnews-january-6-2016-vidushi-marda-facebook-free-basics-gatekeeping-powers-extend-to-manipulating-public-discourse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/indian-express-december-31-2015-facebook-free-basics-vs-net-neutrality-the-top-arguments-in-the-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook2019s-free-basics-shuts-down-in-egypt-continuing-troubled-run"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deccan-herald-january-3-2016-sunil-abraham-free-basics-negating-net-parity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2015-bulletin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review">
    <title>The Creation of a Network for the Global South - A Literature Review</title>
    <link>https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;I. &lt;/b&gt; &lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The organization of societies and states is predicated on the development of Information Technology and has begun to enable the construction of specialized 	networks. These networks aid in the mobilization of resources on a global platform.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; There is a need for 	governance structures that embody this globalized thinking and adopt superior information technology devices to bridge gaps in the operation and 	participation of not only political functions but also economic processes and operations.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Currently, 	public institutions fall short of an optimum level of functioning simply because they lack the information, know-how and resources to respond effectively 	to this newly globalized and economically liberalized world order. Civil society is beginning to seek a greater participatory voice in both policy making 	and ideating, which require public institutions to institute a method of allowing this participation while at the same time retaining the crux of their 	functions and processes. The network society thus requires, As argued by Castells, a new methodology of social structuring, one amalgamating the analysis 	of social structure and social action within the same overarching framework.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; This Network propounds itself 	as a 'dynamic, self-evolving structure, which, powered by information technology and communicating with the same digital language, can grow, and include 	all social expressions, compatible with each network's goals. Networks increase their value exponentially through their contribution to human resources, 	markets, raw materials and other such components of production and distribution.' &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted by Kevin Kelly,' 	&lt;i&gt; The Atom is the past. The symbol of science for the next century is the dynamical Net.…Whereas the Atom represents clean simplicity, the Net 		channels the messy power of complexity. The only organization capable of nonprejudiced growth or unguided learning is a network. All other topologies 		limit what can happen. A network swarm is all edges and therefore open ended any way you come at it. Indeed the network is the least structured 		organization that can be said to have any structure at all. ..In fact a plurality of truly divergent components can only remain coherent in a network. 		No other arrangement - chain, pyramid, tree, circle, hub - can contain true diversity working as a whole &lt;/i&gt; .'&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A network therefore is integral to the facilitation, coordination and advocacy of different agenda within a singular framework, which seeks to formulate 	suitable responses to a wide range of problems across regions. An ideal model of a network would therefore be one that is reflective of the 	interconnectivity between relationships, strengthened by effective communication and based on a strong foundation of trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most powerful element of a network is however the idea of a common purpose. The pursuit is towards similar ends and therefore the interconnected web of 	support it offers is in realization of a singular goal,&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;II. Evolution of the Network&lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are certain norms that must be incorporated for a network to be able to work at its best. Robert Chambers, in his book,	&lt;i&gt;Whose Reality Counts? &lt;/i&gt; Identifies these norms and postulates their extension to every form of a network, in order to capture its creative spirit 	and aid in the realization of its goals.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; A network should therefore ideally foster four fundamental 	elements in order to inculcate an environment of trust, encouragement and the overall actualization of its purpose. These elements are; Diversity or the 	encouragement of a multitude of narratives from diverse sources, Dynamism or the ability of participants to retain their individual identities while 	maintaining a facilitative structure, Democracy or an equitable system of decision making to enable an efficient working of the net and finally, 	Decentralization or the feasibility of enjoying local specifics on a global platform.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to attain these ideal elements it is integral to strengthen certain aspects of the practice through performing specific and focused functions, 	these include making sure of a clear broad consensus, which ensures the co-joining of a common purpose. Additionally, centralization, in the form of an 	overarching set of rules must be kept to a minimum, in order to facilitate a greater level of flexibility while still providing the necessary support 	structure. The building of trust and solid relationships between participants is prioritized to enhance creative ideation in a supportive environment. 	Joint activities, more than being output oriented are seen as the knots that tie together the entire web of support. Input and participation are the 	foremost objectives of the network, in keeping with the understanding that "contribution brings gain". &lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Significant management issues that plague networks include the practical aspects of bringing the network into function through efficient leadership and the 	consolidation of a common vision. A balanced approach would entail a common consultation on the goals of the network, the sources of funding and an agreed 	upon structure within which the network would operate. It is also important to create alliances outside of the sector of familiarity and ensure an inclusive environment for members across regions, allowing them to retain their localized individuality while affording them with a global platform.	&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;III. Structure&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The structural informality of a network is essential to its sustenance. Networks must therefore ensure that they embody a non-hierarchized structure, 	devoid of bureaucratic interferences and insulated from a centralized system of control and supervision. This requires an internal system of checks and 	balances, consisting of periodic reviews and assessments. Networks must therefore limit the powers of supervision of the secretariat. The secretariat must 	allow for the coordination of its activities and allocate appropriate areas of engagement according to the relative strength of the participating members.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One form of a network structure, postulated within a particular research study is the threads, knots and Nets model.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; It consists of members within a network bound together by threads of relationship, communication and 	trust. These threads represent the commonality that binds together the participants of the particular network. The threads are established through common 	ideas and a voluntary participation in the process of communication and conflict resolution. &lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The knots represent the combined activities which the participants engage in, with the common goal of realizing a singular purpose. These knots signify an 	optimum level of activity, wherein members of the network are able to support, inspire and confer tangible benefits onto each other. The net represents the entire structure of the network, which is constructed through a confluence of relationships and common activities.	&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; The structure is autonomous in nature and allows participants to contribute without losing their 	individual identities. It is also dynamic and flexible; incorporating new elements with relative ease. It is therefore a collaboration which affords onto 	its members the opportunity to expand without losing its purpose. The maintenance of such a structure requires constant review and repair, with adequate 	awareness of weak links or "threads" and the capability and willingness to knot them together with new participants, thereby extending the net.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, the Global Alliance for Vaccines and Immunization used a system of organizational "milestones" to monitor the progress of the network and keep 	the network concentrated. It requires a sustained institutional effort to fulfill its mandate of "the right of every child to be protected against vaccine-preventable diseases" and brings together international organizations, civil society and private industry.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; As postulated within the &lt;i&gt;Critical Choices &lt;/i&gt;research study of the United Nations, clearly defined milestones are integral to sustaining an effective support mechanism for donors and ensuring that all relevant participants are on board.	&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; This also allows for donors to be made aware of the tangible outcomes that have been achieved by the 	network. Interim goals that are achievable within a short span of time also afford a sense of legitimacy onto the network, allowing it to deliver on its 	mandate early on. Setting milestones would require an in depth focus and a nuanced understanding of specific aspects of larger problems and delivering 	early results on these problems would allow for a foundational base of trust, on the foundation of which, a possibly long drawn out consultative process 	can be fixed.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Network might often find alliances outside of its sector of operation. For example, Greenpeace was able to make its voice heard in International Climate 	Change negotiations by engaging with private insurance companies and enlisting their support.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; The organization looked towards the private sector for support to mobilize resources and enlist the requisite expertise within their various projects.	&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Funding&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The financial support a network receives is essential for its sustenance. The initial seed money it receives can be obtained from a single source however, 	cross sectoral financing is necessary to build a consensus with regards to issues that may be a part of the network's mandate. The World Commission for 	Dams (WCD), for example, obtains funding from multiple sources in order to retain its credibility. The sources of funding of the WCD include government 	agencies, multilateral organizations, business associations, NGO's and Government Agencies, without a single donor contributing more than 10% of the total 	funding it receives.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; However, the difficulty with this model of funding is the relative complexity in 	assimilating a number of smaller contributions, which may take away from its capacity to expand its reach and enhance the scope of its work. Cross sectoral 	funding is less of a fundamental requirement for networks whose primary mandate is implementation, such as The Global Environment Facility (GEF), whose 	legitimacy is derived from intergovernmental treaties and is therefore only funded by governments.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; The 	GEF has only recently broadened its sources of funding to include external contributions from the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A network can also be funded through the objective it seeks to achieve through the course of its activities. For example, Rugmark an international 	initiative which seeks to mitigate the use of child labor in South Asia uses an external on site monitoring system to verify and provide labels certifying 	the production of carpets without the use of child labor.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; The monitors of this system are trained by 	Rugmark and carpet producers have to sign a binding agreement, undertaking not to employ children below the age of 14 in order to receive the 	certification. The funds generated from these carpets, for the import of which American and European importers pay 1% of the import value, are used to provide rehabilitation and education facilities for the children in affected areas. The use of these funds is reported regularly.	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The funding must be sustained for a few years, which is a difficult task for networks that require an overall consensus of participants. The greatest 	outcomes of the network are not tangible solutions to the problem but the facilitation of an environment which allows stakeholders to derive a tangible 	solution. Thus, the elements of trust, communication and collaboration are integral to the efficient functioning of the network. However, the lack of 	tangible outcomes exposes the funders to financial risks. The best way to reduce such risks is to institute an uncompromising time limit for the 	initiative, within which it must achieve tangible results or solutions that can be implemented. A less stringent approach would be to incorporate a system 	of periodic review and assessment of the accomplishments of the network, subsequent to which further recommendations may be made for a further course of 	action.&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;B. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Relationships&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A three year study conducted by Newell &amp;amp; Swan drew definitive conclusions with respect to the inter-organizational collaboration between participants 	within a network. The study determined that there currently exist three types of trust; Companion trust or the trust that exists within the goodwill and 	friendship between participants, Competence trust, wherein the competence of other participants to carry out the tasks assigned to them is agreed upon and lastly, Commitment trust or the trust which is predicated on contractual or inter-institutional that are agreed upon.	&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; While companion and competence trust are easily identifiable, commitment trust is more subjective as 	it is determined by the agreement surrounding the core values and overall identifiable aims. Sheppard &amp;amp; Tuchinsky refer to an identification based trust which is based on a collective understanding of shared values. Such a trust requires significant investment but they argue, "&lt;i&gt;The rewards are commensurably greater and the he benefits go beyond quantity, efficiency and flexibility&lt;/i&gt;."	&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt; Powell postulates, 	&lt;i&gt; "Trust and other forms of social capital are moral resources that operate in fundamentally different manner than physical capital. The supply of trust increases, rather than decreases, with use: indeed, trust can be depleted if not used."		&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;b&gt;[25]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Karl Wieck endorses the "&lt;i&gt;maintenance of tight control values and beliefs which allow for local adaptation within centralized systems&lt;/i&gt;."	&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; The autonomy that participants within a network enjoy is therefore considered to be close to sacred, 	so as to allow them to engage with each other on an equitable footing, while still maintain their individual identities. Freedman and Reynders believe that 	networks place a so called 'premium' on " 	&lt;i&gt; the autonomy of those linked through the network…..networks provide a structure through which different groups - each with their own 		organizational styles, substantive priorities, and political strategies - can join together for common purposes that fill needs felt by each. &lt;/i&gt; "&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt; Consequently, lower the level of centralized control within a network, the greater the requirement of 	trust. Allen Nan resonates with this idea, as is evident from her review of coordinating conflict resolution NGO's. She believes that these NGO's are most 	effective when " 	&lt;i&gt; beginning with a loose voluntary association which grows through relationship building, gradually building more structure and authority as it develops. 		No NGO wants to give away its authority until it trusts a networking body of people that it knows. &lt;/i&gt; " &lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;C. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Communication and Collaboration&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The binding force that ties together any network is the importance of relationships between participants and their interactions with organizations outside 	the network. Research has shown that face to face interaction works best and although email may be practical, a face-to-face meeting at regular intervals 	builds a level of trust amongst participants. &lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt; It is however important to prevent network from turning 	into 'self-selecting oligarchies' and to prevent this, there needs to be a balance drawn between goodwill and the trust in others' competence along with a 	common understanding of differently hierarchized values. &lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also an impending need to develop a relationship vocabulary, as suggested by Taylor, which would be of particular use within transnational 	networks and afford a deeper understanding of cross cultural relationships.&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;D. &lt;/b&gt; &lt;b&gt;&lt;i&gt;Participation&lt;/i&gt;&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A significant issue that networks today have to address is how to inculcate and then subsequently maintain participation in the activities of the network. 	This would include providing incentives to participants, encouraging diversity and enabling greater creative inflow across sectors to generate innovative 	output. Participation involves three fundamental elements; Action, which includes active contribution in the form of talking, listening, commenting, 	responding and sharing information, Process, which aids in an equitable system of decision making and constructing relationships and the underpinned values associated with these two elements, which include spreading equality, inculcating openness and including previously excluded communities or individuals.	&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; Participation in itself envisages a three leveled definition; participation as a contribution, where 	people offer a tangible input, participation as an organization process, where people organize themselves to influence certain pre-existing processes and 	participation as a form of empowerment where people seek to gain power and authority from participating.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to create an autonomous system of evaluating and monitoring the nature and context of participation, a network would have to attempt to 	systematically incorporate a few fundamental processes, such as; enabling an understanding of the dynamism of a network through an established criteria of 	monitoring the levels of participation of the members, creating an explicit checklist of qualifications of this participation, such as the contributions of 	the participants, the limits of commitment and the available resources that must be shared and distributed, acknowledging the importance of relationships 	as fundamental to the success of any network., building a capacity for facilitative and shared leadership, tracing the changes that occur when the advocacy 	and lobbying activities of individuals are linked and using these individuals as participants who have the power to influence policy and development at 	various levels.&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; Finally, the recognition that utilizing the combined faculties of the network would aid 	in the effectuation of further change is vital to sustaining an active participation in the network.&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt; It 	is common for networks to stagnate simply because of the lack of clarity on what a network really is or what it entails. There are significant 	misconceptions as to the activities engaged in by the network, such as the idea that a network "works solely as a resource center, to provide information, 	material and papers, rather than as forums for two way exchanges of information and experiences," contribute to the misunderstanding regarding the 	participation requirements within a network.&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt; To facilitate an active, participatory function of 	learning, a network needs to be more than a resource center that seeks to meet the needs of beneficiaries. While meeting these needs is essential, development projects tend to obfuscate the benefit/input relationship within a network, thus significantly depleting its dynamism quotient.	&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One method of moving away from the needs based model is to create a tripartite functionary, as was created within a particular research study.	&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt; This involves A Contributions Assessment, A Weaver's Triangle for Networks and An identification of 	channels of participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Contributions Assessment is an analysis of what the participants within a network are willing to contribute. It enables the network to assess what resources it has access to and how those resources may be distributes amongst the participants, multiplied or exchanged.	&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt; This system is predicated on a premise of assessing what participants have to offer as opposed to what 	they need. It challenges the long held notion of requiring an evaluation to identify problems, to address which recommendations are made and in fact seeks to focus on the moments of excellence and enable a discussion on the factors that contributed to these moments.	&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt; It thus places a value on the best of "what is" as opposed to trying to find a plausible "what ought 	to be". This approach allows participants to recognize that they are in fact the real "resource Centre" of the network and are encouraged act accordingly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Contributions Assessment may be practically incorporated through a few steps. It must be focused on the contributions, after a discussion on who the 	contributors may be. The aims of the network must be clarified, along with a specification of the contributions required such as perhaps newsletters, a 	conference, policy analysis etc. The members of the network must be clear on what they would like to contribute to the network and how such contribution 	might be delivered. Finally, the secretariat must be able to ideate or innovate on how it can enable more contributions from the networks in a more 	effective manner. &lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Weaver's Triangle has been adapted to be applies within networks and enables participants to understand what the aims and activities of the network 	are. It identifies the overall aim of the network and the change the network seeks to bring about to the status quo. It then lays out the objectives of the 	network in the form of specific statements about the said differences that the network seeks to bring about. Finally, the network would have to explain why 	a particular activity has been chosen. &lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; The base of the triangle reflects the specific activities that 	the network seeks to engage in to achieve the said objectives. The triangle is further divided into two, to ensure that action aims and process aims have equal weightage; this allows for the facilitation of an exchange and a connection between the members of the network.	&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Circles of Participation is an idea that has been put forth by the Latin American and Caribbean Women's Health Network. (LACWHN).	&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; This Network has three differentiated categories of membership, which it uses to determine the degree 	of commitment of an organization to the network. R- refers to the members who receive the women's health journal, P refers to members who actively 	participate in events and campaigns and who are advisors for specific topics. PP refers to the permanent participants within the network at national and 	international levels. They also receive a journal. This categorization allows the network to make an assessment of the dynamism and growth of a network, 	with members moving through the categories depending on their levels of participation. &lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An important space for contributions to the network is the newsletter. This can be facilitated by allowing contributions from various sources, provided 	they meet the established quality checks, ensuring a balance between regions of origin of the members of the network, ensuring a balance between the policy 	and program activities of the members and keeping the centralized editorial process to a minimum. This is in keeping with the ideal of a decentralized 	system of expression that allows each member to retain its individuality while still contributing to the aims of the network. The Women's Global Network on 	Reproductive Rights (WGNRR) sought to create a similar system of publication to measure the success of their linkages, the levels of empowerment amongst members, in terms of strategizing and enabling localized action and the allocation of space in a fair and equitable manner.	&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt; Another Network, Creative Exchange customizes its information flow within the network so that each 	member only receives the information it expresses interest in.&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt; This prevents the overburdening of 	members with unnecessary information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The activities of the network which don't directly pass through the secretariat or the coordinator of the network can be monitored efficiently by keeping I 	close contact with new entrants to the network and capturing the essence of the activities that occur on the fringes of the network. This would allow an 	assessment of the diversity of the network. For example, Creative exchange sends out short follow up emails to determine the number and nature of contacts 	that have been made subsequent to a particular item in the newsletter. The UK Conflict Development and Peace Network (CODEP) records the newest subscribers 	to the network after every issue of their newsletter and AB Colombia sends out weekly news summaries electronically which are available for free to recipients who provide details of their professional engagements and why or how they wish to use these summaries.	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt; This enables the mapping of the type of recipients the information reaches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;E. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Leadership and Coordination&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sarason and Lorentz postulate four distinguishing characteristics that capture the creativity and expertise required by individuals leading and 	coordinating networks.&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt; Knowledge of the territory or a broad understanding of the type of members, the 	resources available and the needs of the members is extremely important to facilitate an ideal environment of mutual trust and open dialogue between the 	members. Scanning the network for fluidity and assessing openings, making connections and innovating solutions would enable an efficient leadership that 	would contribute to the overall dynamism of the network. In addition to this, perceiving strengths and building on assets of existing resources would allow 	the network to capitalize on its strengths. Finally, the coordinators of a network must be a resource to all members of the network and thus enable them to 	create better and more efficient systems. They must therefore exercise their personal influence over members wherever required for the overall benefit of 	the network. Practically, a beneficial leadership would also require an inventive approach by providing fresh and interesting solutions to immediate 	problems. A sense of clarity, transparency and accountability would also encourage members of the network to participate more and engage with each other. 	It is important for the leadership within a network to deliver on expectations, while building consensus amongst its members.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A shared objective, a collaborative setting and a constant review of strategies is important to maintain linkages within a network. Responsible 	relationships underpinned by values and supported by flows of relevant information would allow an effective and fruitful analysis by those who are engaged 	within a network to do the relevant work. In addition to this, a respect for the autonomy of the network is essential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;F. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Inclusion&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Public policy networks are more often than not saturated with the economic and social elite from across the developed world. A network across the Global 	South would have to change this norm and extend its ambit of membership to grass root organizations, which might not have otherwise had the resources or 	the opportunity to be a part of a network.&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt; Networks can achieve their long term goals only if they are 	driven by the willingness to include organizations from across economic demographics. This would ensure that their output is the result of a collaborative 	process that takes into account cross cultural norms and differentials across economic demographics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participation of diverse actors is reflective of the policy making processing having given due regard to on the ground realities and being sensitive 	towards the concerns of differently placed interest groups. Networks have been accused of catering only to the needs of industrial countries and 	subscribing to values of the global north thus stunting local development and enforcing double standards. This tarnishes the legitimacy of the processes 	inculcated within the network itself. It is therefore all the more essential that a network focused on the global south have a diverse collection of 	members from across backgrounds and economic contexts. Additionally, the accountability of the network to civil society is dependent on the nature of the 	links it maintains with the public. Inclusion thus fosters a sense of legitimacy and accountability. The inclusion of local institutions from the beginning 	would also increase the chances of the solutions provided by the network, being effectively implemented. Local inclusion affords a sense of responsibility 	and ensures that the network would remain sustainable in the long run. Allowing local stakeholders to take ownership of the network and participate in the formulation of policies, engage in planning and facilitate participation would enable an efficient addressing of significant public policy issues.	&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt; Thus networks would need to create avenues for participation of local institutions and civil society 	to engage in a democratic form of decision making.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;III. Evaluation&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The process of evaluation of a network is most efficiently effectuated through a checklist that has been formulated within a research study for the purpose 	of evaluating its own network. &lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This checklist enumerates the various elements that have to be taken into consideration while evaluating the success of a network, as follows;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FIG 1.&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;table class="vertical listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;b&gt;What is a network?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;'Networks are energising and depend crucially on the motivation of members'&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Networks for Development, 2000:35)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This definition is one that is broadly shared across the literature, although it is more detailed than some.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A network has:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A common purpose  derived from shared perceived need for action&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clear objectives  and focus&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A non-hierarchical  structure&lt;/li&gt;
&lt;/ul&gt;
A network encourages  
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Voluntary participation  and commitment&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The input  of resources by members for benefit of all&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;A network provides&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Benefit  derived from participation and linking&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;b&gt;What does a network do?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Facilitate shared space for exchange, learning, development - the capacity-building aspect&lt;/li&gt;
&lt;li&gt;Act for change in areas where none of members is working in systematic way - the advocacy, lobbying and campaigning aspect&lt;/li&gt;
&lt;li&gt;Include a range of stakeholders - the diversity/ broad-reach aspect&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;b&gt;What are the guiding principles and values?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Collaborative action&lt;/li&gt;
&lt;li&gt;Respect for diversity&lt;/li&gt;
&lt;li&gt;Enabling marginalised voices to be heard&lt;/li&gt;
&lt;li&gt;Acknowledgement of power differences, and commitment to equality&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;4. &lt;b&gt;How do we do what we do, in accordance with our principles and values?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building Participation&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Knowing the membership, what each can put in, and what each seeks to gain&lt;/li&gt;
&lt;li&gt;Valuing what people can put in&lt;/li&gt;
&lt;li&gt;Making it possible for them to do so&lt;/li&gt;
&lt;li&gt;Seeking commitment to a minimum contribution&lt;/li&gt;
&lt;li&gt;Ensuring membership is appropriate to the purpose and tasks&lt;/li&gt;
&lt;li&gt;Encouraging members to be realistic about what they can give&lt;/li&gt;
&lt;li&gt;Ensuring access to decision-making and opportunities to reflect on achievements&lt;/li&gt;
&lt;li&gt;Keeping internal structural and governance requirements to a necessary minimum.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building Relationships and Trust&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Spending time on members getting to know each other, especially face-to-face&lt;/li&gt;
&lt;li&gt;Coordination point/secretariat has relationship-building as vital part of work&lt;/li&gt;
&lt;li&gt;Members/secretariat build relations with others outside network - strategic individuals and institutions&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facilitative Leadership (may be one person, or rotating, or a team)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Emphasis on quality of input rather than control&lt;/li&gt;
&lt;li&gt;Knowledgeable about issues, context and opportunities,&lt;/li&gt;
&lt;li&gt;Enabling members to contribute and participate&lt;/li&gt;
&lt;li&gt;Defining a vision and articulating aims&lt;/li&gt;
&lt;li&gt;Balancing the creation of forward momentum and action, with generating consensus&lt;/li&gt;
&lt;li&gt;Understanding the dynamics of conflict and how to transform relations&lt;/li&gt;
&lt;li&gt;Promoting regular monitoring and participatory evaluation&lt;/li&gt;
&lt;li&gt;Have the minimum structure and rules necessary to do the  work. Ensure governance is light, not strangling.Give members space to  be dynamic&lt;/li&gt;
&lt;li&gt;Encourage all those who can make a contribution to the overall goal to do so, even if it is small.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Working toward decentralised and democratic governance&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;At the centre, make only the decisions that are vital to continued functioning. Push decision-making outwards.&lt;/li&gt;
&lt;li&gt;Ensure that those with least resources and power have the opportunity to participate in a meaningful way.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building Capacity&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Encourage all to share the expertise they have to offer. Seek out additional expertise that is missing.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. &lt;b&gt;What are the evaluation questions that we can ask about these generic qualities? How do each contribute to the achievement of your aims and objectives?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participation&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are the differing levels or layers of participation across the network?&lt;/li&gt;
&lt;li&gt;Are people participating as much as they are able to and would like?&lt;/li&gt;
&lt;li&gt;Is the membership still appropriate to the work of the network? Purpose and membership may have evolved over time&lt;/li&gt;
&lt;li&gt;Are opportunities provided for participation in decision-making and reflection?&lt;/li&gt;
&lt;li&gt;What are the obstacles to participation that the network can do something about?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Trust&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What is the level of trust between members? Between members and secretariat?&lt;/li&gt;
&lt;li&gt;What is the level of trust between non-governing and governing members?&lt;/li&gt;
&lt;li&gt;How do members perceive levels of trust to have changed over time?&lt;/li&gt;
&lt;li&gt;How does this differ in relation to different issues?&lt;/li&gt;
&lt;li&gt;What mechanisms are in place to enable trust to flourish? How might these be strengthened?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Leadership&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Where is leadership located?&lt;/li&gt;
&lt;li&gt;Is there a good balance between consensus-building and action?&lt;/li&gt;
&lt;li&gt;Is there sufficient knowledge and analytical skill for the task?&lt;/li&gt;
&lt;li&gt;What kind of mechanism is in place to facilitate the resolution of conflicts?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Structure and control&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How is the structure felt and experienced? Too loose, too tight, facilitating, strangling?&lt;/li&gt;
&lt;li&gt;Is the structure appropriate for the work of the network?&lt;/li&gt;
&lt;li&gt;How much decision-making goes on?&lt;/li&gt;
&lt;li&gt;Where are most decisions taken? Locally, centrally, not taken?&lt;/li&gt;
&lt;li&gt;How easy is it for change in the structure to take place?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diversity and dynamism&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How easy is it for members to contribute their ideas and follow-through on them?&lt;/li&gt;
&lt;li&gt;If you map the scope of the network through the membership, how far does it reach? Is this as broad as&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;intended? Is it too broad for the work you are trying to do?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Democracy&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are the power relationships within the network? How do the powerful and less powerful interrelate? Who sets the objectives, has access to the resources, participates in the governance?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Factors to bear in mind when assessing sustainability&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Change in key actors, internally or externally; succession planning is vital for those in central roles&lt;/li&gt;
&lt;li&gt;Achievement of lobbying targets or significant change in context leading to natural decline in energy;&lt;/li&gt;
&lt;li&gt;Burn out and declining sense of added value of network over and above every-day work.&lt;/li&gt;
&lt;li&gt;Membership in networks tends to be fluid. A small core  group can be a worry if it does not change and renew itself over time,  but snapshots of 			moments in a network's life can be misleading. In a  flexible, responsive environment members will fade in and out depending  on the 'fit' with their 			own priorities. Such changes may indicate  dynamism rather than lack of focus.&lt;/li&gt;
&lt;li&gt;Decision-making and participation will be affected by  the priorities and decision-making processes of members' own  organisations.&lt;/li&gt;
&lt;li&gt;Over-reaching, or generating unrealistic expectations may drive people away&lt;/li&gt;
&lt;li&gt;Asking same core people to do more may diminish reach, reduce diversity and encourage burn-out&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;b&gt; &lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;V. Learning and Recommendations&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In order to facilitate the optimum working of a network several factors need to be taken into consideration and certain specific processes have to be 	incorporated into the regular functioning of the network. These are for example,&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Ensuring that the evaluation of the network occurs at periodic intervals with the requisite level of attention to detail and efficiency to enable an 	in depth recalibration of the functions and processes of the network. To this effect, evaluation specialists must be engaged not just at times of crises or 	instability but as accompaniments to the various processes undertaken by the network. This would enable a holistic development of the network.&lt;/li&gt;
&lt;li&gt;It is also important to understand the underlying values that define the unique nature of the network. The coordination of the network, its 	functions and its activities are intrinsically linked to these values and recognition of this element of the network would enable a greater functionality 	in the overall operation of the network.&lt;/li&gt;
&lt;li&gt;A strong relationship between the members of the network, predicated on trust and open dialogue is essential for its efficient functioning. This 	would allow the accumulation of innovative ideas and dynamic thought to direct the future activities of the network.&lt;/li&gt;
&lt;li&gt;The Secretariat or coordinator of the network must be able to engage the member in monitoring and evaluating the progress of the network. One method 	of enabling this coordination is through the institution of 'participant observer' methods at international conferences or meetings, which allow the 	members of the network to report back on the work that they have, which is linked to the work of other members.&lt;/li&gt;
&lt;li&gt;The autonomy of a network and its decentralized mechanism of functioning are integral to retain the individuality of its members, who seek to pursue 	institutional objectives. The members seek to facilitate creative thinking and share ideas and this must be supported by financial resources. A strong bond 	of trust between the members of a network is therefore essential to enable long term commitments and the flourishing of interpersonal communication between 	members.&lt;/li&gt;
&lt;li&gt;It is important that the subject area of operation of the network be comprehensively defined before the network comes into existence.&lt;/li&gt;
&lt;li&gt;As seen with the experience of Canadian Knowledge Networks, it is beneficial to be selective in inviting participant to the network and following a 	rigorous process of review and selection would ensure that only the best candidates are selected so as to facilitate effective partnerships with other 	networks, as a result of demonstrable expertise within a particular field.&lt;/li&gt;
&lt;li&gt;The management of a network must be disciplined, with clearly demarcated project deadlines and an optimum level of transparency and accountability. 	At the helm of leadership of every successful network, there has been intelligent, decisive and facilitative exchange, which is essential in securing a 	durable and potentially expandable space for the network to operate in.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Canadian Perspectives&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A study of Canadian experiences was conducted by examining The Centers of Excellence and the Networks of Centers of Excellence (NCEs), which were funded 	through three Federal Granting Councils.&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt; An initial observation that was made through the course of 	this study was that each network is intrinsically different and there is no uniform description which would fit all of them. The objectives of the Networks 	of Centers of Excellence Program are broadly, as follows; to encourage fundamental and applied research in fields which are critical to the economic 	development of Canada, to encourage the development and retention of world class scientists and engineers specializing in essential technologies, to manage 	multidisciplinary, cross sectoral national research programs which integrate stakeholder priorities through established partnerships and finally, to accelerate the exchange of research results within networks by accelerating technology transfers, made to users for social and economic development.	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt; Extensive interviews carried out in the course of the research conducted by the ARA Consulting Group 	Inc. drew up particularly relevant conclusions with respect to the NCEs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, they have been able to produce significant "cultural shifts" among the researchers associated with the network. This is attributed to the network 	facilitating a collaborative effort amongst researchers as opposed to their previous working, which was largely in isolation. The benefits of this 	collaboration have been identified as providing innovative ideas and leading the research itself in unprecedented directions. This has the effect of 	equipping Canada with the capability to compete on a global level with respect to its research endeavors. The culture shift has also allowed researchers to 	be more aware of the problems that plague industry and has instigated more in depth research into the development of the industrial sector. Government 	initiatives that have attempted to cohesively apply academic research to industry have had limited success. The NCE's however have managed to successfully 	disintegrate the barriers between these two seemingly disparate fields. This has resulted in a faster and more effective system of knowledge dissemination 	resulting in durable and self-sustaining economic development, which takes place at a faster rate. The NCE's have also been able to contribute to 	healthcare, wellness and overall sustainable development through their cross sectoral research approach, a model that can be used worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another tangible effect has been that the relationship between industry and academic research is evolving into a positive and collaborative exchange, as 	opposed to the previous state which was largely isolationist, bordering on confrontational.&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt; A possible 	cause of this is the increased representation of companies in the establishment of networks resulting in them influencing the course of research. This has not been met with any resistance from academic researchers who are driven by the imperative of an open publication.	&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt; Besides influencing the style of management, industrial representation has also brought about an 	increase in the level of private sector financial contributions made to NCEs. It is believed that these NCEs may even be able to support themselves in the 	next 7-8 years through the funding they receive from the commercialization of their research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A third benefit that has emerged is the faster rate of production of new knowledge and innovative thinking. This is the result of collaborative techniques 	which is made more efficient through the use of modern technology. The increasing number of multi authored cross institutional scholarly publications made 	available by the NCE is evidentiary of this trend. The rate and quantity of technology transfers has also increased exponentially as a result of this. 	Knowledge networks also facilitate the mobilization of human resources and address cross disciplinary problems, resulting in an efficient and synergistic 	solutions. Their low cost, fast pace approach has been instrumental in constructing an understanding of and capacity to engage in sustainable development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The significant contributions to sustainable development include the Canadian Genetic Diseases Network, which has discovered two specific genes that cause 	early onset Alzheimer's disease. The Sustainable Forest Management Network has claimed that its research does have a considerable level of influence on the 	industrial approach to sustainability. The Canadian Bacterial Disease Network conducts research on bacterially caused diseases which are mostly prevalent 	in developing countries, with a view to produce antibiotics and vaccines that may be able to successfully combat these vaccines. TeleLearning, another such network is working on the creation of software environments which will form the basis of technology based education in the future.	&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt; The greatest advantage of these knowledge networks is that they have been able to surpass traditional 	disciplinary barriers and have emerged at the forefront of interdisciplinary articulation, which is emerging as the path to breakthroughs in the fields of 	applied sciences and technology in the future. The NCE's have also been able to provide diverse working environments for graduate students, where they have 	been able to work under scientists associated with different specializations and across different departments. They have also been able to interact with 	government and industry representatives, giving them a far greater exposure of the field and equipping them to avail of a wide range of employment 	opportunities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The corporate style of management incorporated within the NCEs encourages a sense of discipline and an enthusiasm for innovation. The Board of Directors at 	NCE's take on a perfunctory role and function as a typical corporate board. Researchers are therefore required to provide regular reports and meet 	deadlines to achieve predetermined goals that have been agreed upon. The new paradigm of sustainable development and the fluid transfer of knowledge 	requires this structure of management, even within a previously strictly academically oriented environment. NCEs have been incorporated as non-profit 	corporation for largely legal reasons such as the ownership of intellectual property.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participation to these networks is restricted and is open only through an invitation, in the form of a submission of project proposals under a 	particular theme, with the final selection being made subject to a rigorous process of evaluation. This encourages the participants of the network to 	embody a degree of discipline and carry out their activities in a constructive, time bound manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;B. &lt;/b&gt; &lt;b&gt;&lt;i&gt;Perceived Challenges&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These knowledge networks, although extremely beneficial in the long run, do have certain specific issues that need to be addressed. Firstly, most formal 	knowledge networks do not have a formalized communication strategy. While they do make use of various forms of telecommunication, this communication is is 	no way formally directed or specific. Although some networks have managed to set up a directed communications strategy, supplemented by the involvement of 	specifically communications based networks (such as CANARIE) , there is still a long way to go in this area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As is evident with most academic endeavors in recent years, efficient and sustained development both in terms of economy as well as self-sustenance, 	requires a smooth transitioning to a close collaboration with the industry. Although the NCE's have made progress in this area, a lesson that can be learnt from this is that knowledge networks do require a collaborative arrangement between researchers, the industry and the financial sector.	&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; The nature of this collaboration cannot be predicted before tangible research outputs are developed 	that reflect the relevance of academia in the industrial and financial sectors. A particular network, PENCE has mandated that the boards of directors 	include a representative of the financial sector. This is a step forward in opening the doors to greater collaboration and mutually assured growth and 	sustainable development in both academia as well as the industrial and financial sectors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As with all knowledge networks there is a continuous need for expansion of the focus areas to cover more fields and instigate research in neglected areas. 	The largest number of networks has been in the fields of healthcare and health associated work. However there is an impending need for networks to be established in other fields as well, such as those related to environmental issues, social dynamics and the general quality of life.	&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Canadian experience has resulted in a nuanced understanding of specific actions that need to be taken to strengthen knowledge networks across the 	spectrum. Firstly, there is an impending need to build new knowledge networks, which would be required to strengthen institutions upon which the networks 	are based. These include universities and research institutions, which have been weakened both financially and academically over the past few years. The 	NCE Program, on the face of it, seems to be strengthening universities, by attracting funding for research endeavors that would otherwise not be available 	to them. While this may be true, it tends to obfuscate the true nature of a university as an intellectual community, by portraying it as a funding source 	for research and equipment.&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt; The deteriorating role of the university in fostering research and laying 	the foundation of an intellectual community can be reversed by the competition posed by the NCEs which tend to threaten its stature in the fields of 	multi-disciplinary and graduate institution. Another aspect that needs to be considered is the role of knowledge networks in fostering sustainable 	development not only on a national or regional scale but on a global level. This can be effectuated by allowing the amalgamation of the academia and 	industry through ample representation, a model that has proven to be effective within the NCEs. This is all the more relevant today where multinational 	corporations hold considerable sway over the global economy, so much so that the role of governments in regulating this economy is gradually decreasing. 	Multilateral investment treaties and agreements are reflective of this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The final issue is that of the long standing debate between public good and proprietary knowledge. Canadian knowledge networks are of the opinion that 	knowledge must be freely disseminated. However, certain networks including the NCEs grant the exclusive right of the development and application of this 	knowledge to specific industry affiliates. On one hand this facilitates further investment into the research, which creates better products, new jobs and 	further social development. This is predicated on a fine balance of allowing this development without widening the already disparate socio-economic gaps 	that exist between developed and developing countries. Thus the balance between public good and propriety knowledge must be effectively managed by the regulatory role discharged by the governments and the decision making faculties of these knowledge networks.	&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Establishing international linkages across networks based within different regions across the world would also be an effective means of ensuring effective 	partnerships and the creation of a new, self-sustaining structure. This would bring new prospects of funding into sustainable development activities and 	engage industrial affiliates with international development activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;C. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Donor Perspectives&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The International Development Research Centre, based in Canada has also been instrumental in the setting up of support structures for networks. The IDRC 	has remained consistent in its emphasis of networks as mechanisms of linking scientists engaged in similar problems across the globe instead of as 	mechanisms to fund research in countries. This has afforded the IDRC with a greater level of flexibility in responding to the needs of developing countries 	as well as responding to the financial pressures within Canada to deliver superior technical support with a reduction in overheads. The IDRC sees 	networking an indispensable aspect of scientific pursuit and technological adaptation in the most effective manner. It is currently supporting four 	specific types of networks; horizontal networks which link together institutions with similar areas of specialization, vertical networks which work on 	disparate aspects of the same problem of different but interrelated problems, information networks which provide a centralized form of information service 	to members, which enables them to exchange information in the manner necessary and finally training networks which provide supervisory services to 	independent participants within the network.&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(I) &lt;/b&gt; &lt;b&gt;Internal Evaluations&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is an outstanding need to monitor visits that are undertaken by the coordinator or the specific representatives of the member or donor as applicable. 	This would expedite the process of identifying problems and aid in deriving tangible solutions in an efficient manner. The criteria for the assessment 	would vary depending on the goals of the organization. Donors may pose questions with respect to the cost effectiveness of a particular pattern of research 	and may seek a formal report regarding this aspect. A more extensive model of donor evaluations may even include assessments with respect to the monitoring 	and coordination of specific functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(II) &lt;/b&gt; &lt;b&gt;External Evaluations &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A system of external evaluation would be useful with assessing data with respect to the operations of programs and their objectives. This would engage 	newer participants by injecting newer ideas and insights into the management and scope of the network. The most extensive method of network evaluation was one that was postulated by Valverde &lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt; and reviewed by Faris	&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;. It aimed to draw an analysis of particular constraints and specific elements that would influence the 	execution of network programs. This method identifies a list of threats, opportunities, strengths and weaknesses which would inform future recommendations. 	The Valverde method makes use of both formal as well as informal data which is varied depending on the type of network and the management structure it 	employs.&lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(III) &lt;/b&gt; &lt;b&gt;Financial Viability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A network almost always requires external resources to aid in the setting up and coordination of its activities. Donor agencies must recognize the long 	term commitment that is required in this respect. It is therefore essential that the period for which this funding will be made available be clarified at the outset, to leave agencies with ample time to plan for the possibility of cessation of external financial support.	&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt; As concluded from the findings of the research study, although most networks are offered external 	support, it is primarily technology transfer and information networks that have been able to generate the bulk of funding in this respect. They have been able to obtain this financial assistance from a variety of sources including participating organizations as well as governments.	&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt; The funding for purely research networks however are inconsistent and the networks would have to plan 	in advance for a possible cessation of financial support.&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(IV) &lt;/b&gt; &lt;b&gt;Adaptability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the perspective of donors, the degree of adaptability and level of responsiveness of a particular network is especially relevant in assessing the 	coordination, control and leadership of a particular network. A network that is plagued by ineffective leadership and the lack of coordination is unable to 	adapt to changing circumstances and meet the needs of its participants. A combination of collaborative effort, a localized approach and far-sighted 	leadership instills in the participants of the network a sense of comfort in its processes and in the donors a faith in its ability to address topical 	issues and remain relevant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(V) &lt;/b&gt; &lt;b&gt;The Exchange of Information&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted by Akhtar, a network is created to respond to the growing need to improve channels of information exchange and communication.	&lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt; Information needs to be tailored to suit its users and must be disseminated accordingly. The study 	conducted has concluded that information networks that are engaged in the transfer of technology are inefficient in disseminating internally derived 	information and recognizing the needs of their users.&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt; Given that these networks are especially user 	oriented this systemic failure is extremely problematic. There is also a need to review the mechanism of transferring strategic research techniques and the 	approaches employed in dealing with developing countries. Special attention must be paid to the beneficiaries of a particular network so that the research 	conducted is directed towards that particular demographic. This is especially relevant for information networks, which from the evaluation; appear to be 	generating data but not considering who would be using these services.&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(VI) &lt;/b&gt; &lt;b&gt;Capacity Building&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facilitating the training of individuals both on a formal and informal level has led to an enhance level of research and reporting, as well as the 	designing of projects. There is however a need to tailor this training to suit the needs of the participants of a particular network. Networks which have been able to provide inputs which are not ordinarily locally provided have instigated the establishment of national and regional institutions.	&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(VII) &lt;/b&gt; &lt;b&gt;Cost Effectiveness&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to note however that networks need to employ the most cost effective mechanism of delivering support services to national programs. A 	network must work in a manner that allows for enough individual enterprise but at the same time follows a collaborative model to generate more effective 	and relevant research within a short span of time and through the utilization of minimum resources. The Caribbean Technology Consultation Services (CTCS) for example was found to be far more cost effective and in fact 50% cheaper than the services of the United Nations Industrial Development Organization.	&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt; Similarly, the evaluators of the LAAN found that funding a network was significantly cheaper than 	finding individual research projects.&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Castells, Manuel (2000) "Toward a Sociology of the Network Society" &lt;i&gt;Contemporary Sociology&lt;/i&gt;, Vol&lt;/p&gt;
&lt;p&gt;29 (5) p693-699&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Reinicke, Wolfgang H &amp;amp; Francis Deng, &lt;i&gt;et al &lt;/i&gt;(2000) &lt;i&gt;Critical Choices: The United Nations, Networks&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;and the Future of Global Governance &lt;/i&gt; IDRC, Ottawa&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; ., n.1, p.697&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n.1, p.61&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Chambers, Robert (1997) &lt;i&gt;Whose Reality Counts? Putting the First Last &lt;/i&gt;Intermediate Technology&lt;/p&gt;
&lt;p&gt;Publications, London&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Chisholm, Rupert. F (1998) &lt;i&gt;Developing Network Organizations: Learning from Practice and Theory&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Addison Wesley&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Brown, L. David. 1993. "Development Bridging Organizations and Strategic&lt;/p&gt;
&lt;p&gt;Management for Social Change." &lt;i&gt;Advances in Strategic Management &lt;/i&gt;9.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Madeline Church et al, Participation, Relationships and Dynamic change: New Thinking On Evaluating The Work Of International Networks Development 			Planning Unit, University College London (2002), p. 16&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Reinicke, Wolfgang H &amp;amp; Francis Deng, &lt;i&gt;et al &lt;/i&gt;(2000) &lt;i&gt;Critical Choices: The United Nations, Networks&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;and the Future of Global Governance &lt;/i&gt; IDRC, Ottawa, p.61&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n.13, p. 65&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, p. 62&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, p. 63&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, p. 64&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Newell, Sue &amp;amp; Jacky Swan (2000) "Trust and Inter-organizational Networking" in &lt;i&gt;Human Relations&lt;/i&gt;,&lt;/p&gt;
&lt;p&gt;Vol 53 (10)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Sheppard, Blair H &amp;amp; Marla Tuchinsky (1996) "Micro-OB and the Network Organisation" in Kramer, R.&lt;/p&gt;
&lt;p&gt;And Tyler T. (eds) &lt;i&gt;Trust in Organisations&lt;/i&gt;, Sage&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Powell, Walter W (1996) "Trust-based forms of governance" in Kramer, R. And Tyler T. (eds) &lt;i&gt;Trust in&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Organisations&lt;/i&gt; , Sage&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Stern, Elliot (2001) "Evaluating Partnerships: Developing a Theory Based Framework", Paper for&lt;/p&gt;
&lt;p&gt;European Evaluation Society Conference 2001, Tavistock Institute&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Freedman, Lynn &amp;amp; Jan Reynders (1999) &lt;i&gt;Developing New Criteria for Evaluating Networks &lt;/i&gt;in Karl, M.&lt;/p&gt;
&lt;p&gt;(ed&lt;i&gt;) Measuring the Immeasurable: Planning Monitoring and Evaluation of Networks&lt;/i&gt;, WFS&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Allen Nan, Susan (1999) "Effective Networking for Conflict Transformation&lt;i&gt;" &lt;/i&gt;Draft Paper for&lt;/p&gt;
&lt;p&gt;International Alert./UNHCR Working Group on Conflict Management and Prevention&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 20&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Taylor, James, (2000) "So Now They Are Going To Measure Empowerment!", paper for INTRAC 4th&lt;/p&gt;
&lt;p&gt;International Workshop on the Evaluation of Social Development, Oxford, April&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Karl, Marilee (2000) &lt;i&gt;Monitoring And Evaluating Stakeholder Participation In Agriculture And Rural&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Development Projects: A Literature Review, &lt;/i&gt; FAO&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p.25&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 26&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p.27&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Ludema, James D, David L Cooperrider &amp;amp; Frank J Barrett (2001) "Appreciative Inquiry: the Power of&lt;/p&gt;
&lt;p&gt;the Unconditional Positive Question" in Reason, P. &amp;amp; Bradbury, H. (eds) &lt;i&gt;Handbook of Action&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Research&lt;/i&gt; , Sage&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 29&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Sida (2000) &lt;i&gt;Webs Women Weave, &lt;/i&gt;Sweden, 131-135&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Dutting, Gisela &amp;amp; Martha de la Fuente (1999) "Contextualising our Experiences: Monitoring and&lt;/p&gt;
&lt;p&gt;Evaluation in the Women's Global Network for Reproductive Rights" in Karl, M. (ed&lt;i&gt;) Measuring the&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Immeasurable: Planning Monitoring and Evaluation of Networks&lt;/i&gt; , WFS&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 30&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 32&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; Allen Nan, Susan (1999) "Effective Networking for Conflict Transformation&lt;i&gt;" &lt;/i&gt;Draft Paper for&lt;/p&gt;
&lt;p&gt;International Alert./UNHCR Working Group on Conflict Management and Prevention&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, p. 67&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, 68&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n 10, 36&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; See Madeline Church et al, Participation, Relationships and Dynamic change: New Thinking On Evaluating The Work Of International Networks 			Development Planning Unit, University College London (2002), p. 36-37&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; The three granting councils are: the Natural Sciences and Engineering Research Council (NSERC),&lt;/p&gt;
&lt;p&gt;the Social Sciences and Humanities Research Council (SSHRC), and the Medical Research Council&lt;/p&gt;
&lt;p&gt;(MRC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Howard C. Clark, Formal Knowledge Networks: A Study of Canadian Experiences, International Institute for Sustainable Development 1998, p. 16&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Ibid, p. 18&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Ibid, p. 18&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; Ibid, p. 19&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; Ibid , p 21&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Ibid , p. 22&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Ibid, p. 31&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; Terry Smutylo and Saidou Koala, Research Networks: Evolution and Evaluation from a Donor's Perspective, p. 232&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; Valverde, C. 1988, Agricultural research networking : Development and evaluation, International Services for National Agricultural Research, The 			Hague, Netherlands. Staff Notes (18-26 November 1988)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; Faris, D.G 1991, Agricultural research networks as development tools: Views of a network coordinator, IDRC, Ottawa, Canada, and International Crops 			Research Institute for the Semi-Arid Tropic, Patancheru, Andhra Pradesh, India&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 62&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; Terry Smutylo and Saidou Koala, Research Networks: Evolution and Evaluation from a Donor's Perspective, p. 233&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; Akhtar, S. 1990. Regional Information Networks : Some Lessons from Latin America. &lt;i&gt;Information Development&lt;/i&gt; 6 (1) : 35-42&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; Ibid, p. 242&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; Ibid, p. 242&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; Ibid., p. 243&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; Stanley, J.L and Elwela, S.S.B 1988, Evaluation report for the Caribbean Technology Consultancy Services (CTCS), CTCS Network Project (1985-1988) 			IDRC Ottawa, Canada&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; Moreau,L. 1991, Evaluation of Latin American Aqualculture Network. IDRC, Ottawa, Canada&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review'&gt;https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-02-04T13:13:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/elite-capture-of-governance-in-bangalore">
    <title>Elite Capture of Governance in Bangalore</title>
    <link>https://cis-india.org/internet-governance/news/elite-capture-of-governance-in-bangalore</link>
    <description>
        &lt;b&gt;Vanya Rakesh participated in the event held in Bangalore on December 16, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was a public consultation on the TENDER Sure Road project, discussing elite capture of Governance in Bangalore by way of this project. The panel comprised of experts to lead the consultation, followed by views of the society members on this issue. The panel discussion was organised by the Forum for Urban Governance and Commons. For more info &lt;a class="external-link" href="http://allevents.in/bangalore/invite-a-public-consultation-on-elite-capture-of-governance-in-bangalore/477838869061697"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/elite-capture-of-governance-in-bangalore'&gt;https://cis-india.org/internet-governance/news/elite-capture-of-governance-in-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-12T16:28:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/what-are-peoples-rights-in-digital-world">
    <title>What are People's Rights in Digital World</title>
    <link>https://cis-india.org/internet-governance/news/what-are-peoples-rights-in-digital-world</link>
    <description>
        &lt;b&gt;Vanya Rakesh participated in this workshop organized by IT for Change on December 4, 2015 in Bangalore.&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/PeoplesRights.jpg" alt="Peoples Rights" class="image-inline" title="Peoples Rights" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above: Participants from the workshop&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This workshop by IT for Change to build  conceptions of rights with regard to the digital realm based on our tacit formative consciousness about them and undertake such an exercise to draw the first outlines of the social contract that must underpin our pervasively digital existence. IT for Change brought together thought leaders engaged in rights frameworks (including rights activists across domains and digital rights activists) to participate in this preliminary inquiry, to build from scratch a conception of what constitutes an equitable and just digital society, and what individual and collective rights would be commensurate to such a conception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more info &lt;a class="external-link" href="http://sflc.in/workshop-on-what-are-peoples-rights-in-the-digital-world/"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/what-are-peoples-rights-in-digital-world'&gt;https://cis-india.org/internet-governance/news/what-are-peoples-rights-in-digital-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-12T01:51:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy">
    <title>A Critique of Consent in Information Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy</link>
    <description>
        &lt;b&gt;The idea of informed consent in privacy law is supposed to ensure the autonomy of an individual in any exercise which involves sharing of the individual's personal information. Consent is usually taken through a document, a privacy notice, signed or otherwise agreed to by the participant.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Notice and Consent as cornerstone of privacy law&lt;/b&gt;&lt;br /&gt;The privacy notice, which is the primary subject of this article, conveys all pertinent information, including risks and benefits to the participant, and in the possession of such knowledge, they can make an informed choice about whether to participate or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most modern laws and data privacy principles seek to focus on individual control. In this context, the definition by the late Alan Westin, former Professor 	of Public Law &amp;amp; Government Emeritus, Columbia University, which characterises privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to other,"	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is most apt. The idea of privacy as control is what finds articulation in data protection policies across jurisdictions beginning from the Fair Information Practice Principles (FIPP) from the United States.	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Schwarz, the Jefferson E. Peyser Professor at UC Berkeley School of Law and a Director of the Berkeley Center for Law and Technology, called the FIPP the building blocks of modern information privacy law.	&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These principles trace their history to a report called 'Records, Computers and 	Rights of Citizens'&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; prepared by an Advisory Committee appointed by the US Department 	of Health, Education and Welfare in 1973 in response to the increasing automation in data systems containing information about individuals. The Committee's 	mandate was to "explore the impact of computers on record keeping about individuals and, in addition, to inquire into, and make recommendations regarding, 	the use of the Social Security number."&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The most important legacy of this report was 	the articulation of five principles which would not only play a significant role in the privacy laws in US but also inform data protection law in most 	privacy regimes internationally&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; like the OECD Privacy Guidelines, the EU Data 	Protection Principles, the FTC Privacy Principles, APEC Framework or the nine National Privacy Principles articulated by the Justice A P Shah Committee 	Report which are reflected in the Privacy Bill, 2014 in India. Fred Cate, the C. Ben Dutton Professor of Law at the Indiana University Maurer School of 	Law, effectively summarises the import of all of these privacy regimes as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"All of these data protection instruments reflect the same approach: tell individuals what data you wish to collect or use, give them a choice, grant them 	access, secure those data with appropriate technologies and procedures, and be subject to third-party enforcement if you fail to comply with these 	requirements or individuals' expressed preferences"&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This makes the individual empowered and allows them to weigh their own interests in exercising their consent. The allure of this paradigm is that in one 	elegant stroke, it seeks to "ensure that consent is informed and free and thereby also to implement an acceptable tradeoff between privacy and competing 	concerns."&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This system was originally intended to be only one of the multiple ways 	in data processing would be governed, along with other substantive principles such as data quality, however, it soon became the dominant and often the only 	mechanism.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In recent years however, the emergence of Big Data and the nascent development of the Internet of Things has led many commentators to begin questioning the workability of consent as a principle of privacy.	&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In this article we will look closely at the some of issues with the concept of 	informed consent, and how these notions have become more acute in recent years. Following an analysis of these issues, we will conclude by arguing that 	today consent, as the cornerstone of privacy law, may in fact be thought of as counter-productive and that a rethinking of a principle based approach to 	privacy may be necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Problems with Consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a certain extent, there are some cognitive problems that have always existed with the issue of informed consent such as long and difficult to understand 	privacy notices,&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; although, in recent past with these problems have become much 	more aggravated. Fred Cate points out that FIPPs at their inception were broad principles which included both substantive and procedural aspects. However, 	as they were translated into national laws, the emphasis remained on the procedural aspect of notice and consent. From the idea of individual or societal 	welfare as the goals of privacy, the focus had shifted to individual control.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; With data collection occurring with every use of online services, and complex data sets being created, it is humanly impossible to exercise rational 	decision-making about the choice to allow someone to use our personal data. The thrust of Big Data technologies is that the value of data resides not in its primary purposes but in its numerous secondary purposes where data is re-used many times over.	&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In that sense, the very idea of Big Data conflicts with the data minimization 	principle.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The idea is to retain as much data as possible for secondary uses. Since, these secondary uses are, by their nature, unanticipated, its runs counter to the the very idea of the purpose limitation principle.	&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The notice and consent requirement has simply led to a proliferation of long and 	complex privacy notices which are seldom read and even more rarely understood. We will articulate some issues with privacy notices which have always 	existed, and have only become more exacerbated in the context of Big Data and the Internet of Things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Failure to read/access privacy notices &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notice and consent principle relies on the ability of the individual to make an informed choice after reading the privacy notice. The purpose of a 	privacy notice is to act as a public announcement of the internal practices on collection, processing, retention and sharing of information and make the 	user aware of the same.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, in order to do so the individual must first be 	able to access the privacy notices in an intelligible format and read them. Privacy notices come in various forms, ranging from documents posted as privacy policies on a website, to click through notices in a mobile app, to signs posted in public spaces informing about the presence of CCTV cameras.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order for the principle of notice and consent to work, the privacy notices need to be made available in a language understood by the user. As per 	estimates, about 840 million people (11% of the world population) can speak or understand English. However, most privacy notices online are not available 	in the local language in different regions.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Further, with the ubiquity of 	smartphones and advent of Internet of Things, constrained interfaces on mobile screens and wearables make the privacy notices extremely difficult to read. 	It must be remembered that privacy notices often run into several pages, and smaller screens effectively ensure that most users do not read through them. Further, connected wearable devices often have "little or no interfaces that readily permit choices."	&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As more and more devices are connected, this problem will only get more 	pronounced. Imagine in a world where refrigerators act as the intermediary disclosing information to your doctor or supermarket, at what point does the 	data subject step in and exercise consent.&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another aspect that needs to be understood is that unlike earlier when data collectors were far and few in between, the user could theoretically make a 	rational choice taking into account the purpose of data collection. However, in the world of Big Data, consent often needs to be provided while the user is 	trying to access services. In that context click through privacy notices such as those required to access online application, are treated simply as an 	impediment that must be crossed in order to get access to services. The fact that the consent need to be given in real time almost always results in 	disregarding what the privacy notices say.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, some scholars have argued that while individual control over data may be appealing in theory, it merely gives an illusion of enhanced privacy but 	not the reality of meaningful choice.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Research demonstrates that the presence of 	the term 'privacy policy' leads people to the false assumption that if a company has a privacy policy in place, it automatically means presence of 	substantive and responsible limits on how data is handled.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Joseph Turow, the 	Robert Lewis Shayon Professor of Communication at the Annenberg School for Communication, and his team for example has demonstrated how "[w]hen consumers 	see the term 'privacy policy,' they believe that their personal information will be protected in specific ways; in particular, they assume that a website 	that advertises a privacy policy will not share their personal information."&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In 	reality, however, privacy policies are more likely to serve as liability disclaimers for companies than any kind of guarantee of privacy for consumers. 	Most people tend to ignore privacy policies.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Cass Sunstein states that our 	cognitive capacity to make choices and take decisions is limited. When faced with an overwhelming number of choices to make, most of us do not read privacy 	notices and resort to default options.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; The requirement to make choices, sometimes several times in a day, imposes significant burden on the consumers as well the business seeking such consent.	&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Failure to understand privacy notices&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FTC chairperson Edith Ramirez stated: "In my mind, the question is not whether consumers should be given a say over unexpected uses of their data; rather, 	the question is how to provide simplified notice and choice."&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Privacy notices 	often come in the form of long legal documents much to the detriment of the readers' ability to understand them. These policies are "long, complicated, 	full of jargon and change frequently."&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kent walker list five problems that 	privacy notices typically suffer from - a) overkill - long and repetitive text in small print, b) irrelevance - describing situations of little concern to 	most consumers, c) opacity - broad terms the reflect the truth that is impossible to track and control all the information collected and stored, d) 	non-comparability - simplification required to achieve comparability will lead to compromising accuracy, and e) inflexibility - failure to keep pace with 	new business models.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Erik Sherman did a review of twenty three corporate privacy 	notices and mapped them against three indices which give approximate level of education necessary to understand text on a first read. His results show that most of policies can only be understood on the first read by people of a grade level of 15 or above.	&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; FTC Chairperson Timothy Muris summed up the problem with long privacy notices when he said, "Acres of trees died to produce a blizzard of barely comprehensible privacy notices."	&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Margaret Jane Radin, the former Henry King Ransom Professor of Law Emerita at the University of Michigan, provides a good definition of free consent. It 	"involves a knowing understanding of what one is doing in a context in which it is actually&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;possible for or to do otherwise, and an affirmative action in doing something, rather&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;than a merely passive acquiescence in accepting something."&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; There have been various proposals advocating a more succinct and simpler standard for privacy notices,&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or multi-layered notices&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or representing the information in the form of a table.	&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, studies show only an insignificant improvement in the understanding by consumers when privacy policies are represented in graphic formats like tables and labels.	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It has also been pointed out that it is impossible to convey complex data 	policies in simple and clear language.&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Failure to anticipate/comprehend the consequences of consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today's infinitely complex and labyrinthine data ecosystem is beyond the comprehension of most ordinary users. Despite a growing willingness to share 	information online, most have no understanding of what happens to their data once they have uploaded it - Where it goes? Whom it is held by? Under what 	conditions? For what purpose? Or how might it be used, aggregated, hacked, or leaked in the future? For the most part, the above operations are "invisible, 	managed at distant centers, from behind the scenes, by unmanned powers."&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The perceived opportunities and benefits of Big Data have led to an acceptance of the indiscriminate collection of as much data as possible as well as the 	retention of that data for unspecified future analysis. For many advocates, such practices are absolutely essential if Big Data is to deliver on its 	promises.. Experts have argued that key privacy principles particularly those of collection limitation, data minimization and purpose limitation should not 	be applied to Big Data processing.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As mentioned above, in the case of Big Data, 	the value of the data collected comes often not from its primary purpose but from its secondary uses. Deriving value from datasets involves amalgamating 	diverse datasets and executing speculative and exploratory kinds of analysis in order to discover hidden insights and correlations that might have 	previously gone unnoticed.&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As such organizations are today routinely reprocessing 	data collected from individuals for purposes not directly related to the services they provide to the customer. These secondary uses of data are becoming increasingly valuable sources of revenue for companies as the value of data in and of itself continues to rise.	&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Purpose Limitation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principle of purpose limitation has served as a key component of data protection for decades. Purposes given for the processing of users' data should 	be given at the time of collection and consent and should be "specified, explicit and legitimate". In practice however, reasons given typically include phrases such as, 'for marketing purposes' or 'to improve the user experience' that are vague and open to interpretation.	&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators whilst conceding the fact that purpose limitation in the era of Big Data may not be possible have instead attempted to emphasise the 	notion of 'compatible use' requirements. In the view of Working Party on the protection of individuals with regard to the processing of person data, for 	example, use of data for a purpose other than that originally stated at the point of collection should be subject to a case-by-case review of whether not 	further processing for different purpose is justifiable - i.e., compatible with the original purpose. Such a review may take into account for example, the 	context in which the data was originally collected, the nature or sensitivity of the data involved, and the existence of relevant safeguards to insure fair 	processing of the data and prevent undue harm to the data subject.&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, Big Data advocates have argued that an assessment of legitimate interest rather than compatibility with the initial purpose is far 	better suited to Big Data processing.&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; They argue that today the notion of purpose 	limitation has become outdated. Whereas previously data was collected largely as a by-product of the purpose for which it was being collected. If for 	example, we opted to use a service the information we provided was for the most part necessary to enable the provision of that service. Today however, the 	utility of data is no longer restricted to the primary purpose for which it is collected but can be used to provide all kinds of secondary services and 	resources, reduce waste, increase efficiency and improve decision-making.&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These 	kinds of positive externalities, Big Data advocates insist, are only made possible by the reprocessing of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately for the notion of consent the nature of these secondary purposes are rarely evident at the time of collection. Instead the true value of the 	data can often only be revealed when it is amalgamated with other diverse datasets and subjected to various forms of analysis to help reveal hidden and 	non-obvious correlations and insights.&lt;a href="#_ftn47" name="_ftnref47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The uncertain and speculative value of 	data therefore means that it is impossible to provide "specific, explicit, and legitimate" details about how a given data set will be used or how it might 	be aggregated in future. Without this crucial information data subjects have no basis upon which they can make an informed decision about whether or not to 	provide consent. Robert Sloan and Richard Warner argue that it is impossible for a privacy notice to contain enough information to enable free consent. 	They argue that current data collection practices are highly complex and that these practices involve collection of information at one stage for one purpose and then retain, analyze, and distribute it for a variety of other purposes in unpredictable ways.	&lt;a href="#_ftn48" name="_ftnref48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Helen Nissenbaum points to the ever changing nature of data flow and the 	cognitive challenges it poses. "Even if, for a given moment, a&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;snapshot of the information flows could be grasped, the realm is in constant flux, with new firms entering the picture, new analytics, and new back end contracts forged: in other words, we are dealing with a recursive capacity that is indefinitely extensible."	&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Scale and Aggregation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today the quantity of data being generated is expanding at an exponential rate. From smartphones and televisions, trains and airplanes, sensor-equipped 	buildings and even the infrastructures of our cities, data now streams constantly from almost every sector and function of daily life, 'creating countless 	new digital puddles, lakes, tributaries and oceans of information'.&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In 2011 it 	was estimated that the quantity of data produced globally would surpass 1.8 zettabytes , by 2013 that had grown to 4 zettabytes , and with the nascent development of the Internet of Things gathering pace, these trends are set to continue.	&lt;a href="#_ftn51" name="_ftnref51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Big Data by its very nature requires the collection and processing of very large 	and very diverse data sets. Unlike other forms scientific research and analysis which utilize various sampling techniques to identify and target the types 	of data most useful to the research questions, Big Data instead seeks to gather as much data as possible, in order to achieve full resolution of the 	phenomenon being studied, a task made much easier in recent years as a result of the proliferation of internet enabled devices and the growth of the 	Internet of Things. This goal of attaining comprehensive coverage exists in tension however with the key privacy principles of collection limitation and data minimization which seek to limit both the quantity and variety of data collected about an individual to the absolute minimum.	&lt;a href="#_ftn52" name="_ftnref52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dilution of the purpose limitation principle entails that even those who understand privacy notices and are capable of making rational choices about 	it, cannot conceptualize how their data will be aggregated and possibly used or re-used. Seemingly innocuous bits of data revealed at different stages 	could be combined to reveal sensitive information about the individual. Daniel Solove, the John Marshall Harlan Research Professor of Law at the George 	Washington University Law School, in his book, "The Digital Person", calls it the aggregation effect. He argues that the ingenuity of the data mining techniques and the insights and predictions that could be made by it render any cost-benefit analysis that an individual could make ineffectual.	&lt;a href="#_ftn53" name="_ftnref53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Failure to opt-out&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The traditional choice against the collection of personal data that users have had access to, at least in theory, is the option to 'opt-out' of certain 	services. This draws from the free market theory that individuals exercise their free will when they use services and always have the option of opting out, 	thus, arguing against regulation but relying on the collective wisdom of the market to weed out harms. The notion that the provision of data should be a 	matter of personal choice on the part of the individual and that the individual can, if they chose decide to 'opt-out' of data collection, for example by 	ceasing use of a particular service, is an important component of privacy and data protection frameworks. The proliferation of internet-enabled devices, 	their integration into the built environment and the real-time nature of data collection and analysis however are beginning to undermine this concept. For 	many critics of Big Data, the ubiquity of data collection points as well as the compulsory provision of data as a prerequisite for the access and use of many key online services, is making opting-out of data collection not only impractical but in some cases impossible.	&lt;a href="#_ftn54" name="_ftnref54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst sceptics may object that individuals are still free to stop using services that require data. As online connectivity becomes increasingly important to participation in modern life, the choice to withdraw completely is becoming less of a genuine choice.	&lt;a href="#_ftn55" name="_ftnref55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Information flows not only from the individuals it is about but also from what 	other people say about them. Financial transactions made online or via debit/credit cards can be analysed to derive further information about the 	individual. If opting-out makes you look anti-social, criminal, or unethical, the claims that we are exercising free will seems murky and leads one to 	wonder whether we are dealing with coercive technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue with the consent and opt-out paradigm is the binary nature of the choice. This binary nature of consent makes a mockery of the notion that 	consent can function as an effective tool of personal data management. What it effectively means is that one can either agree with the long privacy 	notices, or choose to abandon the desired service. "This binary choice is not what the privacy architects envisioned four decades ago when they imagined 	empowered individuals making informed decisions about the processing of their personal data. In practice, it certainly is not the optimal mechanism to ensure that either information privacy or the free flow of information is being protected."	&lt;a href="#_ftn56" name="_ftnref56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion: 'Notice and Consent' is counter-productive&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There continues to be an unwillingness amongst many privacy advocates to concede that the concept of consent is fundamentally broken, as Simon Davies, a 	privacy advocate based in London, comments 'to do so could be seen as giving ground to the data vultures', and risks further weakening an already 	dangerously fragile privacy framework.&lt;a href="#_ftn57" name="_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Nevertheless, as we begin to transition 	into an era of ubiquitous data collection, evidence is becoming stronger that consent is not simply ineffective, but may in some instances might be 	counter-productive to the goals of privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As already noted, the notion that privacy agreements produce anything like truly informed consent has long since been discredited; given this fact, one may 	ask for whose benefit such agreements are created? One may justifiably argue that far from being for the benefit and protection of users, privacy agreement 	may in fact be fundamentally to the benefit of data brokers, who having gained the consent of users can act with near impunity in their use of the data 	collected. Thus, an overly narrow focus on the necessity of consent at the point of collection, risks diverting our attention from the arguably more important issue of how our data is stored, analysed and distributed by data brokers following its collection.	&lt;a href="#_ftn58" name="_ftnref58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, given the often complicated and cumbersome processes involved in gathering consent from users, some have raised concerns that the mechanisms 	put in place to garner consent could themselves morph into surveillance mechanisms. Davies, for example cites the case of the EU Cookie Directive, which 	required websites to gain consent for the collection of cookies. Davies observes how, 'a proper audit and compliance element in the system could require 	the processing of even more data than the original unregulated web traffic. Even if it was possible for consumers to use some kind of gateway intermediary 	to manage the consent requests, the resulting data collection would be overwhelming''. Thus in many instances there exists a fundamental tension between the requirement placed on companies to gather consent and the equally important principle of data minimization.	&lt;a href="#_ftn59" name="_ftnref59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the above issues with notice and informed consent in the context of information privacy, and the fact that it is counterproductive to the larger 	goals of privacy law, it is important to revisit the principle or rights based approach to data protection, and consider a paradigm shift where one moves 	to a risk based approach that takes into account the actual threats of sharing data rather than relying on what has proved to be an ineffectual system of 	individual control. We will be dealing with some of these issues in a follow up to this article.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alan Westin, Privacy and Freedom, Atheneum, New York, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; FTC Fair Information Practice Principles (FIPP) available at			&lt;a href="https://www.it.cornell.edu/policies/infoprivacy/principles.cfm"&gt;https://www.it.cornell.edu/policies/infoprivacy/principles.cfm&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul M. Schwartz, "Privacy and Democracy in Cyberspace," 52 Vanderbilt Law Review 1607, 1614 (1999).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; US Secretary's Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, available at			&lt;a href="http://www.justice.gov/opcl/docs/rec-com-rights.pdf"&gt;http://www.justice.gov/opcl/docs/rec-com-rights.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://epic.org/privacy/ppsc1977report/c13.htm"&gt;https://epic.org/privacy/ppsc1977report/c13.htm&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Marc Rotenberg, "Fair Information Practices and the Architecture of Privacy: What Larry Doesn't Get," available at 			&lt;a href="https://journals.law.stanford.edu/sites/default/files/stanford-technology-law-review/online/rotenberg-fair-info-practices.pdf"&gt; https://journals.law.stanford.edu/sites/default/files/stanford-technology-law-review/online/rotenberg-fair-info-practices.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Fred Cate, The Failure of Information Practice Principles, available at			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Robert Sloan and Richard Warner, Beyong Notice and Choice: Privacy, Norms and Consent, 2014, available at 			&lt;a href="https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf"&gt; https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Fred Cate, Viktor Schoenberger, Notice and Consent in a world of Big Data, available at			&lt;a href="http://idpl.oxfordjournals.org/content/3/2/67.abstract"&gt;http://idpl.oxfordjournals.org/content/3/2/67.abstract&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Daniel Solove, Privacy self-management and consent dilemma, 2013 available at 			&lt;a href="http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications"&gt; http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ben Campbell, Informed consent in developing countries: Myth or Reality, available at 			&lt;a href="https://www.dartmouth.edu/~ethics/docs/Campbell_informedconsent.pdf"&gt; https://www.dartmouth.edu/~ethics/docs/Campbell_informedconsent.pdf &lt;/a&gt; ;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Viktor Mayer Schoenberger and Kenneth Cukier, Big Data: A Revolution that will transform how we live, work and think" John Murray, London, 2013 at 			153.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Data Minimization principle requires organizations to limit the collection of personal data to the minimum extent necessary to obtain their 			legitimate purpose and to delete data no longer required.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Omer Tene and Jules Polonetsky, "Big Data for All: Privacy and User Control in the Age of Analytics," SSRN Scholarly Paper, available at			&lt;a href="http://papers.ssrn.com/abstract=2149364"&gt;http://papers.ssrn.com/abstract=2149364&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Florian Schaub, R. Balebako et al, "A Design Space for effective privacy notices" available at 			&lt;a href="https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf"&gt; https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Daniel Solove, The Digital Person: Technology and Privacy in the Information Age, NYU Press, 2006.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.ethnologue.com/statistics/size"&gt;http://www.ethnologue.com/statistics/size&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Opening Remarks of FTC Chairperson Edith Ramirez Privacy and the IoT: Navigating Policy Issues International Consumer Electronics Show Las Vegas, 			Nevada January 6, 2015 available at 			&lt;a href="https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf"&gt; https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/"&gt; http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Chris Jay Hoofnagle &amp;amp; Jennifer King, Research Report: What Californians Understand&lt;/p&gt;
&lt;p&gt;About Privacy Online, available at &lt;a href="http://ssrn.com/abstract=1262130"&gt;http://ssrn.com/abstract=1262130&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Joseph Turrow, Michael Hennesy, Nora Draper, The Tradeoff Fallacy, available at 			&lt;a href="https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf"&gt; https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Saul Hansell, "Compressed Data: The Big Yahoo Privacy Storm That Wasn't," New York Times, May 13, 2002 available at 			&lt;a href="http://www.nytimes.com/2002/05/13/business/compressed-data-the-big-yahoo-privacy-storm-that-wasn-t.html?_r=0"&gt; http://www.nytimes.com/2002/05/13/business/compressed-data-the-big-yahoo-privacy-storm-that-wasn-t.html?_r=0 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Cass Sunstein, Choosing not to choose: Understanding the Value of Choice, Oxford University Press, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For example, Acxiom, processes more than 50 trillion data transactions a year. 			&lt;a href="http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all&amp;amp;_r=0"&gt; http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all&amp;amp;_r=0 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Opening Remarks of FTC Chairperson Edith Ramirez Privacy and the IoT: Navigating Policy Issues International Consumer Electronics Show Las Vegas, 			Nevada January 6, 2015 available at 			&lt;a href="https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf"&gt; https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; L. F. Cranor. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law, 10:273, 2012, available at			&lt;a href="http://jthtl.org/content/articles/V10I2/JTHTLv10i2_Cranor.PDF"&gt;http://jthtl.org/content/articles/V10I2/JTHTLv10i2_Cranor.PDF&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kent Walker, The Costs of Privacy, 2001 available at 			&lt;a href="https://www.questia.com/library/journal/1G1-84436409/the-costs-of-privacy"&gt; https://www.questia.com/library/journal/1G1-84436409/the-costs-of-privacy &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Erik Sherman, "Privacy Policies are great - for Phds", CBS News, available at			&lt;a href="http://www.cbsnews.com/news/privacy-policies-are-great-for-phds/"&gt;http://www.cbsnews.com/news/privacy-policies-are-great-for-phds/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Timothy J. Muris, Protecting Consumers' Privacy: 2002 and Beyond, available at			&lt;a href="http://www.ftc.gov/speeches/muris/privisp1002.htm"&gt;http://www.ftc.gov/speeches/muris/privisp1002.htm&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Margaret Jane Radin, Humans, Computers, and Binding Commitment, 1999 available at			&lt;a href="http://www.repository.law.indiana.edu/ilj/vol75/iss4/1/"&gt;http://www.repository.law.indiana.edu/ilj/vol75/iss4/1/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Annie I. Anton et al., Financial Privacy Policies and the Need for Standardization, 2004 available at			&lt;a href="https://ssl.lu.usi.ch/entityws/Allegati/pdf_pub1430.pdf"&gt;https://ssl.lu.usi.ch/entityws/Allegati/pdf_pub1430.pdf&lt;/a&gt;; Florian Schaub, R. 			Balebako et al, "A Design Space for effective privacy notices" available at 			&lt;a href="https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf"&gt; https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Center for Information Policy Leadership, Hunton &amp;amp; Williams LLP, "Ten Steps To Develop A Multi-Layered Privacy Notice" available at 			&lt;a href="https://www.informationpolicycentre.com/files/Uploads/Documents/Centre/Ten_Steps_whitepaper.pdf"&gt; https://www.informationpolicycentre.com/files/Uploads/Documents/Centre/Ten_Steps_whitepaper.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Allen Levy and Manoj Hastak, Consumer Comprehension of Financial Privacy Notices, Interagency Notice Project, available at			&lt;a href="https://www.sec.gov/comments/s7-09-07/s70907-21-levy.pdf"&gt;https://www.sec.gov/comments/s7-09-07/s70907-21-levy.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Patrick Gage Kelly et al., Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach available at 			&lt;a href="https://www.ftc.gov/sites/default/files/documents/public_comments/privacy-roundtables-comment-project-no.p095416-544506-00037/544506-00037.pdf"&gt; https://www.ftc.gov/sites/default/files/documents/public_comments/privacy-roundtables-comment-project-no.p095416-544506-00037/544506-00037.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Howard Latin, "Good" Warnings, Bad Products, and Cognitive Limitations, 41 UCLA Law Review available at 			&lt;a href="https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&amp;amp;crawlid=1&amp;amp;srctype=smi&amp;amp;srcid=3B15&amp;amp;doctype=cite&amp;amp;docid=41+UCLA+L.+Rev.+1193&amp;amp;key=1c15e064a97759f3f03fb51db62a79a5"&gt; https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&amp;amp;crawlid=1&amp;amp;srctype=smi&amp;amp;srcid=3B15&amp;amp;doctype=cite&amp;amp;docid=41+UCLA+L.+Rev.+1193&amp;amp;key=1c15e064a97759f3f03fb51db62a79a5 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Jonathan Obar, Big Data and the Phantom Public: Walter Lippmann and the fallacy of data privacy self management, Big Data and Society, 2015, available at&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239188"&gt; &lt;/a&gt; &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239188"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239188&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Viktor Mayer Schoenberger and Kenneth Cukier, Big Data: A Revolution that will transform how we live, work and think" John Murray, London, 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 15.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 29 Working Party, (2013) Opinion 03/2013 on Purpose Limitation, Article 29, available at: 			&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf"&gt; http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It remains unclear however whose interest would be accounted, existing EU legislation would allow commercial/data broker/third party interests to 			trump those of the user, effectively allowing re-processing of personal data irrespective of whether that processing would be in the interest of 			the user.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Robert Sloan and Richard Warner, Beyong Notice and Choice: Privacy, Norms and Consent, 2014, available at 			&lt;a href="https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf"&gt; https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Helen Nissenbaum, A Contextual Approach to Privacy Online, available at			&lt;a href="http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf"&gt;http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; D Bollier, The Promise and Peril of Big Data. The Aspen Institute, 2010, available at: 			&lt;a href="http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/The_Promise_and_Peril_of_Big_Data.pdf"&gt; http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/The_Promise_and_Peril_of_Big_Data.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Meeker, M. &amp;amp; Yu, L. Internet Trends, Kleiner Perkins Caulfield Byers, (2013),			&lt;a href="http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013"&gt;http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 17.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Janet Vertasi, My Experiment Opting Out of Big Data Made Me Look Like a Criminal, 2014, available at			&lt;a href="http://time.com/83200/privacy-internet-big-data-opt-out/"&gt;http://time.com/83200/privacy-internet-big-data-opt-out/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.techpolicy.com/NoticeConsent-inWorldBigData.aspx"&gt;http://www.techpolicy.com/NoticeConsent-inWorldBigData.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Simon Davies, Why the idea of consent for data processing is becoming meaningless and dangerous, available at 			&lt;a href="http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/"&gt; http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Simon Davies, Why the idea of consent for data processing is becoming meaningless and dangerous, available at 			&lt;a href="http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/"&gt; http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy'&gt;https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Scott Mason</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-18T02:20:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/governance-now-pratap-vikram-singh-and-taru-bhatia-january-6-2015-will-india-win-net-neutrality-battle">
    <title>Will India win net neutrality battle?</title>
    <link>https://cis-india.org/internet-governance/news/governance-now-pratap-vikram-singh-and-taru-bhatia-january-6-2015-will-india-win-net-neutrality-battle</link>
    <description>
        &lt;b&gt;There is more than what meets the eye in Facebook’s ‘noble mission’ of providing internet for all.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Pratap Vikram Singh and Taru Bhatia was &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/will-india-win-net-neutrality-battle"&gt;published by Governance Now&lt;/a&gt; on January 5, 2016. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India is gearing up for an era of startups and entrepreneurship and the man pushing it as one of his biggest development and self reliance agenda is none other than prime minister Narendra Modi, who launched the ‘Startup India, Standup India’ campaign this year. Few technology giants, led by the likes of Facebook and some telecom service providers, however, have thrown a technology spanner. It is important to note that a significant number of the startups in India are internet-based – next only to the US and China in having maximum number of tech startups, according to industry body NASSCOM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For  these to flourish and for India to have next Facebook or Google it is  important to have an open and neutral internet, believe digital rights  experts. A network which doesn’t discriminate between the data packets  (smallest unit of information sent in binary format over a network) and  provides level playing field for all. “It is critical for the Startup  India campaign. If we let the principles of net neutrality be  compromised, then it makes it very difficult for entrepreneurs and  startups to compete against established players, who can close off the  market for upstarts by schemes like differentiated pricing and zero  rating (toll free access to websites or apps),” said Vishal Misra,  associate professor, department of computer science, Columbia  University.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A prerequisite for startups&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A few months from now, country’s telecom regulator, the Telecom Regulatory Authority of India (TRAI), is going to decide whether internet would remain neutral and whether it will continue to foster innovation. A major threat to net neutrality, according to civil society and digital rights experts, comes from zero rating – toll free access to a few selected websites or apps, a strategy adopted by internet service providers or internet platforms to hook users to those select few sites. For telecom and internet service providers zero rating is a new stream of revenue, a way to secure optimal return on investment from their existing subscriber base – without requiring additional investment. The ISPs are arguing that they should be given more flexibility in managing their network – in a way they should be allowed to assume the role of gatekeeper of the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For ISPs, net neutrality is an obsolete and utopian idea. Facebook, which has grown into a mammoth internet platform since its inception in 2004, has recently joined this bandwagon. Under its Free Basics initiative (erstwhile internet.org), the internet giant provides toll free access to a set of websites (including Facebook obviously!) handpicked by itself to the users. In India so far it has partnered with Reliance Communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook by far is the most audacious and aggressive proponent of ‘zero rating’ scheme. From lobbying the prime minister to giving back-to-back ads in television channels and two-page ads in national dailies to circulating a vaguely written letter in support of Free Basics on its social media site, Facebook is pitching for  ‘digital equality’ by giving access to 'basic internet’ or say a slice of the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cautioning against zero rating, Prabir Purkayastha, chairperson, Society for Knowledge Commons, said the way zero-rating is being discussed, it seems Indians are only the consumers of internet, which is not true. “Indians are also the innovators on internet,” said Purkayastha. “Internet has given the innovators the right to connect to the users without having a huge amount of money. This is the character that will be destroyed if zero-rating will be implemented,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That’s true. Be it US-based Facebook or Google or Indian Flipkart or PayTm or SnapDeal, had it not been for open and neutral internet they wouldn’t have become what are today.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raman Jit Singh Chima, global public policy director, Access Now, a New York-based firm working for digital rights, said the idea is to prevent a telco or an internet platform from assuming a role of a gatekeeper and control access. Misra, too, has written extensively on the counter-productiveness of zero rating: stifling of innovation and service providers loosing incentive to improve service and keep prices low. Both Misra and Chima testified their views on net neutrality to the standing committee on IT in August after the department of telecommunications submitted an expert committee report on the neutrality issue.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Whither public consultation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To formulate a regulation on how internet will shape up, the TRAI has come out with two consultation papers concerning net neutrality in the last nine months. The first consultation paper on ‘regulatory framework for over the top players (OTTs)’, which came in March, was written in favour of telecom and internet service providers. “It was embarrassing,” said Purkayastha. Over 1.2 million people wrote to the regulator. This was result of the savetheinternet.in campaign ran by free internet activists and lawyers, who were later joined by All India Bakchod (AIB) whose video on net neutrality went viral on YouTube (the video has received three million views in last eight months). This was unprecedented in the history of TRAI consultations. However, the fate of those responses is still unclear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In December the regulator brought another paper. This time it was titled ‘regulation on differential pricing’. Contrary to the initial paper, this paper is far more objective and reasonable, said Nikhil Pahwa, founder, MediaNama portal and a key volunteer behind savetheinternet.in campaign. The regulator has sought comments on its second paper by December 30 and counter-comments by January 7. Till the time a final call is taken, the telecom regulator has instructed Reliance Communications, Facebook’s India telecom partner, to put Free Basics on hold.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The savetheinternet.in campaign has formulated the responses to the new consultation paper and has made it available for everyone favouring net neutrality to send it to the TRAI. The AIB team has released another video titled ‘Save the Internet - 2 – Judgement Day’, which has been viewed close to one million times in just four months.&lt;br /&gt;&lt;br /&gt;The neutrality debate started in India in December 2014 when Airtel, country’s largest telco, announced – although it later backtracked – that the company would charge consumers more for using VOIP services, on top of the data charges. Later, it went on to launch Airtel Zero, wherein it struck deal with online services providers for user access at zero rate. Facebook had already introduced internet.org by then. While it was initially led by civil society, the debate was later joined by politicians – Naveen Patnaik, M Chandrashekhar, Jay Panda, Rahul Gandhi and Arvind Kejriwal – who strongly came out in support of net neutrality.  &lt;br /&gt;&lt;br /&gt;Facebook has termed its zero rating platform as a philanthropic activity intended to connect billions of unconnected population so that they can access education, health and employment related information. It has urged users to sign a petition, cautioning them against "a small, vocal group of critics" lobbying to prevent 1 billion people from accessing 'affordable internet'. Under Free Basics, Facebook claims, it doesn't charge app developers and includes them if they comply to its 'objective tech specs'.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Free Basics: A camouflage?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Critics, however, call it a walled garden. In providing free access to close to a hundred websites it continues to play the role of a gatekeeper. It is not the poor who decide what to access but Facebook! While it says that it is not making money out of Free Basics as it doesn't display ads in the Free Basics version of Facebook, it keeps the option of monetisation open in the future.&lt;br /&gt;&lt;br /&gt;“It [Free Basics] has been camouflaged as charity," said a senior TRAI official, in an off the record conversation. While speaking to the Guardian on Facebook’s zero rating in December, Tim Berners Lee, founder of world wide web (www), said, “In the particular case of somebody who's offering... something which is branded internet, it's not internet, then you just say no. No it isn't free, no it isn't in the public domain, there are other ways of reducing the price of internet connectivity and giving something... [only] giving people data connectivity to part of the network deliberately, I think is a step backwards.”&lt;br /&gt;&lt;br /&gt;Speaking in favour of zero rating, Payal Malik, associate professor, economics, Delhi University, said that it is wrong to assume that all consumers will get hooked to zero rated sites. “In a way you are saying that all humans have same preferences and likes and dislikes, which is very unlikely,” said Malik. &lt;br /&gt;&lt;br /&gt;Experts representing telecom industry argue that the net neutrality regulation should be geography specific and the telecom players should be given more flexibility in dealing with the network. Mahesh Uppal, a senior telecom consultant and director, ComFirst India, while speaking at a round table discussion in Delhi, said that a majority of population in the West including countries opting for strict net neutrality – including Netherlands, Slovenia and the US – are already connected. "The data connectivity is primarily through fixed lines - copper, co-ax cable or optical fibre wired — wherein it is easier to add capacity to meet traffic growth. However this is difficult to do so for wireless networks," said Uppal. In developing countries, including India, mobile telephony and internet majorly runs on wireless. Hence, he argued, telecom and internet service providers should be given flexibility to zero rate. For Uppal, if zero rating or sponsored content is implemented properly “it can be one of the ways to scale up internet access” to the unconnected regions.&lt;br /&gt;&lt;br /&gt;Neutrality proponents, however, differ. “It is basic economic theory, and zero rated sites get a price advantage. There are studies that show customers stay within the world of zero rated sites and never venture outside or are aware of the full internet,” professor Misra said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Zero or equal rating?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;So is there a middle ground? Are there ways to increase access without tampering with open and neutral character of the internet? Experts believe there are. Some of the solutions are not completely black and white, but in between. While there is a fierce opposition to zero rating, it might work, according to Sunil Abraham, executive director, centre for internet and society (CIS), if provided with an amount of equal rating (giving free data pack to users so that they can access any site or app they want). &lt;br /&gt;&lt;br /&gt;Mozilla Foundation advocates equal rating. The foundation has sought to create such an alternative in Bangladesh and countries in Africa within the Firefox OS ecosystem. The foundation has tied up with telecom operator Grameenphone in Bangladesh to provide 20 Mb data per day for free to users, in exchange for viewing an advertisement. The model could be easily replicated in India, said Pahwa of MediaNama.&lt;br /&gt;&lt;br /&gt;For African countries, the foundation has partnered with Orange. Both allow Africans to purchase $40 Firefox OS smartphones that come packaged with free three to six months of voice calling, text, and up to 500 Mb of monthly data. Purkayastha of Knowledge Commons said that zero-rating plan by telecom operators only makes sense when government services are provided for free through it. “That is the form of zero-rating I would support.”&lt;br /&gt;&lt;br /&gt;There are a few platforms which are reimbursing data in megabytes to users accessing partnering apps. The user can then use the free data pack to access any other site or app. Some of them include: mCent, Gigato and DataMi. mCent, owned by Boston-based firm Jana,  is a pioneer in this area. It is being used by 30 million users cross 98 countries. In India, according to Jana, one out of every 10 internet users has subscribed to mCent. &lt;br /&gt;&lt;br /&gt;Yes, it does violate neutrality as it puts those app providers not having enough money at a disadvantageous position vis-à-vis to those having deep pocket to reimburse data to users. “I think it’s a grey area,” said professor Misra. On the surface it seems to be just like Free Basics, however, Gigato (or mCent) is making no pretense that what they are doing is philanthropy of increasing access, said professor Misra, adding that it is still acceptable as user will have the data to venture out of the walled garden. The senior TRAI official too finds it acceptable. “In my opinion, Facebook should become like Gigato,” he said.    &lt;br /&gt;&lt;br /&gt;If the regulator is going to protect consumers’ right and also not stifle startups and entrepreneurism, it will have to ensure some broad, core principles of the internet. It will have to prevent both the ISPs and the internet platforms from becoming gatekeepers. It must not allow any throttling, blocking, fast and slow lanes, discrimination based on price or quality of service and distortion of level playing field. How and whether TRAI is going to do these would be clear in a few months.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/governance-now-pratap-vikram-singh-and-taru-bhatia-january-6-2015-will-india-win-net-neutrality-battle'&gt;https://cis-india.org/internet-governance/news/governance-now-pratap-vikram-singh-and-taru-bhatia-january-6-2015-will-india-win-net-neutrality-battle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-11T02:28:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/human-rights-in-the-age-of-digital-technology-a-conference-to-discuss-the-evolution-of-privacy-and-surveillance">
    <title>Human Rights in the Age of Digital Technology: A Conference to Discuss the Evolution of Privacy and Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/human-rights-in-the-age-of-digital-technology-a-conference-to-discuss-the-evolution-of-privacy-and-surveillance</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society organised a conference in roundtable format called ‘Human Rights in the Age of Digital Technology: A Conference to discuss the evolution of Privacy and Surveillance. The conference was held at Indian Habitat Centre on October 30, 2015. The conference was designed to be a forum for discussion, knowledge exchange and agenda building to draw a shared road map for the coming months.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In India, the Right to Privacy has been interpreted to mean an individual's’ right to be left alone. In the age of massive use of Information and Communications Technology, it has become imperative to have this right protected. The Supreme Court has held in a number of its decisions that the right to privacy is implicit in the fundamental right to life and personal liberty under Article 21 of the Indian Constitution, though Part III does not explicitly mention this right. The Supreme Court has identified the right to privacy most often in the context of state surveillance and introduced the standards of compelling state interest, targetted surveillance and oversight mechanism which have been incorporated in the forms of rules under the Indian Telegraph Act, 1885.  Of late, privacy concerns have gained importance in India due to the initiation of national programmes like the UID Scheme, DNA Profiling, the National Encryption Policy, etc. attracting criticism for their impact on the right to privacy. To add to the growing concerns, the Attorney General, Mukul Rohatgi argued in the ongoing Aadhaar case that the judicial position on whether the right to privacy is a fundamental right is unclear and has questioned the entire body of jurisprudence on right to privacy in the last few decades.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Participation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The roundtable saw participation from various civil society organisation such as Centre for Communication Governance, The Internet Democracy Project, as well as individual researchers like Dr. Usha Ramanathan and Colonel Mathew.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Introductions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vipul Kharbanda, Consultant, CIS made the introductions and laid down the agenda for the day. Vipul presented a brief overview of the kind of work of CIS is engaged in around privacy and surveillance, in areas including among others, the Human DNA Profiling Bill, 2014, the Aadhaar Project, the Privacy Bill and surveillance laws in India. It was also highlighted that CIS was engaged in work in the field of Big Data in light of the growing voices wanting to use Big Data in the Smart Cities projects, etc and one of the questions was to analyse whether the 9 Privacy Principles would still be valid in a Big Data and IoT paradigm.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Aadhaar Case&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Dr. Usha Ramanathan began by calling the Aadhaar project an identification project as opposed to an identity project. She brought up various aspects of project ranging from the myth of voluntariness, the strong and often misleading marketing that has driven the project, the lack of mandate to collect biometric data and the problems with the technology itself. She highlighted  inconsistencies, irrationalities and lack of process that has characterised the Aadhaar project since its inception. A common theme that she identified in how the project has been run was the element of ad-hoc-ness about many important decisions taken on a national scale and migrating from existing systems to the Aadhaar framework. She particularly highlighted the fact that as civil society actors trying to make sense of the project, an acute problem faced was the lack of credible information available. In that respect, she termed it as ‘powerpoint-driven project’ with a focus on information collection but little information available about the project itself. Another issue that Dr. Ramanathan brought up was that the lack of concern that had been exhibited by most people in sharing their biometric information without being aware of what it would be used, was in some ways symptomatic of they way we had begun to interact with technology and willingly giving information about ourselves, with little thought. Dr Ramanathan’s presentation detailed the response to the project from various quarters in the form of petitions in different high courts in India, how the cases were received by the courts and the contradictory response from the government at various stages. Alongside, she also sought to place the Aadhaar case in the context of various debates and issues, like its conflict with the National Population Register, exclusion, issues around ownership of data collected, national security implications and impact on privacy and surveillance. Aside from the above issues, Dr. Ramanathan also posited that the kind of flat idea of identity envisaged by projects like Aadhaar is problematic in that it adversely impacts how people can live, act and define themselves. In summation, she termed the behavior of the government as irresponsible for the manner in which it has changed its stand on issues to suit the expediency of the moment, and was particularly severe on the Attorney General raising questions about the existence of a fundamental right to privacy and casually putting in peril jurisprudence on civil liberties that has evolved over decades.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Colonel Mathew concurred with Dr. Ramanathan that the Aadhaar Project was not about identity but about identification. Prasanna developed on this further saying that while identity was a right unto the individual, identification was something done to you by others. Colonel Mathew further presented a brief history of the Aadhaar case, and how the significant developments over the last few years have played out in the courts. One of the important questions that Colonel Mathew addressed was the claim of uniqueness made by the UID project. He pointed to research conducted by Hans Varghese Mathew which analysed the data on biometric collection and processing released by the UID and demonstrated that there was a clear probability of a duplication in 1 out of every 97 enrolments. He also questioned the oft-repeated claim that UID would give identification to those without it and allow them to access welfare schemes. In this context, he pointed at the failures of the introducer system and the fact that only 0.03% of those registered have been enrolled through the introducer system. Colonel Mathew also questioned the change in stance by the ruling party, BJP which had earlier declared that the UID project should be scrapped as it was a threat to national security. According to him, the prime mover of the scheme were corporate interests outside the country interested in the data to be collected. This, he claimed created very serious risks to the national security. Prasanna further added to this point stating that while, on the face of it, some of the claims of threats to national security may sound alarmist in nature, if one were to critically study the manner in which the data had collected for this project, the concerns appeared justified.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Draft Encryption Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Amber Sinha, Policy Officer at CIS, made a presentation on the brief appearance of the Draft Encryption Policy which was released in October this year, and withdrawn by the government within a day. Amber provided an overview of the policy emphasising on clauses around limitations on kind of encryption algorithms and key sizes individuals and organisations could use and the ill-advised procedures that needed to be followed. After the presentation, the topic was opened for discussion. The initial part of the discussion was focussed on specific clauses that threatened privacy and could serve the ends of enabling greater surveillance of the electronic communications of individuals and organisations, most notably having an exhaustive list of encryption algorithms, and the requirement to keep all encrypted communication in plain text format for a period of 90 days. We also attempted to locate the draft policy in the context of privacy debates in India as well as the global response to encryption. Amber emphasised that while mandating minimum standards of encryption for communication between government agencies may be a honorable motive, as it is concerned with matters of national security, however when this is extended to private parties and involved imposes upward thresholds on the kinds of encryption they can use, it stems from the motive of surveillance. Nayantara, of The Internet Democracy Project, pointed out that there had been global push back against encryption by governments in various countries like US, Russia, China, Pakistan, Israel, UK, Tunisia and Morocco. In India also, the IT Act places limits on encryption. Her points stands further buttressed by the calls against encryption in the aftermath of the terrorist attacks in Paris last month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also intended to have a session on the Human DNA Profiling Bill led by Dr. Menaka Guruswamy. However, due to certain issues in scheduling and paucity of time, we were not able to have the session.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Questions Raised&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On Aadhaar, some of the questions raised included the question of  applicability of the Section 43A, IT Act rules to the private parties involved in the process. The issue of whether Aadhaar can be tool against corruption was raised by Vipul. However, Colonel Mathew demonstrated through his research that issues like corruption in the TPDS system and MNREGA which Aadhaar is supposed to solve, are not effectively addressed by it but that there were simpler solutions to these problems. &lt;br /&gt;&lt;br /&gt;Ranjit raised questions about the different contexts of privacy, and referred to the work of Helen Nissenbaum. He spoke about the history of freely providing biometric information in India, initially for property documents and how it has gradually been used for surveillance. He argued has due to this tradition, many people in India do not view sharing of biometric information as infringing on their privacy. Dipesh Jain, student at Jindal Global Law School pointed to challenges like how individual privacy is perceived in India, its various contexts, and people resorting to the oft-quoted dictum of ‘why do you want privacy if you have nothing to hide’. In the context, it is pertinent to mention the response of Edward Snowden to this question who said, “Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.” Aakash Solanki, researcher &lt;br /&gt;&lt;br /&gt;Vipul and Amber also touched upon the new challenges that are upon us in a world of Big Data where traditional ways to ensure data protection through data minimisation principle and the methods like anonymisation may not work. With advances in computer science and mathematics threatening to re-identify anonymized datasets, and more and more reliances of secondary uses of data coupled with the inadequacy of the idea of informed consent, a significant paradigm shift may be required in how we view privacy laws. &lt;br /&gt;&lt;br /&gt;A number of action items going forward were also discussed, where different individuals volunteered to lead research on issues like the UBCC set up by the UIDAI, GSTN, the first national data utility, looking the recourses available to individual where his data is held by parties outside India’s jurisdiction.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/human-rights-in-the-age-of-digital-technology-a-conference-to-discuss-the-evolution-of-privacy-and-surveillance'&gt;https://cis-india.org/internet-governance/blog/human-rights-in-the-age-of-digital-technology-a-conference-to-discuss-the-evolution-of-privacy-and-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-11T02:12:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/catchnews-january-6-2016-vidushi-marda-facebook-free-basics-gatekeeping-powers-extend-to-manipulating-public-discourse">
    <title>Facebook Free Basics: Gatekeeping Powers Extend to Manipulating Public Discourse</title>
    <link>https://cis-india.org/internet-governance/blog/catchnews-january-6-2016-vidushi-marda-facebook-free-basics-gatekeeping-powers-extend-to-manipulating-public-discourse</link>
    <description>
        &lt;b&gt;15 million people have come online through Free Basics, Facebook's zero rated walled garden, in the past year. "If we accept that everyone deserves access to the internet, then we must surely support free basic internet services. Who could possibly be against this?" asks Facebook founder Mark Zuckerberg, in a recent op-ed defending Free Basics.

&lt;/b&gt;
        &lt;p&gt;The article was published in Catchnews on January 6, 2015. For more info &lt;a class="external-link" href="http://www.catchnews.com/tech-news/facebook-free-basics-gatekeeping-powers-extend-to-manipulating-public-discourse-1452077063.html"&gt;click here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This rhetorical question however, has elicited a plethora of answers. The network neutrality debate has accelerated over the past few weeks with the Telecom Regulatory Authority of India (TRAI) releasing a consultation paper on differential pricing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While notifications to "Save Free Basics in India" prompt you on Facebook, an enormous backlash against this zero rated service has erupted in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/FreeBasics.png" alt="Free Basics" class="image-inline" title="Free Basics" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy objectives that must guide regulating net neutrality are consumer choice, competition, access and openness. Facebook claims that Free Basics is a transition to the full internet and digital equality. However, by acting as a gatekeeper, Facebook gives itself the distinct advantage of deciding what services people can access for free by virtue of them being "basic", thereby violating net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amidst this debate, it's important to think of the impact Facebook can have on manipulating public discourse. In the past, Facebook has used it's powerful News Feed algorithm to significantly shape our consumption of information online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July 2014, Facebook researchers revealed that for a week in January 2012, it had altered the news feeds of 689,003 randomly selected Facebook users to control how many positive and negative posts they saw. This was done without their consent as part of a study to test how social media could be used to spread emotions online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Their research showed that emotions were in fact easily manipulated. Users tended to write posts that were aligned with the mood of their timeline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another worrying indication of Facebook's ability to alter discourse was during the ALS Ice Bucket Challenge in July and August, 2014. Users' News Feeds were flooded with videos of individuals pouring a bucket of ice over their head to raise awareness for charitable cause, but not entirely on its merit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The challenge was Facebook's method of boosting its native video feature which was launched at around the same time. Its News Feed was mostly devoid of any news surrounding riots in Ferguson, Missouri at the same time, which happened to be a trending topic on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each day, the news feed algorithm has to choose roughly 300 posts out of a possible 1500 for each user, which involves much more than just a random selection. The posts you view when you log into Facebook are carefully curated keeping thousands of factors in mind. Each like and comment is a signal to the algorithm about your preferences and interests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amount of time you spend on each post is logged and then used to determine which post you are most likely to stop to read. Facebook even keeps into account text that is typed but not posted and makes algorithmic decisions based on them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also differentiates between likes - if you like a post before reading it, the news feed automatically assumes that your interest is much fainter as compared to liking a post after spending 10 minutes reading it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook believes that this is in the best interest of the user, and these factors help users see what he/she will most likely want to engage with. However, this keeps us at the mercy of a gatekeeper who impacts the diversity of information we consume, more often than not without explicit consent. Transparency is key.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(Vidushi Marda is a programme officer at the Centre for Internet and Society)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/catchnews-january-6-2016-vidushi-marda-facebook-free-basics-gatekeeping-powers-extend-to-manipulating-public-discourse'&gt;https://cis-india.org/internet-governance/blog/catchnews-january-6-2016-vidushi-marda-facebook-free-basics-gatekeeping-powers-extend-to-manipulating-public-discourse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    

   <dc:date>2016-01-09T13:43:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing">
    <title>Nasscom wants board to protect Net neutrality, regulate pricing </title>
    <link>https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing</link>
    <description>
        &lt;b&gt;The debate against differential pricing of data services at the cost of net neutrality doesn’t seem to be getting over yet. While internet activists have gone out on streets in Bengaluru and Hyderabad to protest in favour of net neutrality, industry experts believe that differential pricing, when regulated could be tailored for public interest.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shadma Shaikh was &lt;a class="external-link" href="http://www.asianage.com/technomics/nasscom-wants-board-protect-net-neutrality-regulate-pricing-454"&gt;published in Asian Age&lt;/a&gt; on January 7, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Given the current situation of low internet and broadband penetration along with lower levels of digital literacy and limited local language support in the country, IT industry body Nasscom said that protection of net neutrality is essential to fight these monumental challenges that require continuous innovation, both in technology solutions and business models.&lt;br /&gt;&lt;br /&gt;“We strongly oppose any model where TSPs or their partners have a say or discretion in choosing content that is made available at favourable rates, speed,” Nasscom President R. Chandrashekhar said in a statement.&lt;br /&gt;&lt;br /&gt;However, Nasscom also suggested a suitable oversight mechanism in the form of “an independent not-for-profit entity with an independent board to manage proposed differential pricing programs that are deemed to be in the public interest and are philanthropic in nature.”&lt;br /&gt;&lt;br /&gt;In view of regulator Trai’s proposal to question the fairness of zero-rating—a practice of not counting certain traffic towards a subscriber's regular Internet usage, Pranesh Prakash, Centre for Internet and Society said, all forms of zero-rating result in some form of discrimination, but not all zero-rating is harmful, nor does all zero-rating need to be prohibited.&lt;br /&gt;&lt;br /&gt;Prakash says that Trai’s paper has been inappropriately reduced to a referendum, by both parties—supporters of differential pricing programme as well as internet activists fighting zero-rating. Content-agnostic zero-rating models are not harmful, he says, adding “some traffic, such as government or public interest sites could be made free.”&lt;br /&gt;&lt;br /&gt;Facebook’s Free Basics app that aims to provide ‘free Internet access’ to users who cannot afford data packs, has run into trouble for being against net neutrality principle. Trai, while evaluating the zero-rating proposal has asked Reliance Communications, the official telecom partner for Free Basics to put the service on hold.&lt;br /&gt;&lt;br /&gt;After drawing flak from critics and citizens over its Free Basics program and its extensive advertisement in the media and on Facebook itself to influence the decision of Trai in favour of zero-rating program, Zuckerberg reached out to Indian readers through an opinion piece he published in an Indian daily newspaper.&lt;br /&gt;&lt;br /&gt;Facebook’s justification for Free Basics lies in comparing internet as a service similar to education and healthcare. Free schools, free libraries and public hospitals may not provide the best of services, but their existence is essential to cater to a large set of audience who cannot afford expensive healthcare or education. In the same way, says Facebook founder Mark Zuckerberg, everyone deserves access to free basic internet service.&lt;br /&gt;&lt;br /&gt;Calling Facebook’s Free Basics programme as an illusion, Nikhil Pahwa, founder MediaNama and volunteer at savetheinternet.in said “Facebook’s Free Basics is not free internet.” The choice to determine what data or content to browse should be left to the internet users, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing'&gt;https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-31T09:25:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/indian-express-december-31-2015-facebook-free-basics-vs-net-neutrality-the-top-arguments-in-the-debate">
    <title>Facebook Free Basics vs Net Neutrality: The top arguments in the debate</title>
    <link>https://cis-india.org/internet-governance/news/indian-express-december-31-2015-facebook-free-basics-vs-net-neutrality-the-top-arguments-in-the-debate</link>
    <description>
        &lt;b&gt;On Twitter, there's a whole conversation around Facebook Free Basics and whether zero-rating platforms should be allowed in India. Here's a look at the debate.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/facebook-free-basics-debate-the-arguments-that-are-unfolding-on-twitter/"&gt;published in the Indian Express&lt;/a&gt; on December 31, 2015. Sunil Abraham and Pranesh Prakash were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s Free Basics app, which aims to provide ‘free Internet access’ to users who can’t afford data packs, has run into trouble in India over the last two weeks. After regulator TRAI issued a paper questioning the fairness of zero-rating platforms, it also asked Reliance Communications (the official telecom partner for Free Basics) to put the service on hold.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook on its part has gone for an aggressive campaign, both online and offline, to promote Free Basics and ensure that its platform is not banned permanently. For Net Neutrality activists, zero-rating platforms are in violation of the principle as it restricts access to free, full Internet for users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Twitter too, there’s a serious debate unfolding around Free Basics and whether zero-rating platforms should be allowed in India. Here’s a look at some of the prominent voices around this Net Neutrality vs Free Basics debate.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Watch our video&lt;/h3&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/Y6vXJNVUDug" width="560"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p id="stcpDiv" style="text-align: justify; "&gt;Nikhil Pahwa, founder of news website MediaNama, has been campaigning for quite some time against zero-rating platforms in general and Net Neutrality. On Twitter, Pahwa points out that the problem with the zero-rating apps is that it gives telecos right to play kingmaker, and get into a direct relationship between a website and a user.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pahwa also wrote a counter-blog to Mark Zuckerberg’s &lt;a href="http://blogs.timesofindia.indiatimes.com/toi-edit-page/its-a-battle-for-internet-freedom/"&gt;column in The Times of India &lt;/a&gt; questioning why Facebook is going with this restricted version of the  web on Free Basics, rather than giving access to all websites.&lt;/p&gt;
&lt;p&gt;He posted recently on Twitter, “Why hasn’t Facebook tried any model other than on which gives it a competitive advantage?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pahwa adds, “With zero rating, telcos insert themselves into a previously direct relationship between a site and user. Some sites made cheaper versus others. Said it earlier, saying it again. Problem with zero rating is that it gives telcos the right to play kingmaker through pricing. So  Net Neutrality battle isn’t just about Facebook. It’s about telcos lobbying for differential pricing+revenue share from Internet companies.”&lt;/p&gt;
&lt;div id="stcpDiv"&gt;Check  out &lt;a class="external-link" href="http://twitter.com/nixxin/status/681731772682354688"&gt;some of this tweets on the issue of Net Neutrality&lt;/a&gt;:&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, the director for policy at Centre for Internet and Society (CIS) in Bangalore, has said that a total ban might not be the ideal solution and one should look at the platforms on a case by case basis.&lt;br /&gt;&lt;br /&gt;He writes on Twitter, “My position: We should ban some zero-rating, allow some zero-rating, and deal w/ middle category either w/ +ve obligation or case-by-case. I’m all for banning Free Basics if it harms people more than it benefits them. I’ve even proposed tests for determining this. The regulator needs more data on a) conversion rates to full-Internet; b) cost of subsidy &amp;amp; c) QoE (speed, etc.) of Free Basics.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Check out Pranesh's tweets below&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/P1.png" alt="Pranesh Tweet" class="image-inline" title="Pranesh Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_P2.png" alt="Pranesh Tweet" class="image-inline" title="Pranesh Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/P3.png" alt="Pranesh Tweet" class="image-inline" title="Pranesh Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director at Centre for Internet and Society, has however questioned Free Basics on Twitter. He also posted counter-points to Pranesh’s tweets about data on conversion being used to create regulations around zero-ratings. He’s also called for a ban on Free Basics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Check out his tweets below&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/P4.png" alt="Pranesh Tweet" class="image-inline" title="Pranesh Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/P5.png" alt="Pranesh Tweet" class="image-inline" title="Pranesh Tweet" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/indian-express-december-31-2015-facebook-free-basics-vs-net-neutrality-the-top-arguments-in-the-debate'&gt;https://cis-india.org/internet-governance/news/indian-express-december-31-2015-facebook-free-basics-vs-net-neutrality-the-top-arguments-in-the-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2016-01-07T02:26:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services">
    <title>Nasscom against differential pricing for data services</title>
    <link>https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services</link>
    <description>
        &lt;b&gt;The National Association of Software and Services Companies says it should be the regulator that decides on such content, not firms.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Consumer/j1P4yZ3brS4Ttk6kUqy1QJ/Nasscom-against-differential-pricing-for-data-services.html"&gt;published in Livemint &lt;/a&gt;on January 5, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India’s top software lobby on Monday said if select web content needs  to be provided cheaper for some Indians, it must be the regulator that  decides on such content, not companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its response to a consultation paper by the Telecom Regulatory  Authority of India (Trai) on differential pricing for data usage, the  National Association of Software and Services Companies (Nasscom)  objected to plans such as Free Basics and Airtel Zero where companies  choose content to be provided at different speeds and prices, but backed  powers for the regulator to allow such a model if the regulator deems  they are in “public interest”, while adhering to principles of net  neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We strongly oppose any model where telecom service providers (TSPs)  or their partners have a say or discretion in choosing content that is  made available at favourable rates, speed... any differential pricing by  TSP either directly such as Airtel Zero or indirectly as in the case of  Free Basics through a platform provider which limits access to the  internet services or websites (selected by the TSP or by the partners)  violate the idea of net neutrality,” said R. Chandrashekhar, president,  Nasscom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But when we recognize the reality of India as a country which has  low internet penetration and even lower broadband penetration, apart  from low levels of digital literacy and limited local language  content... there may be a need to provide certain services in public  interest at differential or lower prices which the regulator feels are  necessary,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Therefore, it is important that the regulator should have the power  to allow differential pricing for certain types or classes of services  that are deemed to be in public interest and based on mandatory prior  approvals,” he said. “Any such programmes should abide by the principles  of net neutrality and not constrain innovation in any way and not  constrain innovation in any way.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Differential pricing for data usage means offering services at  different price points to different users. However, analysts say it  could lead to an anti-competitive environment, hurting small companies  and start-ups, while giving the TSPs and their partner platforms  near-monopolistic access to the vast amount of user data that has  potential commercial value in a country such as India where privacy laws  are not strong.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Differential pricing is a significant aspect of the net neutrality  debate that erupted in India in 2015, when Trai released a consultation  paper in April. Soon, telecom operator Bharti Airtel Ltd launched Zero, a  marketing platform that allows customers to access mobile applications  for free but charges the application providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s Free Basics service (the new name for Internet.org) aims  to offer people without the Internet free access to a handful of  websites and a range of services through mobile phones, which net  neutrality activists say will violate the core principle that everyone  should have unrestricted access to Internet and it should not be  regulated by a company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the outrage, Trai put Free Basics on hold, asking Reliance  Communications Ltd to furnish the detailed terms and conditions of its  Free Basics service. The next step will be announced later this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an op-ed in the &lt;i&gt;Times of India&lt;/i&gt; last week, Nandan Nilekani,  co-founder of Infosys Ltd. and former chairman of Unique Identification  Authority of India, publicly criticized Facebook’s Free Basics, calling  it a walled garden.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The walled garden of Free Basics goes against the spirit of openness  on the internet, and in the guise of being pro-poor, balkanises it.  Only Free Basics-approved websites will be accessible for free,” he said  in the article which he co-authored with Viral Shah who led the design  of government’s subsidy platforms using Aadhaar. “In theory, anyone  meeting the technical guidelines today can participate. However,  services that may potentially compete with telco offerings may not join  Free Basics. Since Facebook does not currently subsidise free usage,  telcos will have to foot the bill by raising prices.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said schemes such as direct benefit transfer for Internet data  packs would be better compared to programmes such as Free Basics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nasscom, in its response, recommended “mandatory prior approval of  such services by the regulator and sharing of periodic information on  tariff plans seek to lower the price as well as zero rating services,”  adding that these programmes should abide by the principle of net  neutrality, meaning it should not limit consumers access to pre-defined  set of services or websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Any such differential pricing programs should have explicit approval  of the regulator—and should be deemed to be in the public interest and  the onus of proving it to be in the public interest in the first  instance would be on service provider and before Trai arrives at a final  decision a public consultation is also advised because of the dangers  involved,” Nasscom said. “Even after the approval, suitable oversight  mechanism should be maintained by the regulator in all such case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at the Centre for Internet and  Society (CIS), said Nasscom’s approach to make differential pricing  plans and options as an exception rather than the rule was quite  reasonable. “It says that if differential pricing services adhere to the  guidelines of being non-discriminatory, non-anti-competitive,  non-predatory, non-ambiguous and transparent, they can be allowed under  the supervision of the regulator, which is similar to the position  adopted by CIS,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Though some of their positions are ambiguous—for instance what they  mean by non-discriminatory, and whether they are okay with differential  pricing between classes of applications, are unclear—and some of their  recommendations increase regulatory complexity, such as their proposal  for independent not-for-profit entities with independent boards to own  and manage such differential pricing programs, by and large it is a  useful submission,” Prakash added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services'&gt;https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    

   <dc:date>2016-01-06T15:12:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision">
    <title>Zuckerberg's India Backlash Imperils Free Global Web Vision</title>
    <link>https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision</link>
    <description>
        &lt;b&gt;When Facebook's co-founder proposed bringing free Web services to India, his stated aim was to help connect millions of impoverished people to unlimited opportunity. Instead, critics have accused him of making a poorly disguised land grab in India's burgeoning Internet sector. The growing backlash could threaten the very premise of Internet.org, his ambitious, two-year-old effort to connect the planet.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Bhuma Shrivastava was &lt;a class="external-link" href="http://www.ndtv.com/india-news/foreign-media-on-zuckerbergs-india-backlash-1260732"&gt;published by NDTV&lt;/a&gt; on January 4, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Indian authorities are circumspect because the Facebook initiative  provides access to only a limited set of websites -- undermining the  equal-access precepts of net neutrality. The telecommunications  regulator is calling for initial comments by Jan 7, extending the  deadline from today, on whether wireless carriers can charge differently  for data usage across websites, applications and platforms.&lt;br /&gt;&lt;br /&gt; Losing this fight could imperil Facebook's Free Basics, which allows  customers to access the social network and select services such as  Messenger and Microsoft's Bing without a data plan.&lt;br /&gt;&lt;br /&gt;"The  India fight is helping shape debates elsewhere," said Pranesh Prakash,  policy director at the Centre for Internet and Society, a  Bangalore-based non-profit advocacy group. "Activists in other countries  such as Brazil, Venezuela and Colombia are watching this debate and  will seize the momentum created in India."&lt;br /&gt;&lt;br /&gt; Zuckerberg's argument for free Web access is based in part on Deloitte  research showing that for every 10 people who are connected to the Web,  one is lifted out of poverty and one job is created.&lt;br /&gt;&lt;br /&gt; Facebook argues that by giving people free access to a small slice of  the Internet, they will quickly see the value in paying for the whole  thing. Zuckerberg has said his biggest challenge in connecting people to  the Web isn't access to cellular networks, but a social hurdle: he  needs to prove to people who have never been online that the Internet is  useful.&lt;br /&gt;&lt;br /&gt; "Who could possibly be against this?" Zuckerberg wrote in an impassioned  op-ed in the Times of India this week. "Surprisingly, over the last  year there's been a big debate about this in India."&lt;br /&gt;&lt;br /&gt; Zuckerberg's pleas underscore what's at stake. Facebook already attracts  1.55 billion people monthly, or about half of the Internet-connected  global population. To keep growing, the world's largest social network  needs to get more people online. Hence the billions of dollars Facebook  is spending on projects to deliver the Web to under-served areas via  drones, satellites and lasers. And Internet.org, which now spans 37  nations.&lt;br /&gt;&lt;br /&gt; India, as the world's second most populous nation, is arguably the most  important piece of Zuckerberg's Free Basics strategy. But the opposition  is fierce. Critics note that the Facebook service doesn't offer Web  favorites such as Google's search. Facebook has said it would be open to  adding more features from competitors, but critics are skeptical of  giving the social-networking giant such influence on the Internet.&lt;br /&gt;&lt;br /&gt; Critics also say that by offering a limited swath of the Internet at  comparatively slow speeds, the company is creating a diluted version of  the Web. That could stifle innovation by causing disadvantages for  Indian startups building rival apps, or allow Facebook and its  telecommunications carrier-partners to act as Internet gatekeepers.&lt;br /&gt;&lt;br /&gt; In a sign of the importance he attaches to the issue, Zuckerberg on  Tuesday called one of India's most prominent entrepreneurs to make his  case.&lt;br /&gt;&lt;br /&gt; One97 Communications, the mobile payments startup backed by Alibaba  Group Holding, is one of several tech companies that have come out  against Facebook's plans.&lt;br /&gt;&lt;br /&gt; "We are totally against telcos preferring one developer over another,"  One97 founder Vijay Shekhar Sharma said in a phone interview before that  call. "We are asking for access neutrality. We are hoping that all  startups will be treated equally."&lt;br /&gt;&lt;br /&gt; Sonia Dhawan, a spokeswoman for One97's payment website Paytm, said the  call took place but didn't describe the conversation further. Sharma  wasn't available for further comment.&lt;br /&gt;&lt;br /&gt; Facebook is now scrambling to drum up support. It's started a "Save Free  Basics In India" campaign, asking Indian users to support "digital  equality" by filling out a form that shoots an e-mail to regulators.  That also has the effect of sending notifications to user's friends  unless they opt out.&lt;br /&gt; Facebook has also taken out full-page advertisements, including one  featuring a smiling Indian farmer and his family who the ads say used  new techniques to double his crop yield.&lt;br /&gt;&lt;br /&gt; While countries such as the Philippines have embraced Free Basics, India  has been "the outlier and more challenging," Chris Daniels, vice  president of Internet.org, said in a Dec. 26 chat on Reddit.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision'&gt;https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-06T14:51:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh">
    <title>Reply to RTI Application under RTI Act of 2005 from Vanya Rakesh</title>
    <link>https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh</link>
    <description>
        &lt;b&gt;Unique Identification Authority of India replied to the RTI application filed by Vanya Rakesh. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Madam,&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Please refer to your RTI application dated 3.12.2015 received in the Division on 10.12.2015 on the subject mentioned above requesting to provide the information in electronic form via the email address vanya@cis-india.org, copies of the artwork in print media released by UIDAI to create awareness about use of Aadhaar not being mandatory.&lt;/li&gt;
&lt;li&gt;I am directed to furnish herewith in electronic form, copy of the artwork in print media released / published in the epapers edition of the Times of India and Dainik Jagran in their respective editions of dated 29.8.2015 in a soft copy, about obtaining of Aadhaar not being mandatory for a citizen, as desired.&lt;/li&gt;
&lt;li&gt;In case, you want to go for an appeal in connection with the information provided, you may appeal to the Appellate Authority indicated below within thirty days from the date of receipt of this letter.&lt;br /&gt;Shri Harish Lal Verma,&lt;br /&gt;Deputy Director (Media),&lt;br /&gt;Unique Identification Authority of India&lt;br /&gt;3nd Floor, Tower – II, Jeevan Bharati Building,&lt;br /&gt;New Delhi – 110001.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Yours faithfully,&lt;br /&gt;&lt;br /&gt;(T Gou Khangin)&lt;br /&gt;Section Officer &amp;amp; CPIO Media Division&lt;br /&gt;&lt;br /&gt;Copy for information to: Deputy Director (Establishment) &amp;amp; Nodal CPIO&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Below scanned copies:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;RTI Reply&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/RTIReplytoSh.VanyaRakesh.jpg" alt="RTI Reply" class="image-inline" title="RTI Reply" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Coverage in Dainik Jagran&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/DainikJagran29.08.2015.png" alt="Dainik Jagran" class="image-inline" title="Dainik Jagran" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/uid-ad" class="internal-link"&gt;Download the coverage in the Times of India here&lt;/a&gt;&lt;/b&gt;. Read the earlier blog entry &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh'&gt;https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-13T02:40:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook2019s-free-basics-shuts-down-in-egypt-continuing-troubled-run">
    <title>Facebook’s Free Basics Shuts Down In Egypt, Continuing Troubled Run</title>
    <link>https://cis-india.org/internet-governance/news/facebook2019s-free-basics-shuts-down-in-egypt-continuing-troubled-run</link>
    <description>
        &lt;b&gt;The report was published by TV Newsroom on January 1, 2016. Pranesh Prakash gave inputs.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;“This isn’t about &lt;a href="https://www.facebook.com/Internetdotorg/videos/vb.475509262545134/913670072062382/?type=2&amp;amp;theater" target="_blank"&gt;Facebook’s&lt;/a&gt; commercial interests – there aren’t even any ads in the version of &lt;b&gt;Facebook&lt;/b&gt; in Free Basics”, he said. Initiatives like &lt;a href="https://translate.googleusercontent.com/translate_c?depth=1&amp;amp;hl=fr&amp;amp;rurl=translate.google.com&amp;amp;sl=fr&amp;amp;tl=en&amp;amp;u=http://www.afriqueitnews.com/category/internet/&amp;amp;usg=ALkJrhhRqQgR9oKwRK4guZQx_5CiK7kVgg"&gt;Internet&lt;/a&gt;.org  are attempting to change that, but not without backlash. A similar  proposal called zero internet was put forward later by Airtel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Facebook&lt;/b&gt; now has a Zacks Rank #2 (Buy).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The &lt;a href="http://www.financialexpress.com/article/industry/companies/mobile-powers-e-tail-unicorns-and-more-best-is-yet-to-come/184754/" target="_blank"&gt;India&lt;/a&gt; fight is helping shape debates elsewhere”, said Pranesh Prakash, policy  director at the Centre for Internet and Society, a Bangalore-based  nonprofit advocacy group.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That prompted &lt;b&gt;Facebook&lt;/b&gt; CEO Mark Zuckerberg to write &lt;a href="http://blogs.timesofindia.indiatimes.com/toi-edit-page/free-basics-protects-net-neutrality/"&gt;an op-ed piece published in the Times of India&lt;/a&gt; that asks, “Who could possibly be against this?” There was fulsome praise for Modi from the young internet billionaire. &lt;a href="http://www.etisalat.eg/etisalat/portal/freebasics_en"&gt;Etisalat Egypt&lt;/a&gt; could not be reached for comment at this time. “For example, &lt;b&gt;Facebook&lt;/b&gt; can just provide 50 or 100 megabytes for their data connection free every month”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, Trai &lt;a class="local_link" href="http://gadgets.ndtv.com/internet/news/net-neutrality-paper-trai-to-extend-deadline-for-comments-to-january-7-783899"&gt;extended the last date&lt;/a&gt; for submission of comments and counter comment to 7 and 14 January, respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Zuckerberg is not having a walk in the park with this &lt;b&gt;Free Basics&lt;/b&gt; proposition. It sounds a perfectly good idea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet.org is a partnership, led by &lt;b&gt;Facebook&lt;/b&gt; and including Samsung, Ericsson, MediaTek, Opera, Nokia and Qualcomm. Through a deal between &lt;b&gt;Facebook&lt;/b&gt; and local mobile operators, the data to &lt;a href="http://time.com/4157435/isis-isil-egypt-sinai/?xid=time_socialflow_twitter" target="_blank"&gt;access&lt;/a&gt; those services is free.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The coalition has said that &lt;b&gt;Facebook&lt;/b&gt; is misleading  users and cautioned that the free service could be replete with  advertising if and when it’s implemented. Similarly, signature drives  are going on by those staunchly opposed to it. Now the problem for this  is that we had asked for response to the specific question of  differential pricing… instead we have got responses on supporting &lt;b&gt;Free Basics&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those campaigning to protect net neutrality in India suggest data  providers should not favour some online services over others by offering  cheaper or faster access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The founders and executives mention that the difference in pricing  through zero rating “affects the ability of new players to compete” with  well-established companies. A situation where the haves can access the  Internet and enjoy its tremendous opportunities and the have nots are  kept out. Zuckerberg said that India’s progress depends on providing Web  access to the 1 billion Indians without it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Listing three main flaws within the programme, the scientists urged  the Telecom Regulatory Authority of India to “completely reject” &lt;b&gt;Facebook’s&lt;/b&gt; “free fundamentals” proposal. Such as providing a tiered system of broad band access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would make sense for the government to target free &lt;a class="local_link" href="http://www.valuewalk.com/2015/12/facebook-free-basics-net-neutrality/"&gt;Internet services&lt;/a&gt; while it clamps down on physical gathering places.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="http://tvnewsroom.org/newslines/science/facebook-s-free-basics-shuts-down-in-egypt-continuing-troubled-run-67130/"&gt;Read the original here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook2019s-free-basics-shuts-down-in-egypt-continuing-troubled-run'&gt;https://cis-india.org/internet-governance/news/facebook2019s-free-basics-shuts-down-in-egypt-continuing-troubled-run&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-03T06:11:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deccan-herald-january-3-2016-sunil-abraham-free-basics-negating-net-parity">
    <title>Free Basics: Negating net parity</title>
    <link>https://cis-india.org/internet-governance/blog/deccan-herald-january-3-2016-sunil-abraham-free-basics-negating-net-parity</link>
    <description>
        &lt;b&gt;Researchers funded by Facebook were apparently told by 92 per cent of Indians they surveyed from large cities, with Internet connection and college degree, that the Internet “is a human right and that Free Basics can help bring Internet to all of India.” What a strange way to frame the question given that the Internet is not a human right in most jurisdictions.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.deccanherald.com/content/520860/free-basics-negating-net-parity.html"&gt;Deccan Herald&lt;/a&gt; on January 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Free Basics is gratis service offered by Facebook in partnership with  telcos in 37 countries. It is a mobile app that features less than a 100  of the 1 billion odd websites that are currently available on the WWW  which in turn is only a sub-set of the Internet. Free Basics violates  Net Neutrality because it introduces an unnecessary gatekeeper who gets  to decide on “who is in” and “who is out”. Services like Free Basics  could permanently alienate the poor from the full choice of the Internet  because it creates price discrimination hurdles that discourage those  who want to leave the walled garden.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inika Charles and Arhant Madhyala, two interns at Centre for Internet  and Society (CIS), surveyed 1/100th of the Facebook sample, that is, 30  persons with the very same question at a café near our office in  Bengaluru. Seventy per cent agreed with Facebook that the Internet was a  human right but only 26 per cent thought Free Basics would achieve  universal connectivity. My real point here is that numbers don’t matter.  At least not in the typical way they do. Facebook dismissed Amba Kak’s  independent, unfunded, qualitative research in Delhi, in their second  public rebuttal, saying the sample size was only 20.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That was truly ironical. The whole point of her research was the  importance of small numbers. Kak says, “For some, it was the idea of an  ‘emergency’ which made all-access plans valuable.” A respondent stated:  “But maybe once or twice a month, I need some information which only  Google can give me... like the other day my sister needed to know  results to her entrance exams.” If you consider that too mundane, take a  moment to picture yourself stranded in the recent Chennai flood. The  statistical rarity of a Black Swan does not reduce its importance. A  more neutral network is usually a more resilient network. When we do  have our next national disaster, do we want to be one of the few  countries on the planet who, thanks to our flawed regulation, have ended  up with a splinternet?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecom Regulatory Authority of India (Trai) chairman R S Sharma rightly  expressed some scepticism around numbers when he said “the consultation  paper is not an opinion poll.” He elaborated: “The issue here is some  sites are being offered to one person free of cost while another is  paying for it. Is this a good thing and can operators have such powers?”  Had he instead asked “Is this the best option?” my answer would be  “no”. Given the way he has formulated the question, our answer is a  lawyerly “it depends”. The CIS believes that differential pricing should  be prohibited. However, it can be allowed under certain exceptional  standards when it is done in a manner that can be justified by the  regulator against four axes of sometimes orthogonal policy objectives.  They are increased access, enhanced competition, increased user choice  and contribution to openness. For example, a permanent ban on Free  Basics makes sense in the Netherlands but regulation may be sufficient  for India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Gatekeeping powers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To the second and more important part to Trai chairman’s second question on gatekeeping powers of operators, our answer is a simple “no”. But then, do we have any evidence that gatekeeping powers have been abused to the detriment of consumer and public interest? No. What do we do when we cannot, like Russell’s chicken, use induction to explain our future? Prof Simon Wren-Lew says, “If Bertrand Russell’s chicken had been an economist ...(it would have)... asked a crucial additional question: Why is the farmer doing this? What is in it for him?” There were five serious problems with Free Basics that Facebook has at least partially fixed, thanks mostly to criticism from consumers in India and Brazil. One, exclusivity with access provider; two, exclusivity with a set of web services; three, lack of transparency regarding retention of personal information; four, misrepresentation through the name of the service, Internet.org and five, lack of support for encrypted traffic. But how do we know these problems will stay fixed? Emerging markets guru Jan Chipchase tweeted asking “Do you trust Facebook? Today? Tomorrow? When its share price is under pressure and it wants to wring more $$$ from the platform?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zero. Facebook pays telecom operators zero. The operators pay Facebook zero. The consumers pay zero. Why do we need to regulate philanthropy? Because these freebies are not purely the fruit of private capital. They are only possible thanks to an artificial state-supported oligopoly dependent on public resources like spectrum and wires (over and under public property). Therefore, these oligopolies much serve the public interest and also ensure that users are treated in a non-discriminatory fashion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also provision of a free service should not allow powerful corporations to escape regulation–in jurisdictions like Brazil it is clear that Facebook has to comply with consumer protection law even if users are not paying for the service. Given that big data is the new oil, Facebook could pay the access provider in advertisements or manipulation of public discourse or by tweaking software defaults such as autoplay for videos which could increase bills of paying consumers quite dramatically.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India needs a Net Neutrality regime that allows for business models and technological innovation as long as they don’t discriminate between users and competitors. The Trai should begin regulation based on principles as it has rightly done with the pre-emptive temporary ban. But there is a need to bring “numbers we can trust” to the regulatory debate. We as citizens need to establish a peer-to-peer Internet monitoring infrastructure across mobile and fixed lines in India that we can use to crowd source data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(The writer is Executive Director, Centre for Internet and Society,  Bengaluru. He says CIS receives about $200,000 a year from WMF, the  organisation behind Wikipedia, a site featured in Free Basics and  zero-rated by many access providers across the world)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deccan-herald-january-3-2016-sunil-abraham-free-basics-negating-net-parity'&gt;https://cis-india.org/internet-governance/blog/deccan-herald-january-3-2016-sunil-abraham-free-basics-negating-net-parity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-03T05:58:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2015-bulletin">
    <title>December 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2015-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of December 2015 is below.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) is happy to share the twelfth issue of CIS newsletter (December 2015). Previous editions of the newsletter can 	be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;Highlights&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/press-release-india-to-host-4th-global-congress-on-intellectual-property-and-the-public-interest"&gt;4th edition of the Global Congress&lt;/a&gt; themed around "Three Decades of Openness, Two Decades of TRIPS" was 	 organized in New Delhi from December 15 - 17, 2015. The largest ever in  Asia, the Congress was jointly organised by CIS, NLU-D, Open A.I.R.,  CREATe, 	Columbia University and American University.&lt;/li&gt;
&lt;li&gt;Nehaa Chaudhari &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/4th-global-congress-on-ip-and-the-public-interest-statement-of-conclusion-for-the-ip-and-development-track"&gt;summarized the developments of the 4th Global Congress on IP and the Public Interest in a blog post&lt;/a&gt; that was originally published on the Global Congress blog.&lt;/li&gt;
&lt;li&gt;Sunil Abraham wrote a blog entry stating the	&lt;a href="http://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"&gt;institutional position of CIS on the Net Neutrality&lt;/a&gt; discussion 	going on in India.&lt;/li&gt;
&lt;li&gt;Catch News interviewed Sunil Abraham about the recent advertisement by Facebook titled 	&lt;a href="http://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them"&gt; "What Net Neutrality Activists won't Tell You or, the Top 10 Facts about Free Basics" &lt;/a&gt; . Sunil argued against the validity of all the 'top 10 facts'.&lt;/li&gt;
&lt;li&gt;Odia author and cultural historian Jagannath Prasad Das 	&lt;a href="http://cis-india.org/a2k/blogs/discover-bhubaneswar-30-books-of-odia-author-and-historian-jagannath-prasad-das-to-come-online-on-odia-wikisource"&gt; has recently permitted 30 volumes of his notable works to be re-license  under an open license (Creative Commons Share-Alike 4.0 or CC-BY-SA  4.0) &lt;/a&gt; . Subhashish Panigrahi wrote a blog post on this in Discover Bhubaneswar, a web portal in Odisha.&lt;/li&gt;
&lt;li&gt;CIS has established institutional partnerships with University of  Mysore and Guru G Learning Labs for furthering Wikipedia growth. Tanveer  Hasan &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/analysis-of-institutional-partnerships-university-of-mysore-and-guru-g-learning-lab"&gt;analyses the developments and lists out the possible future plans&lt;/a&gt; in this regard.&lt;/li&gt;
&lt;li&gt;CIS along with Observer Research Foundation, Centre for Global  Communication Studies, Annenberg School for Communication, University of  	Pennsylvania, and Internet Policy Observatory 	&lt;a href="http://cis-india.org/internet-governance/events/net-neutrality-across-south-asia"&gt; organized an event in New Delhi on Net Neutrality across South Asia &lt;/a&gt; .&lt;/li&gt;
&lt;li&gt;Today the quantity of data being generated is expanding at an  exponential rate. From smartphones and televisions, trains and  airplanes, sensor-equipped buildings and even the infrastructures of our  cities, data now streams constantly from almost every sector and  function of daily life, &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data"&gt;stated Scott Mason in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The Government of India is in the process of developing 100 smart  cities in India which it sees as the key to the country's economic and  social growth. Vanya Rakesh &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview"&gt;gave an overview of the Smart Cities project currently underway in India in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For the second part of the Smart City podcast series, Sruthi  Krishnan and Harsha K from Fields of View spoke with Sumandro  Chattapadhyay on data, people, and smart cities.	&lt;a href="http://cis-india.org/raw/fov-podcast-data-people-and-smart-cities"&gt;Fields of View has produced and shared the recording&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;An extended survey of digital initiatives in arts and humanities  practices in India was undertaken last year. The 'mapping digital  humanities in 	India' enquiry began with the term 'digital humanities'  itself, as a 'found' name for which one needs to excavate some meaning,  context, and location in India at the present moment. P.P Sneha  published the &lt;a href="http://cis-india.org/raw/reading-from-a-distance-data-as-text"&gt;third&lt;/a&gt;,&lt;a href="http://cis-india.org/raw/the-infrastructure-turn-in-the-humanities"&gt;fourth&lt;/a&gt;, and	&lt;a href="http://cis-india.org/raw/living-in-the-archival-moment"&gt;fifth&lt;/a&gt; sections of the study this month.&lt;/li&gt;
&lt;li&gt;The RAW programme has initiated a new annual conference series titled Internet Researchers' Conference (IRC). The	&lt;a href="http://cis-india.org/raw/irc16-call"&gt;first edition of the Conference&lt;/a&gt;, organised around the theme of "studying internet in India" will be held 	in Delhi in February 2016&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;br /&gt;&lt;/a&gt;----------------------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing a project on developing text-to-speech software for 15 Indian languages. The progress made so far in 	the project can be accessed &lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Updates&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/december-2015-report"&gt;December 2015 Report&lt;/a&gt; (Suman Dogra; December 31, 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;-----------------------------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;br /&gt;&lt;/a&gt;-----------------------------------------------------------&lt;/b&gt;&lt;br /&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Copyright and Patent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/abuse-of-dominant-position-in-indian-competition-law-a-brief-guide"&gt;Abuse of Dominant Position in Indian Competition Law: A Brief Guide &lt;/a&gt; (Sarthak Sood; December 9, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/gcip2015-notes-from-the-inaugural-session"&gt;GCIP2015: Notes from the Inaugural Session&lt;/a&gt; (Spadika Jayaraj; 	SpicyIP; December 14, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/gcip-day-1-session-3-challenges-in-re-articulating-public-interest"&gt;GCIP Day 1 Session 3: Challenges in Re-Articulating Public Interest &lt;/a&gt; (Spadika Jayaraj; SpicyIP; December 17, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/gcip-15-day-2-discussions-on-health-technology-innovation-and-access"&gt;GCIP 15 Day 2: Discussions on Health Technology, Innovation and Access &lt;/a&gt; (Spadika Jayaraj; SpicyIP; December 17, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions-in-abeyance"&gt;Guidelines for Examination of Computer Related Inventions in abeyance &lt;/a&gt; (Anubha Sinha; Anubha Sinha; December 21, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/4th-global-congress-on-ip-and-the-public-interest-statement-of-conclusion-for-the-ip-and-development-track"&gt;4th Global Congress on IP and the Public Interest: Statement of Conclusion for the IP and Development track &lt;/a&gt; (Nehaa Chaudhari; December 25, 2015). &lt;i&gt;This was also published on the Global Congress Blog&lt;/i&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k/blogs/call-for-participation-global-congress-on-intellectual-property-and-the-public-interest"&gt;Global Congress on Intellectual Property and the Public Interest &lt;/a&gt; (Organized by National Law University, Delhi, American Assembly, Columbia University, Open A.I.R., American University, and CIS; New Delhi, December 15 - 	17, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Participation in Event&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/code-session"&gt;CODE Session&lt;/a&gt; (Organized by IDRC; December 17, 2015; New Delhi). Nehaa Chaudhari and Anubha Sinha participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k/news/nlsiu-conference-on-access-to-copyrighted-works-for-persons-with-disability-an-enriching-experience"&gt;NLSIU Conference on Access to Copyrighted Works for Persons with Disability: An enriching experience &lt;/a&gt; (Abolee Vaidya and Nuhar Bansal; SINAPSE; December 14, 2015). 	&lt;i&gt; This is an event report on a one-day national conference on the 'Access to Copyrighted Works for Persons with Disability' for which Pranesh Prakash was 		a speaker &lt;/i&gt; .&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/discover-bhubaneswar-30-books-of-odia-author-and-historian-jagannath-prasad-das-to-come-online-on-odia-wikisource"&gt;30 Books of Odia Author and Historian Jagannath Prasad Das to Come Online on Odia Wikisource &lt;/a&gt; (Subhashish Panigrahi; Discover Bhubaneswar; December 4, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/sambada-rabibara-subhashish-panigrahi-december-6-2015-odia-wikisource"&gt;ଓଡ଼ିଆ&lt;/a&gt; &lt;a href="http://cis-india.org/a2k/blogs/sambada-rabibara-subhashish-panigrahi-december-6-2015-odia-wikisource"&gt; &lt;/a&gt; &lt;a href="http://cis-india.org/a2k/blogs/sambada-rabibara-subhashish-panigrahi-december-6-2015-odia-wikisource"&gt; ଉଇକିପାଠାଗାର &lt;/a&gt; (Subhashish Panigrahi; Sambad; December 6, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/wikimedia-blog-subhashish-panigrahi-december-3-open-access-in-marathi-language-expands-by-thousand-books"&gt;Open access in the Marathi language expands by a thousand books &lt;/a&gt; (Subhashish Panigrahi and Abhinav Garule; December 3, 2015). &lt;i&gt;This was published on Wikimedia Blog&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/guru-g-learning-labs-and-cis-a2k-institutional-partnership"&gt;Guru-G Learning Labs and CIS A2K Institutional Partnership &lt;/a&gt; (Tanveer Hasan; December 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/community-prioritisation-content-donation-kannada-wikisource"&gt;Community Prioritisation of Content Donation: Kannada Wikisource &lt;/a&gt; (Tanveer Hasan; December 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/analysis-of-institutional-partnerships-university-of-mysore-and-guru-g-learning-lab"&gt;Analysis of Institutional Partnerships: University of Mysore and Guru G Learning Labs &lt;/a&gt; (Tanveer Hasan; December 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/department-of-tourism-studies-christ-university-st-aloysius-college"&gt;Touch Point Report: Department of Tourism Studies, Christ University and St. Aloysius College, Mangalore &lt;/a&gt; (Tanveer Hasan; December 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/ttt-2015"&gt;TTT 2015&lt;/a&gt; (Tanveer Hasan; December 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/kannada-wikipedia-editathon-at-mangaluru"&gt;Kannada Wikipedia Editathon at Mangaluru&lt;/a&gt; (Dr. U.B. Pavanaja; 	December 29, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/openness/discussion-on-bringing-peshwa-culture-on-marathi-wikipedia"&gt;Talk on bringing 1000 books about the culture of Maharashtra on Marathi Wikipedia &lt;/a&gt; (The Energy and Resources Institute; Bangalore; December 1, 2015). Avinash Chaphekar, Joint Secretary, Maharashtra Granthottejak Sanstha gave a talk.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/odia-wikimedia-community-meetup-at-cuttack"&gt;Odia Wikimedia community meetup&lt;/a&gt; (Organized by Odia Wikipedia 	Community and CIS; Cuttack; December 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/events/sau-dhuni-teen-project-december-edit-a-thon-at-womens-studies-centre-university-of-pune"&gt;Sau Dhuni Teen Project: December Edit-a-thon &lt;/a&gt; (Women's Studies Centre, University of Pune; December 3, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k/news/telugu-wikipedia-day-2015-photo-walk"&gt;Telugu Wikipedia Day 2015, Photo Walk&lt;/a&gt; (Organized by Telugu 	Wikipedians; Dr. YSR State Archaeological Museum, Hyderabad; December 13, 2015). Pavan Santhosh attended the event. One of the popular Telugu news channel TV9 covered the event and telecasted the same.	&lt;a href="http://cis-india.org/a2k/news/telugu-wikipedia-day-2015-eenadu-coverage"&gt;Eenadu published a special item on photo walk&lt;/a&gt; on December 13, 2015.&lt;/li&gt;
&lt;li&gt;English Wikipedia and the Telugu Wikipedia joint meetup and edit-a-thon (Organized by Wikipedia community; Golden Threshold, Hyderabad; December 20, 2015). The event was covered in&lt;a href="http://cis-india.org/a2k/news/english-wikipedia-and-the-telugu-wikipedia-joint-meetup-and-edit-a-thon-sakshi"&gt;Sakshi&lt;/a&gt; and	&lt;a href="http://cis-india.org/a2k/news/english-wikipedia-and-the-telugu-wikipedia-joint-meetup-and-edit-a-thon-andhra-jyoti"&gt;Andhra Jyoti&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/post-more-articles-on-kannada-wikipedia"&gt;Post More Articles on Kannada Wikipedia&lt;/a&gt; (Indian Express; 	Mangaluru edition; December 12, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A Kannada Wikipedia Editathon was conducted in Mangalore on December 10, 2015. The following are the media coverage for the same:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-udayavani-coverage"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Udayavani; December 7, 	2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-vijayavani"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Vijayavani; December 11, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-vijaya-karnataka"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Vijaya Karnataka; December 	11, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-in-mangalore-udayavani"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Udayavani; December 11, 	2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-prajavani-mangal"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Prajavani; December 10, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-in-prajavani"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Prajavani; December 13, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;-----------------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;br /&gt;&lt;/a&gt;-----------------------------------------------&lt;/b&gt;&lt;br /&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and 	International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur 	Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Free Speech and Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them"&gt;Facebook shares 10 key facts about Free Basics. Here's what's wrong with all 10 of them &lt;/a&gt; (Shweta Sengar; Catch News; December 24, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"&gt;CIS's Position on Net Neutrality&lt;/a&gt; (Sunil Abraham; 	December 4, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance/events/net-neutrality-across-south-asia"&gt;Net Neutrality across South Asia&lt;/a&gt; (Organized by 	Observer Research Foundation, Centre for Global Communication Studies, Annenberg School for Communication, University of Pennsylvania, Internet Policy 	Observatory and CIS; New Delhi; December 12, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline"&gt;Consultation on "Understanding the Freedom of Expression Online and Offline" &lt;/a&gt; (Organized by Digital Empowerment Foundation and Association for Progressive Communications; YMCA, New Delhi; December 10, 2015). Jyoti Panday was a 	speaker at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Big Data&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data"&gt;Benefits and Harms of "Big Data"&lt;/a&gt; (Scott Mason; December 	30, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Cyber Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/ground-zero-summit"&gt;Ground Zero Summit&lt;/a&gt; (Amber Sinha; December 22, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/telecom/news/second-regional-conference-on-connectivity-for-all-future-technologies-markets-and-regulation"&gt;Second Regional Conference on Connectivity for All: Future Technologies, Markets and Regulation &lt;/a&gt; (Organized by International Telecommunications Society, IIMA IDEA Telecom Centre of Excellence and Indian Institute of Management, Ahmedabad; New Delhi; 	December 13 - 15, 2015). Sunil Abraham was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/events/bangalore-chapter-meet-dsci"&gt;Bangalore Chapter Meet - DSCI&lt;/a&gt; (CIS, Bangalore; December 	1, 2015). CIS hosted the Bangalore Chapter Meet of DSCI. Pronab Mohanty, Inspector General of Police gave a talk on Cybercrimes. Sunil Abraham presented 	the outcome of his study "Anonymity in Cyberspace".&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/uid-research"&gt;UID Research&lt;/a&gt; (Vanya Rakesh; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/dna-research"&gt;DNA Research&lt;/a&gt; (Vanya Rakesh; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/privacy-policy-research"&gt;Privacy Policy Research&lt;/a&gt; (Vanya Rakesh; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/sectoral-privacy-research"&gt;Sectoral Privacy Research&lt;/a&gt; (Vanya Rakesh; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/security-research"&gt;Security Research&lt;/a&gt; (Vanya Rakesh; December 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015"&gt;Eight Key Privacy Events in India in the Year 2015 &lt;/a&gt; (Amber Sinha; December 31, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project"&gt;Kick Off Meeting for the Politics of Data Project&lt;/a&gt; (Organized by Tactical Tech; Phnom Penh; December 7-8, 2015). Amber Sinha participated in the event.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion"&gt;Unbundling Issues of Privacy, Data Security, Identity Matrics, for Financial Inclusion &lt;/a&gt; (Organized by Indicus Foundation and MicroSave; December 10, 2015; Metropolitan Hotel and Spa, New Delhi). Sunil Abraham was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Miscellaneous&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview"&gt;Smart Cities in India: An Overview&lt;/a&gt; (Vanya Rakesh; 	December 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/elite-capture-of-governance-in-bangalore"&gt;Elite Capture of Governance&lt;/a&gt; (Organized by Forum for Urban Governance and Commons; December 16, 2015; Bangalore). Vanya Rakesh participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;--------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;/b&gt;&lt;br /&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/the-free-basics-debate-trai-has-a-point-in-imposing-temporary-ban-on-net-neutrality"&gt;The Free Basics debate: Trai has a point in imposing temporary ban on net neutrality &lt;/a&gt; (Sunil Abraham; FirstPost; December 24, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/millions-of-indians-slam-facebooks-2018free-basics2019-app"&gt;Millions of Indians Slam Facebook's 'Free Basics' App &lt;/a&gt; (Subhashish Panigrahi; December 29, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;--------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;/b&gt;&lt;br /&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/ai-hype-cycles-and-artistic-subversions"&gt;A.I. Hype Cycles and Artistic Subversions&lt;/a&gt; (CIS, Bangalore; January 	22, 2016). Gene Kogan will give a talk.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-call"&gt;First Edition of Internet Researchers' Conference&lt;/a&gt; (IRC) 2016 - Studying Internet in India: Call 	for Sessions (Organized by CIS; New Delhi; February 25 - 27, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/raw-lecture-01-nishant-shah-video"&gt;RAW Lecture #01: Nishant Shah on 'Stories and Histories of Internet in India' - Video &lt;/a&gt; (P.P. Sneha; December 1, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/fov-podcast-data-people-and-smart-cities"&gt;FOV Podcast - Data, People, and Smart Cities&lt;/a&gt; (Sumandro 	Chattapadhyay; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/reading-from-a-distance-data-as-text"&gt;Reading from a Distance - Data as Text&lt;/a&gt; (P.P. Sneha; December 7, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/the-infrastructure-turn-in-the-humanities"&gt;The Infrastructure Turn in the Humanities&lt;/a&gt; (P.P. Sneha; December 7, 	2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/living-in-the-archival-moment"&gt;Living in the Archival Moment&lt;/a&gt; (P.P. Sneha; December 14, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;---------------------------------&lt;a href="http://cis-india.org/news"&gt;&lt;br /&gt;News &amp;amp; Media Coverage&lt;br /&gt;&lt;/a&gt;---------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/india2019s-net-neutrality-debate-is-unique-and-complex"&gt;India's net neutrality debate is unique and complex &lt;/a&gt; (Pratap Vikram Singh; Governance Now; December 14, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics"&gt;Start-up India turns the heat on Facebook Free Basics &lt;/a&gt; (Anita Babu; Business Standard; December 22, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/a-scam-masquerading-as-santa"&gt;A Scam Masquerading as Santa&lt;/a&gt; (Apurva Venkat &amp;amp; Vandana 	Kamath; Bangalore Mirror; December 25, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/facebook-goes-out-all-guns-blazing-in-push-for-free-basics-net-neutrality-advocates-cry-foul"&gt;Facebook goes out all guns blazing in push for Free Basics, Net neutrality advocates cry foul &lt;/a&gt; (IBN Live; December 29, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-december-30-2015-foreign-media-on-zukerberg-india-backlash"&gt;Foreign Media on Zuckerberg's India Backlash &lt;/a&gt; (Bhuma Shrivastava; NDTV; December 30, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/mark-zuckerberg2019s-india-backlash-imperils-vision-for-free-global-web"&gt;Mark Zuckerberg's India backlash imperils vision for free global web &lt;/a&gt; (Bhuma Shrivastava; Livemint; December 30, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;---------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;br /&gt;&lt;/a&gt;---------------------------------&lt;/b&gt;&lt;br /&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from 	policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual 	property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), 	internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations 	of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Offices&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Bengaluru - No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru, 560071. 	&lt;a href="https://www.google.com/maps/place/Centre+for+Internet+and+Society/@12.9644512,77.6374907,19z/data=%214m6%211m3%213m2%211s0x3bae141bb474ca25:0xe88eda6c81771517%212sDomlur+Bus+Stop%213m1%211s0x0000000000000000:0x88cd9bce9a1aa4d8?hl=en"&gt; &lt;/a&gt; &lt;a href="https://www.google.com/maps/place/Centre+for+Internet+and+Society/@12.9644512,77.6374907,19z/data=%214m6%211m3%213m2%211s0x3bae141bb474ca25:0xe88eda6c81771517%212sDomlur+Bus+Stop%213m1%211s0x0000000000000000:0x88cd9bce9a1aa4d8?hl=en"&gt; Location on Google Map &lt;/a&gt; .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Delhi - First floor, B 1/8, Hauz Khas, near G Block market, after Crunch, New Delhi, 110016.&lt;a href="http://j.mp/cis-delhi"&gt; &lt;/a&gt; &lt;a href="http://j.mp/cis-delhi"&gt;Location on Google Map&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Follow Us&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge:&lt;a href="https://twitter.com/CISA2K"&gt; https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru, 560 071.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet 	and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at 	sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an 	indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, 	write to Tanveer Hasan, Programme Officer, at &lt;a href="mailto:tanveer@cis-india.org"&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and 	support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 	Foundation, MacArthur Foundation, and IDRC for funding its various projects.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2015-bulletin'&gt;https://cis-india.org/about/newsletters/december-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-01-13T14:07:01Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
