<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1611 to 1625.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-january-31-2015-toi-literary-kicks-off-today"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-february-1-2015-internet-is-an-absolute-human-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/assocham-national-council-on-it-ites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-akansha-seth-apoorva-livemint-feb-3-2015-section-66a-not-for-curbing-freedom-of-speech-govt-says"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/january-2015-bulletin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india">
    <title>Facebook launches Internet.org in India</title>
    <link>https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india</link>
    <description>
        &lt;b&gt;Joins hands with Reliance Communications. Move spurs neutrality concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Lalatendu Mishra and Sriram Srinivasan was &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/facebook-launches-internetorg-in-india/article6879310.ece"&gt;published in the Hindu&lt;/a&gt; on February 11, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Facebook on Tuesday announced a tie-up with Reliance Communications to  launch Internet.org in India, bringing to the land of a billion-plus  people a service that the social media giant says helps affordable  Internet access but whose critics disapprove its restrictiveness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India now becomes the sixth destination for Internet.org, a Facebook-led  initiative envisaged about a year-and-a-half back with six other  founding partners, including Samsung and Qualcomm. The service has  already been launched in Zambia, Tanzania, Kenya, Colombia and Ghana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s 30-year-old founder and CEO Mark Zuckerberg announced the  development on his social network. He posted, “More than a billion  people in India don’t have access to the internet. That means they can’t  enjoy the same opportunities many of us take for granted, and the  entire world is robbed of their ideas and creativity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tie-up gives subscribers of the Anil Ambani-led Reliance  Communications who have Internet-enabled handsets free access to 38  Websites – a mix of news, music, education, weather and health sites.  The list includes Facebook, Wikipedia, and Reliance Astrology. The lone  search option available is Microsoft’s Bing. They can be accessed via an  Android app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the time being, the service has gone live in Maharashtra, Gujarat,  Andhra Pradesh, Tamil Nadu, and Kerala. The pan-India launch is planned  in three months. Nearly 70% of Reliance’s customers who have  Internet-enabled phones but are now offline are expected to avail  themselves of this service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gurdeep Singh, CEO, Consumer Business, Reliance Communications, said  during the launch in Mumbai, “This partnership will not only accelerate  internet penetration In India, it will also open new socioeconomic  opportunities to users in fields like education, information and  commerce.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chris Daniels, Vice President of Internet.org at Facebook, said, “This  is a big step forward in our efforts to connect every one in India to  the internet and help people discover new tools and information that can  create more jobs and opportunities.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics, however, see little altruism in Internet.org. Rather, what they  see is a huge challenge to the neutrality of the Internet. Their point  is that a selective access to the Internet makes it extremely difficult  for rivals not part of the service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawyer Prashant Reddy said, “It will be interesting to see how Trai (the  regulator Telecom Regulatory Authority of India) handles such deals,  and whether the market will accuse both these players of violating  network neutrality.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said, “Also one needs to see how public understands the principles of  Net neutrality.” His point is: there is no outcry when data packs are  offered free but controversy erupts when a service provider tries to  charge subscribers for services, as in the case of Airtel recently.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Internet activist and director of the Center for Civic Media at MIT, Ethan Zuckerman, told &lt;i&gt;The Hindu&lt;/i&gt; in an email interview that "If Facebook were donating millions or  billions to upgrade infrastructure - or even to lobby mobile phone  carriers for cheaper data services for all - it would be less troubling.  But instead, they're offering a limited version of the internet, one  that centers on Facebook, to low-income internet users. That raises real  concerns that this is not a charitable effort, but a customer  acquisition strategy."&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Pranesh Prakash, Policy Director of the Bengaluru-based research and  advocacy organisation The Centre for Internet &amp;amp; Society, said he is  worried about the long-term consequences. “The Internet.org model  violates most definitions of net neutrality, as it provides access to a  limited menu of services claiming to be the Internet — being based on a  cable TV model — rather than providing actual access to the Internet at a  low cost.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He said, “Since it is an exclusive deal with a single mobile service  provider, it also calls into question the genuineness of Mark  Zuckerberg’s publicly-stated motive of bringing the Internet to a  billion people and bridging the digital divide.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It isn’t clear how Facebook and Reliance would bear the cost of the free  service. What Facebook said in its annual report of 2013 is that it  would continue to invest in projects even if it doesn’t have a clear  path to monetisation, “such as our commitment to the Internet.org  initiative to increase global Internet access.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Even prior to the internet.org initiative, companies such as Facebook  and Twitter have individually worked out deals with telecom companies in  fast-growing markets to make their services free for subscribers.  Research firm eMarketer had forecast India to be the fastest-growing  geography for Facebook in terms of users in 2014.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;(With inputs from Sanjay Vijayakumar)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india'&gt;https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-13T02:27:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database">
    <title>Govt may turn to supercomputing for better use of Aadhaar database </title>
    <link>https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database</link>
    <description>
        &lt;b&gt;Technology experts working with the Aadhaar project have spotted other potential uses for it, all to be powered by a string of supercomputers.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Politics/PYN4cIu1tiRL5BCuTUoXBO/Govt-may-turn-to-supercomputing-for-better-use-of-Aadhaar-da.html"&gt;published in Livemint &lt;/a&gt;on February 10, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When India launched a scheme in 2009 to give every one of its residents a unique identity number called Aadhaar, there were two main objectives: an efficient delivery of welfare services, and a tool for monitoring government schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Six years on, as the government moves a step closer to covering all 1.25 billion citizens with Aadhaar, technology experts working with the project have spotted other potential uses, all to be powered by a string of supercomputers. With Aadhaar having crossed the 700 million milestone in 2014, the government is preparing to launch supercomputing applications to make more sense of the scheme’s massive database. These will help link the database to public services by running data analytics, which in turn will throw up trends that can help promote better-informed policy-making.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are talking about the Aadhaar database and the huge population data associated with it. Right now it is only a collection of data, but once we start rolling out applications, the amount of information that will be generated and the amount of usage that will happen will be enormous,” said Rajat Moona, director general of the Pune-based Centre for Development of Advanced Computing (CDAC), the research and development arm of the department of electronics and information technology responsible for the National Supercomputing Mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Big data analysis and big data visualization, these are supercomputing problems. It (handling Aadhaar database) is actually visualization of huge data that can help in the planning,” he added. “When you have that much amount of information, you can do a lot of data analysis and figure out trends. We can thus see what are the policies needed to be defined. Therefore proactive policymaking based on previous trends is possible provided we have data,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar is being used by the government for transferring cash subsidies directly into the bank accounts of beneficiaries in order to plug leakages. It is used to identify beneficiaries for transferring funds under scholarship schemes, pension money, cooking gas subsidy as well as seeding of bank accounts to weed out multiple beneficiaries under the government’s financial inclusion programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are also plans to use Aadhaar to curb black money in real estate transactions. Developing these applications further, says Moona, needs supercomputers, which will give far better results. “In order to develop these applications we need to understand supercomputing and use of supercomputing,” he said. “We don’t have such applications developed…we usually take larger applications developed elsewhere and customize it according to our needs. So applications that are developed for solving India-centric problems will actually give a better output,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are talking about creating related applications that can run on supercomputing cloud of million cores (cloud supported by million-core supercomputers),” he added. “It will be a platform, where we can solve a large number of problems using shared model.” “It (supercomputing cloud) will not be a public cloud. There will be research institutes, research organizations, security agencies, government departments and each of them will have its own data and access pattern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is going to be a part of our application-centric usage of (the proposed) supercomputing (grid).” The million-core supercomputing cloud is a part of the government’s Rs.4,500 crore project aimed at setting up a grid of more than 70 supercomputers to be hooked up across these institutions and organizations over the next five to seven years. This will enable Indian researchers to build applications on the network, as well as to harness the power of supercomputers for research and development. India has 12 of the world’s 500 most powerful supercomputers, the largest currently deployed being a 500 teraflops (equivalent to half a petaflop) computer, administered by the CDAC. To work on supercomputing applications in areas such as the Aadhaar database, terrorism, advanced weather monitoring— including cyclone and flood prediction—and geo exploration, the government plans to train 22,000 high-quality professionals over 5-7 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some experts point out that a centralized Aadhaar database faces cybersecurity risks that can threaten people’s privacy. Centralization is a terrible idea from the perspective of cybersecurity, said Sunil Abraham, executive director of the Bengaluru-based research organization Centre for Internet and Society. “This is a honeypot (a computer system that is set up to attract and trap people who attempt to penetrate other people’s computer systems) and variety of bad actors, i.e. criminals, terrorists, as well as states and corporations, will target this database hoping to compromise it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A petition filed by former Justice K.S. Puttaswamy in 2012 said that Aadhaar scheme infringes citizens’ privacy as applicants need to provide personal information on biometrics, iris and fingerprints, which infringes their right to privacy that is a part of the fundamental right to life under Article 21 of the Constitution. Security experts have been raising concerns about lack of secure and foolproof system to ensure that all the data will be safe and will not be misused. “How do we address the security and innovation imperative without compromising on the right to privacy? We must build individual transaction databases for each government department/ministry and (have) decentralised authentication. Only anonymized dataset should be made available to the supercomputing applications that are being built,” Abraham said. “For innovation and improved e-governance, anonymized data is sufficient.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database'&gt;https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-08T05:53:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india">
    <title>Facebook offers free but limited access to the Internet in India</title>
    <link>https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india</link>
    <description>
        &lt;b&gt;Facebook-backed Internet.org is extending its offer of free but limited Internet access to India via a mobile app. &lt;/b&gt;
        &lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The blog post was &lt;a class="external-link" href="http://www.pcworld.com/article/2882272/facebook-offers-free-but-limited-access-to-the-internet-in-india.html"&gt;published in PC World&lt;/a&gt; on February 10, 2015. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The launch of the app in India follows similar introductions in Ghana,  Zambia, Colombia, Kenya and Tanzania, despite criticism from activists  that the program does not meet its stated objective of providing free  and unfettered Internet access to all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The common thread in all these launches is that the app is available  only to subscribers of one operator in the country. In India, for  example, Internet.org has tied with Reliance Communications, the  country’s fourth-largest mobile services provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet.org is a collaborative effort, launched in 2013 by Facebook and  other tech companies including Ericsson and Samsung Electronics, that  aims to provide Internet access to those who don’t yet have it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Connectivity can’t just be a privilege for some of the rich and  powerful,” Facebook CEO Mark Zuckerberg said last year at the first  meeting of Internet.org. “It needs to be something that everyone shares,  and an opportunity for everyone.”&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;But the way the free service has been offered has come in for criticism from some social activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a walled garden approach that undermines the infrastructure of  free expression in India,” said Pranesh Prakash, policy director at  Centre for Internet and Society, a Bangalore-based organization focused  on research and policy advocacy, who pointed out that the app does not  offer truly free access to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash is also critical that the service will only be available to  subscribers of Reliance Communications, defeating the stated aim of  Internet.org of providing free Internet access to all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The free access is limited to 38 websites, including Facebook and its  Messenger service, Bing Search, Dictionary.com, Wikipedia, BBC News,  Reuters Market Lite for crop and farming information, and local jobs and  news sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The service will only cover a few Indian states in South India. Reliance  customers in the six states can access the free services through the  Android app, from the start screen of the Opera Mini mobile web browser,  and using the Android app UC Browser for Internet.org. The services  will be available in English, Hindi, Tamil, Telugu, Malayalam, Gujarati  and Marathi.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india'&gt;https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-08T07:42:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions">
    <title>Collection of Net Neutrality Definitions</title>
    <link>https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions</link>
    <description>
        &lt;b&gt;As part of CIS's inquiry into 'Network Neutrality' in the developing world, we have collected a set of definitions of the term from different sources. The definitions were collated and compiled by Manoj Kurbet, Maitreya Subramaniam and Tarun Krishnakumar under the guidance of Sunil Abraham.&lt;/b&gt;
        
&lt;table class="listing"&gt;&lt;/table&gt;
&lt;h3 style="text-align: center;"&gt;&lt;a title="View Collection of Net Neutrality Definitions on Scribd" href="https://www.scribd.com/doc/255177669/Collection-of-Net-Neutrality-Definitions"&gt;Collection of Net Neutrality Definitions&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: center;"&gt;Please feel free to get in touch if you would like to suggest definitions to be added to this &amp;nbsp;working database.&lt;/p&gt;
&lt;div style="text-align: center;"&gt;&lt;iframe src="https://www.scribd.com/embeds/255177669/content?start_page=1&amp;amp;view_mode=scroll&amp;amp;show_recommendations=true" frameborder="0" scrolling="no" height="600" width="100%" id="doc_47259" class="scribd_iframe_embed"&gt;&lt;/iframe&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions'&gt;https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tarun</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-09T13:33:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists">
    <title>Digital Security Workshop for Journalists</title>
    <link>https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Mumbai Press Club are jointly organizing a workshop for journalists on February 7, 2015, from 9.30 a.m. to 1.30 p.m. at Mumbai Press Club, Azad Maidan.&lt;/b&gt;
        &lt;h3&gt;Event Flier&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DigitalSecurity.png" alt="Digital Security" class="image-inline" title="Digital Security" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The event would cover these topics:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Why should journalists care about digital security?&lt;/li&gt;
&lt;li&gt;The threat model: assessing digital security risks and responses.&lt;/li&gt;
&lt;li&gt;Security measures and solutions: alternatives to unsecure software and tools, good security practices, computer hygiene etcetera.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Event Pictures&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Pics01.JPG" alt="Pics 01" class="image-inline" title="Pics 01" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Pic2.jpg" alt="Pics 02" class="image-inline" title="Pics 02" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists'&gt;https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-08T05:25:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-january-31-2015-toi-literary-kicks-off-today">
    <title>TOI literary festival kicks off today</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-january-31-2015-toi-literary-kicks-off-today</link>
    <description>
        &lt;b&gt;The Times Litfest 2015, Bengaluru, kicks off on Saturday at the Jayamahal Palace Hotel. The two-day festival is among the biggest such literary enclaves in Bengaluru. It'll see some of India's foremost creative minds talk, argue, debate, discuss and engage with vital topics which touch our lives.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Over two busy days, achievers from every field will talk about reading,  writing, culture, journalism, food, comedy, sport, films and much, much  more. Speakers on Day 1 include historian  &lt;a href="http://timesofindia.indiatimes.com/topic/Ramachandra-Guha"&gt;Ramachandra Guha&lt;/a&gt;,  NR Narayana Murthy and Snapdeal CEO Kunal Bahl, star chef Manu Chandra, and comedians Radhika Vaz and Rubi Chakravarti.&lt;br /&gt; &lt;br /&gt; It's not all fun and games. Our serious sessions include Raghavendra  Joshi talking about his father Bhimsen Joshi's legacy; Rohan Murty  (founder of the Murty Classical Library), author and historian Vikram  Sampath and translator Arunava Sinha on preserving our cultural  heritage; and Pranesh Prakash of Centre for Internet and Society,  Lawrence Liang of Alternative Law Forum, and author and journalist Vivek  Kaul on internet censorship and net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bengaluru/TOI-literary-festival-kicks-off-today/articleshow/46073503.cms"&gt;Read the full coverage on the Times of India newspaper here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-january-31-2015-toi-literary-kicks-off-today'&gt;https://cis-india.org/internet-governance/news/times-of-india-january-31-2015-toi-literary-kicks-off-today&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-05T15:37:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-february-1-2015-internet-is-an-absolute-human-right">
    <title>‘Internet is an absolute human right’</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-february-1-2015-internet-is-an-absolute-human-right</link>
    <description>
        &lt;b&gt;The right to the internet is an absolute human right, Bengaluru-based lawyer Lawrence Liang said.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bengaluru/Internet-is-an-absolute-human-right/articleshow/46081243.cms"&gt;published in the Times of India&lt;/a&gt; on February 1, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director, Centre for Internet and Society, said  people should fight for this right "as we fight for the right to food".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was vigorous espousal of the concept of net neutrality at the  session on 'Is free internet a fantasy?' Net neutrality is the notion of  keeping the internet free and open. It implies preventing broadband  companies from blocking or deliberately slowing down legal content; and  preventing them from collecting a higher fee from content providers to  enable them to reach consumers faster.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Session moderator and writer Vivek Kaul noted that broadband companies  had been arguing for the right to price internet services differentially  on the grounds that they had made huge investments on their  infrastructure. Prakash challenged that argument saying the companies  were already highly profitable and their consumers were anyway paying  for the internet. "Even the argument that large content providers like  Google and Facebook are having a free ride on their networks is not true  because they pay intermediaries who carry their traffic," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last November, US president Barack Obama upheld net neutrality, saying  that for almost a century, "our law has recognized that companies who  connect you to the world have special obligations not to exploit the  monopoly they enjoy over access into and out of your home or business."  He went on to say: "It is common sense that the same philosophy should  guide any service that is based on the transmission of information —  whether a phone call or a packet of data."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If broadband companies are allowed to charge content providers higher  for faster internet services, it would discriminate against those who  can't afford to pay such rates. This would mean lopsided availability of  information - a fundamental resource for a democratic world.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-february-1-2015-internet-is-an-absolute-human-right'&gt;https://cis-india.org/internet-governance/news/times-of-india-february-1-2015-internet-is-an-absolute-human-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-05T15:10:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/assocham-national-council-on-it-ites">
    <title>ASSOCHAM National Council on IT / ITes</title>
    <link>https://cis-india.org/internet-governance/news/assocham-national-council-on-it-ites</link>
    <description>
        &lt;b&gt;This meeting was held in New Delhi on January 30, 2015 at ASSOCHAM Corporate Office.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Draft Minutes of Meeting&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Meeting Attended by:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Mr. Shashi Mal, Co-Chairman, ASSOCHAM National Council on IT/ ITES&lt;/li&gt;
&lt;li&gt;Mr. T. V. Ramachandran, Chairman, ASSOCHAM National Council on Telecom&lt;/li&gt;
&lt;li&gt;Mr. Anupam Aggarwal, TCS&lt;/li&gt;
&lt;li&gt;Mr. Anthony Thomas, Vodafone India Ltd.&lt;/li&gt;
&lt;li&gt;Ms. Geetha Hariharan, The Centre for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;Mr. Sreedhar.C, Amara Raja&lt;/li&gt;
&lt;li&gt;Mr. Naveen Tandon, AT&amp;amp;T India&lt;/li&gt;
&lt;li&gt;Mr. Nripendra Singh , Ernst &amp;amp; Young LLP&lt;/li&gt;
&lt;li&gt;Mr. S. Chandrasekhar, Microsoft &lt;/li&gt;
&lt;li&gt;Mr. Akhilesh Tuteja, KPMG&lt;/li&gt;
&lt;li&gt;Mr. Pankaj Sharma, CA Technologies&lt;/li&gt;
&lt;li&gt;Mr. Sanjay Sarma, Design Worldwide&lt;/li&gt;
&lt;li&gt;Mr. Subhodeep Jash, DUA Consultant&lt;/li&gt;
&lt;li&gt;Mr. Ashok Sud, AUSPI&lt;/li&gt;
&lt;li&gt;Mr. Ashis Mukherjee, WIPRO&lt;/li&gt;
&lt;li&gt;Mr. Saurabh Joshi, Accenture&lt;/li&gt;
&lt;li&gt;Ms. Ambika Khurana, IBM&lt;/li&gt;
&lt;li&gt;Mr. Sumit Monga, R Com&lt;/li&gt;
&lt;li&gt;Cmde Shyam Kaushal, wimax&lt;/li&gt;
&lt;li&gt;Mr. Jitender Singh, Qualcomm&lt;/li&gt;
&lt;li&gt;Mr. Vikram Tiwathia, COAI&lt;/li&gt;
&lt;li&gt;Mr. Ranjeet Goshwami, TCS&lt;/li&gt;
&lt;li&gt;Mr. Sant Pratap Singh Matta, Railtel Corporation&lt;/li&gt;
&lt;li&gt;Mr. Kinshuk De, TCS&lt;/li&gt;
&lt;li&gt;Mr. T R Dua, TAIPA&lt;/li&gt;
&lt;li&gt;Mr. B B Anand, AUSPI&lt;/li&gt;
&lt;li&gt;Mr. Dilip Sahay, AUSPI&lt;/li&gt;
&lt;li&gt;Mr. Nitin Wali, Verisign&lt;/li&gt;
&lt;li&gt;Mr. A.k. Gidwani, BPCL&lt;/li&gt;
&lt;li&gt;Mr. Harsh Rastogi, TUV Rheinland India&lt;/li&gt;
&lt;li&gt;Mr. Sanjeev Arora, Vodafone&lt;/li&gt;
&lt;li&gt;Mr. Anil Prakash, ITU/APT Foundation&lt;/li&gt;
&lt;li&gt;Mr. Avik Banerjee, DEN Networks&lt;/li&gt;
&lt;li&gt;Ms. Neelima Agrawal, LUXURY CHRONICLE&lt;/li&gt;
&lt;li&gt;Ms. Amrita Jagatdeo, Bihang Welfare Association&lt;/li&gt;
&lt;li&gt;Mr. Minushri Madhumita, Bihang Welfare Association&lt;/li&gt;
&lt;li&gt;Mr. Varun Aggarwal, ASSOCHAM&lt;/li&gt;
&lt;li&gt;Mr. Parag Tripathi, ASSOCHAM&lt;/li&gt;
&lt;li&gt;Mr. Ashish Malik, ASSOCHAM&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Meeting started with the Chairman of the Meeting Shri Shashi Mal, Co-Chairman, ASSOCHAM IT/ITes Council &amp;amp; Director &amp;amp; Industry Leader, IBM India welcoming the Members present.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Mal introduced the topic of discussion and its importance in the present context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Mal pointed out that internet has touched every aspect of life and has significant stake in almost every business in the present times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He further pointed out two main points, how internet can be managed and how do you legally govern the activities going on the internet. He suggested approaching all interest groups for their views before we make the recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He emphasized that the consensus has to be build within the stakeholders of the subject and informed that for this ASSOCHAM is planning to organize &lt;b&gt;INDIA&lt;/b&gt;&lt;b&gt; INTERNET GOVERNANCE SUMMIT (IIGS)-2015 on 26&lt;sup&gt;th&lt;/sup&gt; March, 2015 in New Delhi.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. T. V. Ramachandran, Chairman, ASSOCHAM National Council on Telecommunications said that there are many opinions within the stakeholders. He said that India, with maximum numbers of users has the right to be heard in the international forums.  He further said that Industry should have an active participation in the policy making.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Vikram Tiwathia, COAI asked why ASSOCHAM is organizing this program and who has mandated them to do so and why they want to send the recommendations to the Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was informed that ASSOCHAM has already announced in the Ministry of External Affairs Meeting and the National Security Council Secretariat that ASSOCHAM will be creating a forum where all the stakeholders could present their point of view and proceedings of this Summit will be shared with the Government as the Recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Vikram Tiwathia to this replied that there are many stakeholders like civil society, academia, but ASSOCHAM should present the view of the Industry only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Mal suggested that there might be different views within the Industry on Internet Governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Tiwathia informed the Members present that Department of Electronics and IT, Government of India has constituted a Multistakeholder Advisory Group (MAG) for the India Internet Governance Forum but had met only twice. He suggested taking MAG outside the Deity to a more autonomous body. He also suggested that India should sign the Budapest Convention (or what are the obstacles in signing the Budapest Convention).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the Members present suggested coming up with commercially accepted views for Internet Growth usage and Protection of Investors along with steps for Principle for Self Regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the Members also brought out the Hygine Part of the Internet ie how internet is being used today.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was decided that the following major issues in the Internet Governance will be discussed with &lt;b&gt;Political, Technical &amp;amp; Economic &lt;/b&gt;aspects.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Cyber Security&lt;/li&gt;
&lt;li&gt;Cyber Policy&lt;/li&gt;
&lt;li&gt;Access&lt;/li&gt;
&lt;li&gt;Diversity&lt;/li&gt;
&lt;li&gt;Emerging issues like e-Commerce&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;It was decided that the Members will email their inputs on the above points to ASSOCHAM latest by Monday, 9th February, 2015. A core group is being constituted with the following Members to further develop on the issues from the inputs received by 14th February, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Core Group Members:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Mr. Anupam Agarwal, TCS&lt;/li&gt;
&lt;li&gt;Mr. Anthony Thomas, Vodafone India&lt;/li&gt;
&lt;li&gt;Ms. Geetha Hariharan, The Centre for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;Mr. Akhilesh Tuteja, KPMG&lt;/li&gt;
&lt;li&gt;Mr. Dilip Sahay, AUSPI&lt;/li&gt;
&lt;li&gt;Mr. Jitendra Singh, Qualcomm&lt;/li&gt;
&lt;li&gt;Mr. Vikram Tiwathia, COAI&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;It was suggested that ASSOCHAM should engage a Knowledge Partner to collate and make the Report/ Background Paper on the subject by 1st Week of March 2015.&lt;br /&gt;&lt;br /&gt;There are Speakers and Sponsorship Opportunities for which you could also forward your suggestions to ASSOCHAM at the earliest.&lt;br /&gt;&lt;br /&gt;It was decided that ASSOCHAM will prepare the rough draft of Program Agenda &amp;amp; Circulate among Members&lt;br /&gt;&lt;br /&gt;The Meeting ended with thanks to the Chair.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/assocham-national-council-on-it-ites'&gt;https://cis-india.org/internet-governance/news/assocham-national-council-on-it-ites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-05T14:56:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-akansha-seth-apoorva-livemint-feb-3-2015-section-66a-not-for-curbing-freedom-of-speech-govt-says">
    <title>Section 66A not for curbing freedom of speech, govt says </title>
    <link>https://cis-india.org/internet-governance/news/livemint-akansha-seth-apoorva-livemint-feb-3-2015-section-66a-not-for-curbing-freedom-of-speech-govt-says</link>
    <description>
        &lt;b&gt;Section designed to fight cybercrime and protect the right to life, central government tells Supreme Court.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://www.livemint.com/Politics/XMv1cw3VLrmJZrpLYhIqPL/Section-66A-not-for-curbing-freedom-of-speech-govt-says.html"&gt;article by Akansha Seth and Apoorva was published in Livemint&lt;/a&gt; on February 3, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The central government on Tuesday clarified to the Supreme Court that penal provisions of the Information Technology (IT) Act, 2000, were not intended to curb freedom of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the controversial Section 66A of the IT Act, challenged in the apex court, is designed to fight cybercrime and has nothing to do with any citizen’s freedom of speech and expression, the government said, adding that these provisions seek to protect the right to life of Indian citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s clarification, made in a written submission to the Supreme Court, is significant because the argument made so far in the court by opponents of the controversial section is that they are misused to curb freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The penal provisions deal with online criminal offences like phishing, vishing (voice phishing), spoofing, spamming, and spreading viruses that have a serious potential to not only damage and destroy the computer system of an individual citizen but also bring the functioning of vital organizations and, in extreme cases, even the country to a standstill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The stand of the government is interesting because it comes on a petition filed when police arrested a 21-year-old girl for questioning on Facebook Mumbai’s shutdown after Shiv Sena leader Bal Thackeray’s funeral in 2012. Another girl who “liked” the comment was also arrested. Last May, five students were detained by police for spreading an anti-Narendra Modi photo on WhatsApp.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If 66A, as the government argues does not set any additional limits on freedom of speech and expression, then it is wholly unnecessary, serves no purpose and should be struck down by the honourable court. After all it has never been used to tackle the problem of spam which was the original intent,” said Sunil Abraham, executive director, Centre for Internet and Society, a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The central government has clarified that the phrases annoyance, inconvenience, danger, or obstruction as used in Section 66A have no correlation or connection with any citizen’s freedom of speech and expression. Consequently, if as a result of a citizen exercising his or her freedom of speech and expression, annoyance, inconvenience, danger or obstruction is caused while sending anything by way of a computer resource or a communication device, it will not be a penal offence under section 66A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has also argued that if an individual chooses to misuse the provision for a purpose for which it is not intended or resorts to the expressions inconvenience or annoyance in a casual manner, it would be a case of abuse of the process of law. However, it would not be a ground for declaring the provisions unconstitutional if they are otherwise found to be constitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additional solicitor general Tushar Mehta, appearing for the central government, argued that no one can file a criminal complaint on grounds that they received an information that caused annoyance, inconvenience, etc.—grounds mentioned under section 66A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mehta also suggested that the court could come up with guidelines on how to interpret the section, or such regulations could be framed under section 89 of the IT Act which empowers the controller to make regulations to carry out the purposes of the Act, in consistency with it, after consultation with the Cyber Regulations Advisory Committee and with the previous approval of the central government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mehta argued that authoritative discretion was required because a precise and concise definition of grossly offensive or menacing character—terms used in section 66A—was not possible. “Nobody can allege that they are annoyed by the exercise of someone’s freedom of speech,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gaurav Mishra contributed to this story.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-akansha-seth-apoorva-livemint-feb-3-2015-section-66a-not-for-curbing-freedom-of-speech-govt-says'&gt;https://cis-india.org/internet-governance/news/livemint-akansha-seth-apoorva-livemint-feb-3-2015-section-66a-not-for-curbing-freedom-of-speech-govt-says&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-02-05T13:59:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven">
    <title>WWW: The Hackers’ Haven</title>
    <link>https://cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven</link>
    <description>
        &lt;b&gt;In an increasingly connected world, it pays to be careful when sharing personal information &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This story by Abraham C. Mathews was published in &lt;a class="external-link" href="http://www.businessworld.in/news/business/it/www-the-hackers%E2%80%99-haven/1707848/page-1.html"&gt;BW | Businessworld Issue Dated 09-02-2015&lt;/a&gt;. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last year, Whatsapp changed its encryption algorithm several times and, every time, it was breached,” says Saket Modi, hacker, entrepreneur and CEO of Lucideus Technologies, which just created an app that monitors wayward activity on your smartphone. That’s geekspeak for: “Your WhatsApp chats, including deleted ones, would have been accessible to any hacker worth his salt”. And we are talking about a company that was valued at $19 billion at some point during the year. Only in November 2014 did WhatsApp finally embrace end-to-end encryption, which will ostensibly address the issue.&lt;br /&gt; &lt;br /&gt;Or take the sales claim that every smartphone purchaser has heard — “Android is safe from virus.” That’s not, however, what a joint study by security solutions company Kaspersky and Interpol found. In the first half of 2014, 1,75,442 unique malicious programmes targeted at Android were discovered. Clearly a tribute to the platform on which 85 per cent of smartphones run.&lt;br /&gt; &lt;br /&gt;In a TEDx talk last year titled ‘What’s physically possible in the virtual world’, Modi demonstrated how, with access to your smartphone for barely 20 seconds, he can see everything that has ever happened on your phone — text messages, call log, browsing history, and so on. He also showed how fraudulent emails could be disguised so as to appear to have come from a yahoo.com email address, and how you could be hacked even without being connected to the Internet. “There are only two kinds of people in the world,” he says. “Those who know they have been hacked and those who don’t.”&lt;br /&gt; &lt;br /&gt;&lt;b&gt;Epidemic Proportions&lt;/b&gt;&lt;br /&gt;For cyber security, 2014 was annus horribilis. From celebrities whose intimate pictures were dumped on the Internet, to corporates such as Sony, JP Morgan and Target whose records were hacked into and personal information of millions of their customers compromised, it was the year when the proverbial shit hit the fan. Details (names, numbers, even favourite pizza toppings) of six lakh customers of Domino’s Pizza in France and Belgium were stolen for a $40,000 ransom. One hundred and ten million records (credit card details, social security numbers, along with addresses) from Target were stolen. The company later admitted that its sales were “meaningfully weaker” after the data theft was disclosed. One hundred and forty-five million records were stolen from eBay, 109 million from Home Depot and 83 million from JP Morgan during the year.&lt;br /&gt; &lt;br /&gt;In 2013, a group that calls itself the Syrian Electronic Army hacked into Swedish company TrueCaller’s database. TrueCaller, an app, allows you to identify phone numbers. The data is collected from the contact list of those who download the app, which means, it even has details of those who haven’t downloaded or used the app in any way. Estimates put the number of Indians whose numbers could have been stolen at a million.&lt;br /&gt; &lt;br /&gt;Cyber security is not yet a boardroom topic, says Anil Bhasin, MD, India &amp;amp; Saarc, Palo Alto Networks, which claims to create comprehensive security solutions for users but is fast becoming one with the increase in security breach incidents. Enterprises still use legacy technology that at times is 20 years old, he says, giving the example of banks that sometimes have a layer-3 staple inspection firewall, when they should ideally be running on layer-7.&lt;br /&gt; &lt;br /&gt;When companies store your information, you also benefit. For example, when an e-commerce company does so, online shopping becomes faster and easier. But these companies should invest in measures to protect the information, says Sunil Abraham, executive director of the Centre for Internet and Society in Bangalore. But then again, he says, a lot of breaches, like the celebrity iCloud hack, happen because users are negligent with measures designed to protect them. Passwords, for instance.&lt;br /&gt; &lt;br /&gt;A Pew Research report found that only four out of 10 Internet users changed passwords after the ‘heartbleed’ virus (which found a way to unlock encrypted data) was uncovered in April 2014. Only 6 per cent thought their information was stolen. But, in August, it emerged that a Russian crime ring had amassed 1.2 billion user name-password combinations of 500 million email addresses from 4,20,000 websites. A Kaspersky study found that the number of malicious programmes detected rose 10 times in just six months to 6,44,000 in March 2014. This shows the call for vigil cannot not be more critical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, your online financial payments may be relatively more secure, thanks to Reserve Bank of India’s dogged persistence in continuing with the two-step verification process for electronic payments (a one-time password and PIN verification). The central bank drew a lot of flak for barring taxi app Uber from storing payment information and automatically deducting charges at the end of a ride. But Modi isn’t impressed. He likens the two-step verification to a batsman going onto the pitch wearing just a helmet. “The rest of your body is still exposed,” he says.&lt;br /&gt; &lt;br /&gt;&lt;b&gt;Easy Targets&lt;/b&gt;&lt;br /&gt;Here’s one easy hack that Modi describes. Any app that you download from the app store on your phone asks for a set of permissions, which mostly come as an ‘all or nothing’ option. You either grant all the access it asks for, or you can’t download the app. Suppose, you grant a scrabble app access to your text messages. Your number can then be accessed by the app provider. Now think about how your banking transactions are verified — with a one-time password sent as a text message. With access to your text messages, entering that password would hardly be a challenge for hackers, says Modi. Or, suppose you were to set up a new WhatsApp account with that same number. The verification, like we all know, comes through a one-time password sent to your number. With access to your text messages, the hacker is given a virtual key to your entire WhatsApp history.&lt;br /&gt; &lt;br /&gt;Or, take for instance, an app that requests access to your SD card (the storage card in your phone). With that permission, the app gets access to everything on your SD card, including your most private photos. Modi’s company Lucideus recently came out with an app, UnHack, that scans your phone to see which apps can access what data. If you use the app, you will find that not only can Facebook access the call logs on your phone, but apps like Wunderlist (which organises to-do lists) and Pocket (which stores articles for future offline reading) can access your contacts as well. The apps from TED (of  TED Talks fame) as well as Flipkart can see as well as edit your personal photos and documents.&lt;br /&gt; &lt;br /&gt;Companies —Uber, for instance — have in the past been found to be frivolous with data collected. Late last year, Uber greeted a Buzzfeed reporter who had arrived at the company’s New York headquarters with “There you are — I was tracking you”. No prior permission was sought. A venture capitalist, Peter Sims, had written earlier that his exact whereabouts in New York were displayed to a room full of people as part of a demonstration at a company event in Chicago.&lt;br /&gt; &lt;b&gt;&lt;br /&gt;Information Overload&lt;/b&gt;&lt;br /&gt;Adam Tanner, a Harvard fellow and a Forbes columnist, was at an annual conference of the Direct Marketers Association, where he noticed a list of names of 1.8 million people with erectile dysfunction (ED), along with their email addresses and numbers. The organisers claimed the details were volunteered by the people themselves. Knowing that ED is something that men rarely admit to, he made the organisers an offer — “Let me purchase a list of a thousand people, and write to them to see if they know that they are on such a list.” The organisers refused, saying it would be an immoral use of their data. From this, one can tell that the information came from websites that took their details, promising a cure.&lt;br /&gt; &lt;br /&gt;This, and other similar anecdotes made their way to his recent book, What Stays in Vegas, which deals with the world of personal data and the end of privacy as we know it. When Tanner meets Indians, he brings up matrimonial websites. What surprises him is the volume of information that people disclose. To westerners, details such as sub-caste or blood type, as well as in many cases the admission that a person is HIV+ is an outright breach of privacy. That people would volunteer to put this out in public is shocking. “When you are looking for a suitable match, giving the information may be important at the moment, but you must not forget that once something is on the Internet, it can never be completely deleted,” he warns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what is the problem if somebody has all the details, you may ask. Is the potential risk greater than the possibility of a perfect match? A PTI report from 2009 talks about a confession by an Indian Mujahideen operative who used information from such sites to get a student identity card as well as a driving licence. Mukul Shrivastava, a partner in the forensic practice at EY, gives you another alarming scenario. Let’s say somebody trawls your Facebook, what is the amount of information that such a person can get access to? Your daily routine, your physical movement, your favourite restaurant or whether you will be at home at a certain time (from a status message like “Can’t wait to watch the Devils trouncing Liverpool at ManU Café tonight!”). Even if a physical attack is not on the agenda, much of the information can be used to guess security questions (favourite cat, first school) and find out required details for phone banking (date of birth, email address, mother’s name). An HDFC Bank official says there is a rise in vishing (the voice equivalent of phishing) attacks, where people with access to bank account numbers as well as personal details pose as bank executives and lure customers with special benefits and convince them to divulge their banking passwords.  &lt;br /&gt; &lt;br /&gt;Security is an individual’s responsibility, says Sunil Abraham. “You have to remember that you have volunteered to put the information online,” he says. Information once put online is not private anymore. It’s like making an announcement in a large hall that is broadcast on TV. That’s what the Internet is. And once the Internet gets to know, it can never really be forgotten, says Vishnu Gopal, chief technology officer at MobME, a mobile value-added services provider. It will be available on some weblink or at least on archive.org, which claims to have ‘435 billion pages saved over time’.&lt;br /&gt; &lt;br /&gt;While reclaiming lost information might be difficult, one can still reclaim privacy. Both Facebook and Gmail have options to disable monitoring by other applications. It might be worthwhile to pay the permissions page a visit. Routine password changes, as well as keying them in every time (rather than saving them on the system) might be worth the trouble. That said, nothing works like caution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;An Attacking Refrigerator!&lt;/b&gt;&lt;br /&gt;A year ago, Proofpoint, a US-based security solutions provider, noticed an unusual type of cyber attack. Emails were sent in batches of about a lakh, thrice a day, aimed at slowing down large enterprises. What was unique about this attack was that upto 25 per cent of the volume was sent by devices other than computers, laptops, mobile phones or such devices. Instead, the emails came from everyday consumer electronic items like network routers, televisions, and at least one refrigerator, according to the company, with not more than 10 emails from any one device, making the attack difficult to block. This is now known as the first Internet of Things or IoT-based attack, where connected everyday-use devices are hacked into and used as cyber weaponry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;div&gt;With  the IoT, you have devices talking to one another, opening up multiple  places to be breached, says MobME’s Gopal. From your shoe to T-shirt,  everything becomes a potential bot. India should be concerned. Research  by securities provider Symantec says India tops the list of countries  wherein Distributed Denial of Service (DDoS) attacks originate. DDoS  attacks are those where hundreds of bots target a website (say, an  e-commerce company) on its big discount day, thereby slowing down  traffic to the site. The report says a bot’s services can be bought for  as low as Rs 300 to bring down a site for a few minutes. Monthly  subscription plans are available for lengthier attacks.&lt;/div&gt;
&lt;div&gt;Corporates  can never be too careful, feels Shrivastava who, as part of his  investigations, comes across several instances where companies are  hacked into because of lack of best practices. How many companies have  blocked pen drives on office machinery, he asks. In a tiny device, a  humungous amount of data can be stolen. Till the first incident happens,  nobody realises the importance of security, he says. For example, at  EY, the IT security does not permit copying of the text of emails by the  recipient. Recent reports suggest that the JP Morgan security breach  was the result of neglect of one of its servers in terms of a security  upgrade.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;According to a study by Microsoft,  the estimated loss to enterprises from lost data in 2014 was $491 billion.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;b&gt;You Against The Mafia&lt;/b&gt;&lt;br /&gt;The fight really is about who’s weaker, says Altaf Halde, managing director, Kaspersky Lab-South Asia. “The problem here is the consumer.” Nothing excuses us from not protecting ourselves. That includes getting an anti-virus installed, but most people often disable it when it flags a particular activity that we want to pursue online. &lt;br /&gt; &lt;br /&gt;Halde also brings up the BYOD (bring your own device) culture that is taking root. Asking employees to bring their own devices could help cut costs for a company, but that also brings in their inadequate protection, which could potentially translate into a much higher cost to the company, he says. &lt;br /&gt; &lt;br /&gt;On the other side of the ring is the virtual underground mafia that profits from all types of data that get compromised — details of one’s sexual preferences, favourite restaurants or credit card details. Modi says in underground circles, the going rate for a stolen credit card number is $2.2 for a Visa, $2.5 for a MasterCard and $3 for an AmEx number. Transactions are made through crypto-currencies such as bitcoins, making them virtually untraceable.&lt;br /&gt; &lt;br /&gt;As Modi says, the ideal scenario would be for all of us to throw away our smartphones and live an entirely offline existence. “But since that isn’t feasible, let’s embrace the risk, but with adequate measures to ensure that we are not affected.”&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven'&gt;https://cis-india.org/internet-governance/news/business-world-9-2-2015-abraham-c-mathews-www-the-hackers-haven&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-05T02:20:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection">
    <title>Winter School on Privacy, Surveillance and Data Protection </title>
    <link>https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection</link>
    <description>
        &lt;b&gt;The   Centre   for   Communication   Governance   (CCG)   in   collaboration   with   the  UNESCO  Chair  on  Freedom  of  Communication  and  Information at  the  University  of  Hamburg  and  the  Hans   Bredow   conducted a week-long winter school on 'Privacy, Surveillance and Data Protection at National Law University, Delhi, from January 19 to 23, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The winter school focused on the law governing privacy in the EU and in India and covered issues ranging from surveillance to data protection. German and Indian members of faculty used interactive methods of teaching and group activities in each session, to help students from Germany, India and Israel contribute to the classroom and learn from each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav Acharya was a speaker at the event. He spoke on 'privacy theory'. More &lt;a class="external-link" href="http://www.nludelhi.ac.in/wp-content/uploads/CCG-at-NLUD-Call-for-Delhi-Winter-School.pdf"&gt;information here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection'&gt;https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-07T00:37:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years">
    <title>350% surge in Cyber crimes in last 3 years</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years</link>
    <description>
        &lt;b&gt;India’s registered cyber crimes leapt 350% in three years but the legal system is struggling to cope with more and more lawbreakers exploiting the anonymity of the internet.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/350-surge-in-cyber-crimes-in-last-3-years/article1-1308635.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on January 20, 2015. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;National Crime Records Bureau statistics show number of recorded cases of cyber crime jumped to 4,356 from 966 in the three years up to 2013, with India being more susceptible to digital attacks because of the increasing number of net users in the fast-growing economy.&lt;br /&gt;&lt;br /&gt;“Illegal gains” and “harassment” are the top cyber crime motives, the data reveal, though the majority of the crimes were registered under the “others” category — 2,144 cases in 2013. Analysts say such a high number of cases being pigeonholed in this section implies current laws and regulations aren’t detailed enough to tackle cyber crime.  The challenge is daunting for India — estimated to have 302 million internet users by the end-2014 and set to have the second largest number of netizens in the world after China this year.&lt;br /&gt;&lt;br /&gt;Data show that the age group of 18-30 accounts for the highest percentage of cyber crime with 1,638 persons arrested out of 3,301 in 2013.  The surge in cyber crime may also have been brought on by inefficiencies in the legal system with activists challenging some cyber laws considered too draconian for a modern, democratic society.&lt;br /&gt;&lt;br /&gt;Various sections of the IT Act were deeply flawed as they were “copy-paste jobs” from British and American laws, said Sunil Abraham, founder-director of Bengaluru-based Centre for Internet &amp;amp; Society.  To prevent such abuses, the Supreme Court ruled in 2013 that arrests could only be made after clearance from an inspector general of police in a city and a superintendent of police in a district.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Devanik Saha is Data Editor at The Political Indian; Indiaspend.org is a data-driven, public-interest journalism non-profit)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years'&gt;https://cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-07T16:13:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights">
    <title>Security and Surveillance – Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) on December 19, 2014 held a talk on “Security and Surveillance – Optimizing Security while Safeguarding Human Rights.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The talk focused on a project that is being undertaken by CIS in collaboration with Privacy International, UK. Initiated in 2014, the project seeks to study the regulatory side of surveillance and related technologies in the Indian context. The main objective of the project is to initiate dialogue on surveillance and security in India, government regulation, and the processes that go into the same. The talk saw enthusiastic participation from civil society members, policy advisors on technology, and engineering students.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the event it was highlighted that requirements of judicial authorization, transparency and proportionality are currently lacking in the legal regime for surveillance in India and at the same time India has a strong system of ‘security’ that service providers must adhere to – which works towards enhancing cyber security in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discussions played out with regard to how most of the nine intelligence agencies that are authorized to intercept information in India are outside the ambit of parliamentary oversight, the RTI and the CAG, making them virtually unaccountable to the Indian public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another conversation focused on the sharing of information between various intelligence agencies within the country, and the fact that this area is virtually unregulated. The discussion then steered to cyber-security in general, emerging technologies used by the Government of India for surveillance, cooperative agreements for surveillance technologies that India has with other countries, the export and import of such technologies from India, and most importantly, the role of service providers in the surveillance debate, and the regulations they are subject to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A common theme seemed to be emerging from the discussion was that the agencies responsible for regulating information interception and surveillance in the country are shockingly unaccountable to the Indian public. As an active civil society member noted today - &lt;i&gt;“There is no oversight/monitoring of the agencies themselves, so there’s no way anyone would even know of how many instances of surveillance or unauthorized interception have actually occurred.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The talk successfully concluded with inputs from members of the audience, and a broad consensus on the fact that the Government of India would have to adhere to stronger regulatory standards, harmonized surveillance standards, stronger export and import certification standards, etc., in order to make surveillance in India more transparent and accountable. As was stated at the talk, &lt;i&gt;“We don’t have a problem with the concept of surveillance per se, - it has more to do with its problematic implementation”.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights'&gt;https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-13T02:41:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india">
    <title>Symposium on Human Rights and the Internet in India</title>
    <link>https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india</link>
    <description>
        &lt;b&gt;On January 17, 2015 the Center for Communication Governance at National Law University, Delhi in collaboration with the UNESCO Chair on Freedom of Communication and Information at the University of Hamburg hosted a pubic symposium on “Human Rights and Internet in India” as a Network of Centers (NoC) regional event. Bhairav Acharya was a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;See the &lt;a class="external-link" href="http://networkofcenters.net/sites/networkofcenters.net/files/dehli-concept-note.pdf"&gt;concept note here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The event convened a diverse group of collaborators working on issues of Privacy, Surveillance, Data Protection, Freedom of Expression and Intermediary Liability in India, the surrounding region, and internationally.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda | Saturday, January 17 | Public Symposium&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Opening words&lt;br /&gt; &lt;i&gt;Prof. (Dr.) Ranbir Singh, Vice Chancellor, National Law University, Delhi&lt;/i&gt;&lt;br /&gt; &lt;i&gt;Prof. (Dr.) Wolfgang Schulz, Director, Alexander von Humboldt Institute for Internet &amp;amp; Society &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;b&gt;17:45 – 19:00 Panel I: Surveillance &amp;amp; Databases: Experiences &amp;amp; Privacy&lt;/b&gt;&lt;/b&gt;&lt;br /&gt; The panel will explore how surveillance in India might become more  consistent with international human rights standards and Indian  constitutional values. It will also discuss the consequences of  ubiquitous database programs for citizens’ human rights. This will  include comparative perspectives around similar problems and a  discussion of privacy-compatible practices in other countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists:&lt;/b&gt;&lt;br /&gt; &lt;i&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Bhairav Acharya, Lawyer, Supreme Court of India and Adviser Centre for Internet &amp;amp; Society, Bangalore&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Saikat Datta, Editor (National Security), Hindustan Times&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Professor KS Park, Former Commissioner, Korea Communications Standards Commission and Professor, Korea University Law School&lt;/i&gt;&lt;br /&gt; &lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;b&gt;&lt;b&gt;19:00 – 20:15 Panel II: Unpacking the Intermediary Liability Debate in India&lt;/b&gt;&lt;/b&gt;&lt;br /&gt; The panel will focus on the legal framework governing Internet platforms  in India, especially with regard to online content and its implications  for rights of the citizens. It has been argued that the current legal  framework creates incentives for online intermediaries to take down  content even when no substantive notice or legitimate reasons have been  offered. The panel will consider the debate around intermediary  liability in India in light of the ongoing litigation at the Supreme  Court. It will reflect on the international experience with intermediary  liability legislation and discuss how to ensure that laws support an  innovative and competitive environment for intermediaries, while  ensuring that they prioritize the preservation of their users’ human  rights.&lt;br /&gt; &lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;b&gt;Panelists:&lt;/b&gt;&lt;br /&gt; &lt;i&gt;Dr. Joris van Hoboken, Fellow, Information Law Institute at NYU School of Law&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Professor (Dr.) Wolfgang Schulz, Director, Alexander von Humboldt Institute for Internet &amp;amp; Society (HIIG)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Raman Jit Singh Chima, Lawyer&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Chinmayi Arun and Sarvjeet Singh, Centre for Communication Governance at National Law University, Delhi&lt;/i&gt;&lt;b&gt; &lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india'&gt;https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-07T00:50:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/january-2015-bulletin">
    <title>January 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/january-2015-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of January can be accessed below.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) welcomes you to the first issue of the newsletter (January 2015). Archives of our newsletters can be accessed 	at: &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Highlights &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Forbes India in an article titled “&lt;a href="http://forbesindia.com/article/special/minds-that-%28should%29-matter/39289/2"&gt;Minds that (should) matter&lt;/a&gt;” names Sunil Abraham as one of the Thinkers who best explain a rapidly-changing India to the world (and the world to India).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Subhashish Panigrahi		&lt;a href="https://cis-india.org/openness/news/opensource-2015-award-winners"&gt;won the 2015 Opensource.com Community Awards&lt;/a&gt; under the category 		'People's Choice Awards'. &lt;/li&gt;
&lt;li&gt; Sumandro Chattapadhyay &lt;a href="https://cis-india.org/openness/blog/sumandro-chattapadhyay.pdf"&gt;has joined CIS team&lt;/a&gt; as Research Director. 		Sumandro has replaces Nishant Shah who stepped down from the position. &lt;/li&gt;
&lt;li&gt; Rishika on behalf of CIS 		&lt;a href="http://cis-india.org/accessibility/blog/disability-exceptions-in-copyright-legislations"&gt; prepared an analysis of the disability exceptions in Copyright Legislations &lt;/a&gt; . The blog post provides in detail the country-wise exceptions in copyright legislations. &lt;/li&gt;
&lt;li&gt; NVDA team &lt;a href="https://cis-india.org/accessibility/blog/report-on-training-e-speak-malayalam-with-nvda"&gt;conducted a training programme&lt;/a&gt; on Malayalam eSpeak with NVDA in Thiruvananthapuram on January 24 and 25, 2015. Chakshumathi's main trainer Akhil M. took eSpeak Malayalam classes and 		Dr. Homiyar took classes on NVDA and accessible equipment.&lt;/li&gt;
&lt;li&gt;The Department of Industrial Policy and Promotion, Government of India invited comments on the First Draft of India's National IPR Policy. CIS made 	its &lt;a href="https://cis-india.org/a2k/blogs/national-ipr-policy-series-cis-comments-to-the-first-draft-of-the-national-ip-policy"&gt;submission&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;As part of the Pervasive Technologies project, Nehaa Chaudhari has produced a research methodology document 	&lt;a href="http://cis-india.org/a2k/blogs/pervasive-technologies-project-working-document-series-document-2-literature-review-on-competition-law-ipr-access-to-100-mobile-devices-1"&gt; which maps the existing literature around questions of competition law intersecting with intellectual property law on the specific issue of enabling 		access to sub hundred dollar mobile devices &lt;/a&gt; .&lt;/li&gt;
&lt;li&gt;Maggie Huang, an intern at CIS as part of the Pervasive Technologies project has written	&lt;a href="http://cis-india.org/a2k/blogs/beyond-alcohol-and-angel-investors"&gt;a blog entry&lt;/a&gt; which documents, synthesizes, and analyses learnings from 	attending various music industry trade conferences.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;CIS-A2K team on December 28, 2014 &lt;a href="http://cis-india.org/a2k/blogs/telugu-wikimedia-hackathon-2014"&gt;organized a MediaWiki hackathon event&lt;/a&gt; for Telugu Wikimedia community members to enhance their skills and understanding of technical matters related to MediaWiki usage. The theme of the workshop was “Mediawiki, its extensions and tools to work around” and it aimed at allowing Wikipedians to use MediaWiki tools more effectively.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Subhashish Panigrahi authored an op-ed that highlights the need for taking Odia language to the international fora instead of keeping it confined in 	the books. The op-ed was &lt;a href="http://cis-india.org/openness/blog/op-ed-samaja-jan-2015"&gt;published in the Samaja&lt;/a&gt; on January 30, 2015. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; A 		&lt;a href="https://cis-india.org/openness/blog/indian-national-academy-journals-december-2014-subbiah-arunachalam-perumal-ramamoorthi-subbiah-gunasekaran-heads-i-win-tails-you-lose"&gt; journal article &lt;/a&gt; by Subbiah Arunachalam, Perumal Ramamoorthi and Subbiah Gunasekaran the steps taken by scientists and librarians in the West to reclaim ease of access 		to research findings with what is happening in India along with a few suggestions was published by the Indian National Science Academy Journals. &lt;/li&gt;
&lt;li&gt; The Supreme Court, in &lt;i&gt;Sabu George v. Union of India and Ors&lt;/i&gt;. (WP (C) 341/2008), is looking into the presence of material regarding pre-natal 		sex determination on search engines such as Google, Bing, and Yahoo that has been falling foul of section 22 of the Pre-Natal Diagnostic Techniques Act, 1994 as amended in 2002. Geeta Hariharan and Balaji Subramanian		&lt;a href="https://cis-india.org/internet-governance/blog/search-engine-and-prenatal-sex-determination"&gt;analyse this in their blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;As part of its Making Methods for Digital Humanities project, CIS-RAW organized two consultations on new figures of learning in the digital context. 	For a proposed journal issue on the theme of 'bodies of knowledge' which draws upon these conversations, participants were invited to write short sketches 	on these figures of learning. Tejas Pande &lt;a href="http://cis-india.org/raw/figures-of-learning-the-visual-designer2"&gt;wrote an abstract which examines&lt;/a&gt; the figure of the visual designer, and emerging practices of mapmaking. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is being printed. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Monthly Update&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/january-2015-nvda-report.pdf"&gt;January 2015 Report&lt;/a&gt; (Suman Dogra; January 31, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Event Organized&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/report-on-training-e-speak-malayalam-with-nvda"&gt;Training of Malayalam eSpeak with NVDA&lt;/a&gt; (Co-organized by CIS, DAISY Forum of India and Chakshumathi Assistive Technology Centre; Thiruvananthapuram; January 24-25, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Other&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/disability-exceptions-in-copyright-legislations"&gt; Disability Exceptions in Copyright Legislations &lt;/a&gt; (Rishika; January 12, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/response-to-rti-applications-from-different-states-on-accessibility"&gt; Response to RTI Applications from Different States on Accessibility &lt;/a&gt; (Anandhi Viswanathan; January 31, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pervasive Technologies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the Pervasive Technologies project, Maggie Huang conducted interviews with fabless semiconductor industry professionals in Taiwan. The findings 	from the samples are highlighted in four part series. The third and fourth parts have been published:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/pervasive-technologies-project-working-document-series-document-2-literature-review-on-competition-law-ipr-access-to-100-mobile-devices-1"&gt; Pervasive Technologies Project Working Document Series: Document 2 Literature Review on Competition Law + IPR + Access to &amp;lt; $100 Mobile Devices &lt;/a&gt; (Nehaa Chaudhari; January 1, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/relationship-between-app-developers-and-app-platforms-an-intellectual-property-perspective"&gt; Relationship between App Developers and App Platforms: An Intellectual Property Perspective &lt;/a&gt; (Anubha Sinha; January 7, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/beyond-alcohol-and-angel-investors"&gt; Beyond Alcohol and Angel Investors: Building Business Models in an Age of Mobile Music Streaming (Conference Learnings) &lt;/a&gt; (Maggie Huang; January 20, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/the-development-of-the-national-ipr-policy"&gt; National IPR Policy Series: The Development of the National IPR Policy &lt;/a&gt; (Nehaa Chaudhari; January 22, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/rti-responses-mhrd-ip-chairs-details-of-funding-and-expenditure"&gt; RTI Responses - MHRD IP Chairs: Details of Funding &amp;amp; Expenditure &lt;/a&gt; (Nehaa Chaudhari; January 31, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/national-ipr-policy-series-cis-comments-to-the-first-draft-of-the-national-ip-policy"&gt; National IPR Policy Series: CIS Comments to the First Draft of the National IP Policy &lt;/a&gt; (Nehaa Chaudhari; January 31, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/seventh-global-ip-convention"&gt;Global Intellectual Property Convention&lt;/a&gt; (Organized by ITAG Solutions; Mumbai; January 15 - 17, 2015). Rohini Lakshané attended the event. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/library-and-information-professionals-summit-2015"&gt; Library and Information Professionals Summit (LIPS) 2015 &lt;/a&gt; (Organized by Society for Library Professionals, National Law University Delhi with UN Information Centre for India &amp;amp; Bhutan and Special Library 		Association (USA), Asian Chapter; January 23 - 24, 2015; New Delhi). Nehaa Chaudhari was on a panel discussing Internet Technology and Challenges for Libraries in IPR Regime. She made a presentation on		&lt;a href="http://cis-india.org/a2k/news/library-and-information-professionals-summit-2015"&gt;Technology (Internet?), Libraries and the Law (?)&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/announcing-the-institutional-partner-for-the-global-congress-on-intellectual-property-and-the-public-interest-2015"&gt; Announcing the Institutional Partner for the Global Congress on Intellectual Property and the Public Interest 2015 &lt;/a&gt; (Organized by the National Law School of India University; New Delhi; December 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Op-ed&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/op-ed-samaja-jan-2015"&gt; ଓଡ଼ିଆ ଭାଷା ପାଇଁ 			ଅନ୍ତର୍ଜାତୀୟ ପ୍ରକଳ୍ପ &lt;/a&gt; (Subhashish Panigrahi; The Samaja, January 31, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/telugu-wikimedia-hackathon-2014"&gt;Telugu Wikimedia Hackathon 2014&lt;/a&gt; (Rahmanuddin Shaik; January 31, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/telugu-wikimedia-hackathon-2014"&gt;Telugu Wikimedia Hackathon 2014&lt;/a&gt; (Rahmanuddin Shaik; January 31, 2015). &lt;i&gt;The event was conducted on December 28, 2014. However, the blog post was published in January 2015&lt;/i&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/the-hans-india-december-31-2014-works-of-veerasalingam-pantulu-on-web"&gt; Works of Veerasalingam Pantulu on web &lt;/a&gt; (Hans India; January 1, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/zee-news-january-9-2015-centre-should-partner-local-communities-in-digital-india"&gt; Centre should partner local communities in 'Digital India': Expert &lt;/a&gt; (IANS and mirrored in Zee News; January 9, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/the-times-of-india-january-20-2015-sandhya-soman-musician-donates-gwalior-gharana-songs-to-free-e-library"&gt; Musician donates Gwalior Gharana songs to free e-library &lt;/a&gt; (Times of India; January 20, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/opensource-2015-award-winners"&gt;2015 Opensource.com Community Awards&lt;/a&gt; : Every year, Opensource.com awards people from our community who have excelled in contributing and sharing stories about open source. Subhashish 		Panigrahi from the CIS-A2K team won the award under the category 'People's Choice Awards'. &lt;/li&gt;
&lt;li&gt;CIS-A2K team also &lt;a href="http://stats.wikimedia.org/EN/TablesWikipediaTE.htm"&gt;published the Telugu Wikipedia Stats tables&lt;/a&gt;. Most metrics have been collected from a partial dump (aka stub dump), which contains all revisions of every article, meta data, but no page content.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/citizen-media-summit-2015"&gt;Citizen Media Summit 2015&lt;/a&gt; (Organized by Global Voices; January 24 - 25, 2015). Subhashish Panigrahi was a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Journal Article&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/indian-national-academy-journals-december-2014-subbiah-arunachalam-perumal-ramamoorthi-subbiah-gunasekaran-heads-i-win-tails-you-lose"&gt; Heads I Win, Tails You Lose: The Intransigenc of STM Publishers &lt;/a&gt; (Subbiah Arunachalam, Perumal Ramamoorthi and Subbiah Gunasekaran; Indian National Science Academy Journals, &lt;i&gt;Proc Indian Natn SciAcad&lt;/i&gt; 80 No. 5 		December 2014 pp. 919-929). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles and Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/global-voices-december-30-2014-indians-plead-for-net-neutrality-as-aitel-raises-data-charges"&gt; Indians Plead for #NetNeutrality as Airtel Raises Data Charges &lt;/a&gt; (Subhashish Panigrahi; Global Voices; December 30, 2014).		&lt;i&gt;The article was published in the month of December but mirrored on CIS website in January&lt;/i&gt;. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/global-voices-january-6-2015-subhashish-panigrahi-indian-netizens-criticize-online-censorship-of-jihadi-content"&gt; Indian Netizens Criticize Online Censorship of 'Jihadi' Content &lt;/a&gt; (Subhashish Panigrahi; Global Voices; January 6, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights"&gt; Security and Surveillance - Optimizing Security while Safeguarding Human Rights &lt;/a&gt; (Elonnai Hickok; January 19, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/search-engine-and-prenatal-sex-determination"&gt; Search Engine and Prenatal Sex Determination: Walking the Tight Rope of the Law &lt;/a&gt; (Geetha Hariharan and Balaji Subramanian; January 29, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/events/security-governments-data-technology-policy"&gt; Security, Governments, and Data: Technology and Policy &lt;/a&gt; (Organized by CIS and Observer Research Foundation; January 8, 2015, New Delhi). Sunil Abraham, Pranesh Prakash, Elonnai Hickok, Bhairav Acharya and 		Nehaa Chaudhari participated in this event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india"&gt; Symposium on Human Rights and the Internet in India &lt;/a&gt; (Organized by the Center for Communication Governance at National Law University, Delhi in collaboration with the UNESCO Chair on Freedom of 		Communication and Information at the University of Hamburg; New Delhi; January 17, 2015). Bhairav Acharya was a panelist. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection"&gt; Winter School on Privacy, Surveillance and Data Protection &lt;/a&gt; (Organized by the Centre for Communication Governance (CCG) in collaboration with the UNESCO Chair on Freedom of Communication and Information at the 		University of Hamburg and the Hans Bredow; Delhi; January 19 - 23, 2015). Bhairav Acharya was a facilitator.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/assocham-national-council-on-it-ites"&gt;ASSOCHAM National Council on IT / ITes&lt;/a&gt; (Organized by ASSOCHAM; New Delhi; January 30, 2015). Geetha Hariharan participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/overview-constitutional-challenges-on-itact"&gt; Overview of the Constitutional Challenges to the IT Act &lt;/a&gt; (Pranesh Prakash; December 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling"&gt; Reply to RTI filed with BSNL regarding Network Neutrality and Throttling &lt;/a&gt; (Tarun Krishnakumar; December 22, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-times-of-india-jan-1-2015-kim-arora-government-blocks-32-websites-to-check-isis-propaganda"&gt; Government blocks 32 websites to check ISIS propaganda &lt;/a&gt; (Kim Arora; The Times of India; January 1, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/mumbai-mirror-jaison-lewis-jan-1-2015-internet-users-fume-as-govt-blocks-32-sites"&gt; Internet users fume as govt blocks 32 sites &lt;/a&gt; (Jaison Lewis; Mumbai Mirror; January 1, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/bbc-january-2-2015-india-jihadi-web-blocking-causes-anger"&gt; India 'jihadi' web blocking causes anger &lt;/a&gt; (BBC; January 2, 2015). This was also mirrored in &lt;a href="http://thepuffington.com/anger-at-india-website-blocking/"&gt;Puffington Post&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/india-today-january-1-2015-govt-cracks-down-on-cyber-jehad-network-blocks-access-to-32-websites"&gt; Govt cracks down on cyber jehad network, blocks access to 32 websites &lt;/a&gt; (India Today, January 1, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet"&gt; Indian Government still blocks 20+ websites - Indian Censorship on Internet &lt;/a&gt; (Times of Assam; January 2, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-january-20-2015-devanik-saha-indiaspend-350-per-cent-surge-in-cyber-crimes-in-last-3-years"&gt; 350% surge in Cyber crimes in last 3 years &lt;/a&gt; (Devanik Saha &amp;amp; Indiaspend.org; Hindustan Times; January 20, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/times-of-india-january-31-2015-toi-literary-kicks-off-today"&gt; TOI literary festival kicks off today &lt;/a&gt; (The Times of India; January 31, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social 	sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new 	conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Staff Movement&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Sumandro Chattapadhyay has joined CIS as Research Director. His academic interests span over topics of history and politics of informatics in India, 	new media and technology studies, and data infrastructures and economies. He is also keenly interested in questions and techniques of digital humanities. 	Recently, Sumandro has completed a study on &lt;a href="http://ajantriks.github.io/oddc/"&gt;policy and practices of open data in India&lt;/a&gt; as part of the Open 	Data Research Network managed by the World Wide Web Foundation. He is an involved member of DataMeet, a leading community of open data and data science 	enthusiasts from India. Sumandro studied economics in Visva-Bharati, Shantiniketan, and in Jawaharlal Nehru University, New Delhi. He has variously worked on topics of urban development, information technology in governance, data visualisation, and early electronic governance in India with	&lt;a href="http://www.mod.org.in/"&gt;MOD Institute&lt;/a&gt;, &lt;a href="http://www.azimpremjiuniversity.edu.in/SitePages/index.aspx"&gt;Azim Premji University&lt;/a&gt; and 	the &lt;a href="http://sarai.net/"&gt;Sarai Programme&lt;/a&gt; at the Centre for the Study of Developing Societies. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/raw/figures-of-learning-the-visual-designer2"&gt;Figures of Learning: The Visual Designer&lt;/a&gt; (Tejas Pande; January 30, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and 	improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at	&lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/january-2015-bulletin'&gt;https://cis-india.org/about/newsletters/january-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>NVDA</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-02-26T17:02:23Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
