<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2126 to 2140.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-chennai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world">
    <title>Comparative Analysis of DNA Profiling Legislations from Across the World</title>
    <link>https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world</link>
    <description>
        &lt;b&gt;With the growing importance of forensic data in law enforcement and research, many countries have recognized the need to regulate the collection and use of forensic data and maintain DNA databases. Across the world around 60 countries maintain DNA databases which are generally regulated by specific legislations. Srinivas Atreya provides a broad overview of the important provisions of four different legislations which can be compared and contrasted with the Indian draft bill.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Efforts to regulate the collection and use of DNA data were started in India in 2007 by the Centre for DNA Fingerprinting and Diagnostics through their draft DNA Profiling Bill. Although the bill has evolved from its original conception, several concerns with regard to human rights and privacy still remain. The draft bill heavily borrows the different aspects related to collection, profiling and use of forensic data from the legislations of the United States, United Kingdom, Canada and Australia.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comparative-analysis-dna-profiling-bill.xlsx" class="internal-link"&gt;&lt;b&gt;Click&lt;/b&gt; to find an overview of a comparative analysis of DNA Profiling Legislations&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world'&gt;https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>atreya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:30:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet">
    <title>CIS highlights changes ushered in by the Internet</title>
    <link>https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet</link>
    <description>
        &lt;b&gt;As part of its fifth anniversary celebrations, the Centre for Internet and Society (CIS) has organised an exhibition showcasing its accomplishments, besides a series of talks by experts on the changes ushered in by the Internet. The exhibition will remain open till Thursday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/cis-highlights-changes-ushered-in-by-the-internet/article4737997.ece"&gt;published in the Hindu&lt;/a&gt; on May 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, a talk will be held at 6 p.m. on “Cyber security, privacy  and surveillance”. Also, Laird Brown, strategic planner and writer, and  Purba Sarkar, associate producer with the cyber security film project,  will make presentations on cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The valedictory will have talks by Kannada writer Chandrashekar Kambar  on “Kannada in modern era”, while member of Kannada Software Committee  U.B. Pavanja will speak on “From palm leaf to tablet”. This will be  followed by a Carnatic music programme by Nirmita Narasimha. The CIS has  also invited the public to be its auditors by displaying its account  books and contracts, which shows how it has spent the Rs. 13.13 crore  received from donors. The exhibition is open from 10 a.m. to 8 p.m.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet'&gt;https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-22T06:06:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts">
    <title>NGO invites public to peruse its accounts</title>
    <link>https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts</link>
    <description>
        &lt;b&gt;Domlur-based The Centre for Internet and Society opens its books for anyone to see and track every rupee of the Rs 13.13 crore it received from donors.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Vandana Kamath was&lt;a class="external-link" href="http://www.bangaloremirror.com/index.aspx?page=article&amp;amp;sectid=10&amp;amp;contentid=201305182013051801054529377725430"&gt; published in the Bangalore Mirror&lt;/a&gt; on May 18, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In an unusual but ‘clean’ way of celebrating its fifth anniversary, a  city-based non-governmental organisation (NGO) has invited the general  public to inspect its books of accounts, check out its list of donors  and view contracts. At a time when several NGOs are under the scanner  for trying to shroud financial transactions in secrecy, The Centre for  Internet and Society (CIS), a non-profit research organisation that  defends consumer rights on the Internet, has upped its policy of  transparency a notch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Located in Domlur and largely patronised by Bangalore’s tech  community, CIS’s books of accounts will be available for public scrutiny  during its fifth anniversary celebrations from May 20 to 23 and will  show how the NGO has spent the Rs 13.13 crore it has received from  donors since its launch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to Bangalore Mirror, CIS executive director Sunil Abraham  admitted that the move was to dispel any lingering doubts on the motives  of his organisation. “These days, many NGOs have been in the news for  misappropriation of donations,” Abraham said. “We want to keep our books  of accounts open to the public. Apart from details like salaries drawn  by each board member, many other details like contractual obligations  with entities, details of donors and official travel expenses by board  members can also be obtained. Anybody can walk into our office and ask  to see the accounts. A photocopy of all the details will also be given  to them at the earliest.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, a recent debate in the Rajya Sabha centred on the lack of  transparency among NGOs receiving contributions from overseas after the  Foreign Contribution Regulation Act (FCRA) was passed in 2010. With 17  donors, a majority of who are from overseas, CIS ensures that every  rupee obtained is well spent and accounted for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have made public a list of donors and their share of  contributions to our society,” Abraham said. “This will give everybody a  clear picture of the funds we receive and where and how it is being  spent.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is primarily funded by the Kusuma Trust, The Wikimedia  Foundation and The Hans Foundation among others. The society was founded  in 2008 and has 17 staff of whom four are based in Delhi and the rest  in Bangalore. The society also has seven distinguished fellows and five  fellows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It conducts policy research programmes on topics like  accessibility, access to knowledge, openness, internet governance and  telecom. The society has churned out 641 research items in five years  that include essays, books and blog entries on the topics. It has also  conducted research on the accessibility of the e-governance system and  has suggested ways to make it more disabled-friendly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its anniversary celebrations, the society will hold a  four-day event in its office starting May 20 that will include an  exhibition showcasing its activities so far. Various artists like Kiran  Subbaiah, Tara Kelton, Navin Thomas and Abhishekh Hazra are expected to  participate and give live demonstrations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts'&gt;https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-21T14:38:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting">
    <title>Report on the 3rd Privacy Round Table meeting</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting</link>
    <description>
        &lt;b&gt;This report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18th May 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In furtherance of Internet Governance multi-stakeholder Initiatives and Dialogue in 2013, the Centre for Internet and Society (CIS) in collaboration with the Federation of Indian Chambers of Commerce and Industry (FICCI), and the Data Security Council of India (DSCI), is holding a series of six multi-stakeholder round table meetings on “privacy” from April 2013 to August 2013. The CIS is undertaking this initiative as part of their work with Privacy International UK on the SAFEGUARD project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the CIS and DSCI were members of the Justice AP Shah Committee which created the “Report of Groups of Experts on Privacy”. The CIS has recently drafted a Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India. The CIS has also volunteered to champion the session/workshops on “privacy” in the meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy, DSCI´s paper on “Strengthening Privacy Protection through Co-regulation” and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;New Delhi Roundtable: 13 April 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: 20 April 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: 18 May 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: 15 June 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: 13 July 2013&lt;/li&gt;
&lt;li&gt;New Delhi Final Roundtable and National Meeting: 17 August 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Following the first two Privacy Round Tables in Delhi and Bangalore, this report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18&lt;/span&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;span&gt; May 2013.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Overview of DSCI´s paper on ´Strengthening Privacy Protection through Co-Regulation´&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table meeting began with an overview of the paper on “Strengthening Privacy Protection through Co-Regulation” by the Data Security Council of India (DSCI). In particular, the DSCI pointed out that although the IT (Amendment) Act 2008 lays down the data protection provisions in the country, it has its limitations in terms of applicability, which is why a comprehensive privacy law is required in India. The DSCI provided a brief overview of the Report of the Group of Experts on Privacy (drafted in the Justice AP Shah Committee) and argued that in light of the UID scheme, NATRGID, DNA profiling and the Central Monitoring System (CMS), privacy concerns have arisen and legislation which would provide safeguards in India is necessary. However, the DSCI emphasized that although they support the enactment of privacy legislation which would safeguard Indians from potential abuse, the economic value of data needs to be taken into account and bureaucratic structures which would hinder the work of businesses should be avoided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI supported the enactment of privacy legislation and highlighted its significance, but also emphasized that such a legal framework should support the economic value of data. The DSCI appeared to favour the enactment of privacy legislation as it would not only oblige the Indian government to protect individuals´ sensitive personal data, but it would also attract more international customers to Indian online companies. That being said, the DSCI argued that it is important to secure a context for privacy based on Indian standards, rather than on global privacy standards, since the applicability of global standards in India has proven to be weak. The privacy bill should cover all dimensions (including, but not limited to, interception and surveillance) and the misuse of data should be legally prevented and prohibited. Yet, strict regulations on the use of data could potentially have a negative effect on companies’ competitive advantage in the market, which is why the DSCI proposed a co-regulatory framework – if not self-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular, the DSCI argued that companies should be obliged to provide security assurances to their customers and that regulation should not restrict the way they handle customers´ data, especially since customers &lt;i&gt;choose &lt;/i&gt;to use a specific service in every case. This argument was countered by a participant who argued that in many cases, customers may not have alternative choices for services and that the issue of “choice” and consent is complicated. Thus it was argued that companies should comply with regulations which restrict the manner with which they handle customers´ data. Another participant argued that a significant amount of data is collected without users´ consent (such as through cookies) and that in most cases, companies are not accountable in regards to how they use the data, who they share it with or how long they retain it. Another participant who also countered the co-regulatory framework suggested by the DSCI argued that regulations are required for smartphones, especially since there is currently very low accountability as to how SMS data is being used or shared. Other participants also argued that, in every case, individual consent should be acquired prior to the collection, processing, retention, and disclosure of data and that that individual should have the right to access his/her data and make possible corrections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI firmly supported its position on co-regulation by arguing that not only would companies provide security assurances to customers, but that they would also be accountable to the Privacy Commissioner through the provision of a detailed report on how they handle their customers´ data. Furthermore, the DSCI pointed out that in the U.S. and in Europe, companies provide privacy policies and security assurances and that this is considered to be adequate. Given the immense economic value of data in the Digital Age and the severe effects regulation would have on the market, the DSCI argued that co-regulation is the best solution to ensure that both individuals´ right to privacy and the market are protected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on co-regulation proceeded with a debate on what type of sanctions should be applied to those who do not comply with privacy regulations. However, a participant argued that if a self-regulatory model was enforced and companies did not comply with privacy principles, the question of what would happen to individuals´ data would still remain. It was argued that neither self-regulation nor co-regulation provides any assurances to the individual in regards to how his/her data is protected and that once data is breached, there is very little that can be done to eliminate the damage. In particular, the participant argued that self-regulation and co-regulation provide very few assurances that data will not be illegally disclosed and breached. The DSCI responded to this argument by stating that in the case of a data breach, the both the Privacy Commissioner and the individual in question would have to be informed and that this issue would be further investigated. Other participants agreed that co-regulation should not be an option and argued that the way co-regulation would benefit the public has not been adequately proven.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI countered the above arguments by stating that the industry is in a better position to understand privacy issues than the government due to the various products that it produces. Industries also have better outreach than the Indian government and could enhance awareness to both other companies and individuals in terms of data protection, which is why the code of practice should be created by the industry and validated by the government. This argument was countered by a participant who stated that if the industry decides to participate in the enforcement process, this would potentially create a situation of conflict of interest and could be challenged by the courts in the future. The participant argued that an industry with a self-regulatory code of practice may be problematic, especially since there would be inadequate checks and balances on how data is being handled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant argued that the Indian government does not appear to take responsibility for the right to privacy, as it is not considered to be a fundamental human right; this being said, a co-regulatory framework could be more appropriate, especially since the industry has better insights on how data is being protected on an international level. Thus it was argued that the government could create high level principles and that the industry would comply. However, a participant argued that every company is susceptible to some type of violation and that in such a case, both self-regulation and co-regulation would be highly problematic. It was argued that, as any company could probably violate users´ data in some way down the line either way, self-regulation or co-regulation would probably not be the most beneficial option for the industry. This argument was supplemented by another participant who stated that co-regulation would mandate the industry and the Privacy Commissioner as the ultimate authorities to handle users´ data and that this could potentially lead to major violations, especially due to inadequate accountability towards users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Co-regulation was once again supported by the DSCI through the argument that customers &lt;i&gt;choose &lt;/i&gt;to use specific services and that by doing so, they should comply with the security measures and privacy policies provided. However, a participant asked whether other stakeholders should be involved, as well as what type of &lt;i&gt;incentives&lt;/i&gt; companies have in order to comply with regulations and to protect users´ data. Another participant argued that the very definition of privacy remains vague and that co-regulation should not be an option, since the industry could be violating individuals´ privacy without even realising it. Another issue which was raised is how data would be protected when many companies have servers based in other countries. The DSCI responded by arguing that checks and balances would be in place to deal with all the above concerns, yet a general consensus on co-regulation did not appear to have been reached.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;Discussion on the draft Privacy (Protection) Bill 2013&lt;/h1&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of definitions: Chapter II&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The sections of the draft Privacy (Protection) Bill 2013 were discussed during the second session of the third Privacy Round Table meeting. In particular, the session started with a discussion on whether the draft Privacy (Protection) Bill 2013 should be split into two separate Bills, where the one would focus on data protection and the other on surveillance and interception. The split of a Bill on data protection to two consecutive Bills was also proposed, where the one would focus on data protection binding the public sector and the other on data protection binding the private sector. As the draft Privacy (Protection) Bill 2013 is in line with global privacy standards, the possibility of splitting the Bill to focus separately on the sections mentioned above was seriously considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the definitions laid out in Chapter 2 of the draft Privacy (Protection) Bill 2013 started with a debate around the definitions of personal data and sensitive personal data and what exactly they should include. It was pointed out that the Data Protection Act of the UK has a much broader definition for the term ´sensitive personal data´ and it was recommended that the Indian draft Privacy (Protection) Bill complies with it. Other participants argued that a controversy lies in India on whether the government would conduct a caste census and if that were to be the case, such data (also including, but not limited to, religion and ethnic origin) should be included in the legal definition for ´sensitive personal data´ to safeguard individuals from potential abuse. Furthermore, the fact that the term ´sensitive personal data´ does not have a harmonious nature in the U.S. and in Europe was raised, especially since that would make it more difficult for India to comply to global privacy standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broadness of the definition for ´sensitive personal data´ was raised as a potential problematic issue, especially since it may not be realistic to expect companies in the long term to protect everything it may include. The participants debated on whether financial information should be included in the definition of ´sensitive personal data´, but a consensus was not reached. Other participants argued that the terms ´data subject´ and ´data controller´ should be carefully defined, as well as that a generic definition for the term ´genetic data´ should be included in the Bill. Furthermore, it was argued that the word ´monitor´ should be included in the definitions of the Bill and that the universal norms in regards to the definitions should apply to each and every state in India. It was also noted that organizational affiliation, such as a trade union membership, should also be included in the definitions of the Bill, since the lack of legal protection may potentially have social and political implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Discussion of “Protection of Personal Data”: Chapter III &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the data protection chapter of the draft Privacy (Protection) Bill began with the recommendation that data collected by companies should comply with a confidentiality agreement. Another participant argued that the UK looks at every financial mechanism to trace how information flows and that India should do the same to protect individuals´ personal data. It was also argued that when an individual is constantly under surveillance, that individual´s behaviour is more controlled and that extra accountability should be required for the use of CCTV cameras. In particular, it was argued that when entities outside the jurisdiction gain access to CCTV data, they should be accountable as to how they use it. Furthermore, it was argued that the Bill should provide provisions on how data is used abroad, especially when it is stored in foreign servers. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Issue of Consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded with a discussion of Section 6 and it was pointed out that consent needs to be a prerequisite to data collection. Furthermore, conditions laid out in section 3 would have to be met, through which the individual would have to be informed prior to any data collection, processing, disclosure and retention of data. Section 11 of the Bill entails an accuracy provision, through which individuals have the right to access the data withheld about them and make any necessary corrections. A participant argued that the transmission of data should also be included in the Bill and that the transmitter would have to be responsible for the accuracy of the data. Another participant argued that transmitters should be responsible for the integrity of the data, but that individuals should be responsible for its accuracy. However, such arguments were countered by a participant who argued that it is not practically possible to inform individuals every time there is a change in their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Outsourcing of Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was further recommended that outsourcing guidelines should be created and implemented, which would specify the agents responsible for outsourcing data. On this note, the fact that a large volume of Indian data is being outsourced to the U.S. under the Patriot Act was discussed. In particular, it was pointed out that most data retention servers are based in the U.S., which makes it difficult for Indians to be able to be informed about which data is being collected, whether it is being processed, shared, disclosed and/or retained. A participant argued that most companies have special provisions which guarantee that data will not cross borders and that it actually depends on the type of ISP handling the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue which was raised was that, although a consumer may have control over his/her data at the first stage, that individual ultimately loses control over his/her data in the next stages when data is being shared and/or disclosed without his/her knowledge or consent. Not only is this problematic because individuals lose control over their data, but also because the issue of accountability arises, as it is hard to determine who is responsible for the data once it has been shared and disclosed. Some participants suggested that such a problem could possibly be solved if the data subject is informed by the data processor that its data is being outsourced, as well as of the specific parties the data is being outsourced to. Another participant argued that it does not matter who the data is being outsourced to, but the manner of its use is what really matters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Retention&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Acting on the powers given by POTA, it was argued that 50,000 arrests have been made. Out of these arrests, only seven convictions have been made, yet the data of thousands of individuals can be stored for many years under POTA. Thus, it was pointed out that it is crucial that the individual is informed when his/her data is destroyed and that such data is not retained indefinitely. This was supplemented by a participant who argued that most countries in the West have data retention laws and that India should too. Other participants argued that data retention does not end with data destruction, but with the return of the data to the individual and the assurance that it is not stored elsewhere. However, several participants argued that the return of data is not always possible, especially since parties may lack the infrastructure to take back their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was pointed out that civil society groups have claimed that collected data should be destroyed within a specific time period, but the debate remains polarized. In particular, some participants argued that data should be retained indefinitely, as the purpose of data collection may change within time and that data may be valuable in dealing with crime and terrorism in the future. This was countered by participants who argued that the indefinite retention of data may potentially lead to human rights violations, especially if the government handling the data is non-democratic. Another participant argued that the fact that data may be collected for purpose A, processed for purpose B and retained or disclosed for purpose C can be very problematic in terms of human rights violations in the future. Furthermore, another participant stated that destruction should mean that data is no longer accessible and that is should not only apply to present data, but also to past data, such as archives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Processing&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The processing of personal data is regulated in section 8 of the draft Privacy (Protection) Bill 2013. A participant argued that the responsibility should lie with the person doing the outsourcing of the data (the data collector). Another participant raised the issue that although banks acquire consent prior to collection and use of data, they subsequently use that data for any form of data processing and disclosure. Credit information requires specific permission and it was argued that the same should apply to other types of personal data. Consent should be acquired for every new purpose other than the original purpose for data collection. It was strongly argued that general consent should not cover every possible disclosure, sharing and processing of data. Another issue which was raised in terms of data processing is that Indian data could be compromised through global cooperation or pre-existing cooperation with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Disclosure&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disclosure of personal data was highlighted as one of the most important provisions within the draft Privacy (Protection) Bill 2013. In particular, three types of disclosure were pointed out: (1) disclosure with consent, (2) disclosure in outsourcing, (3) disclosure for law enforcement purposes. Within this discussion, principle liability issues were raised, as well as whether the data of a deceased person should be disclosed. Other participants raised the issue of data being disclosed by international third parties, who gain access to it through cooperation with Indian law enforcement agencies and cases of dual criminality in terms of the misuse of data abroad were raised. A participant highlighted three points: (1) the subject who has responsibility for the processing of data, (2) any obligation under law should be made applicable to the party receiving the information, (3) applicable laws for outsourcing Indian data to international third parties. It was emphasized that the failure to address these three points could potentially lead to a conflict of laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a participant, a non-disclosure agreement should be a prerequisite to outsourcing. This was preceded by a discussion on the conditions for data disclosure under the draft Privacy (Protection) Bill 2013 and it was recommended that if data is disclosed without the consent of the individual, the individual should be informed within one year. It was also pointed out that disclosure of data in furtherance of a court order should not be included in the Bill because courts in India tend to be inconsistent. This was followed by a discussion on whether power should be invested in the High Court in terms of data disclosure.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Interception of Communications”: Chapter IV&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table ended with a brief discussion on the fourth chapter of the draft Privacy (Protection) Bill 2013, which regulates the interception of communications. Following an overview of the sections and their content, a participant argued that interception does not necessarily need to be covered in the draft Privacy (Protection) Bill, as it is already covered in the Telegraph Act. This was countered by participants who argued that the interception of communications can potentially lead to a major violation of the right to privacy and other human rights, which is why it should be included in the draft Privacy (Protection) Bill. Other participants argued that a requirement that intercepted communication remains confidential is necessary, but that there is no need to include privacy officers in this. Some participants proposed that an exception for sting operations should be included in this chapter.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Meeting conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table entailed a discussion of the definitions used in the draft Privacy (Protection) Bill 2013, as well as of chapters II, III and IV on the right to privacy, the protection of personal data and the interception of communications. The majority of the participants agreed that India needs a privacy legislation and that individuals´ data should be legally protected. However, participants disagreed in regards to how data would be safeguarded and the extent to which data collection, processing, sharing, disclosure, destruction and retention should be regulated. This was supplemented by the debate on self-regulation and co-regulation; participants disagreed on whether the industry should regulate the use of customers´ data autonomously from government regulation or whether the industry should co-operate with the Privacy Commissioner for the regulation of the use of data. Though a consensus was not reached in regards to co-regulation and self-regulation, the majority of the participants agreed upon the establishment of a privacy legislation which would safeguard individuals´ personal data. The major issue, however, with the creation of a privacy legislation in India would probably be its adequate enforcement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting'&gt;https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:35:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet">
    <title>A lifetime of five years on the internet</title>
    <link>https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet</link>
    <description>
        &lt;b&gt;Centre for Internet and Society observes its fifth anniversary on Sunday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Subir Ghosh was &lt;a class="external-link" href="http://www.dnaindia.com/bangalore/1836745/report-a-lifetime-of-five-years-on-the-internet"&gt;published in DNA on May 19, 2013&lt;/a&gt;. Sunil Abraham is quoted in this.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Five years is a long time in the internet space. The past five years, certainly, has been. And so has it been for the Centre for Internet and Society that completes five years here.&lt;br /&gt;&lt;br /&gt;When a group of citizens got together to come under a platform called CIS five years ago, they had wanted to work on policy issues about the internet that had a bearing on society. They, in fact, still do; except that the new media space itself has undergone a metamorphosis. Five years ago social media was just starting off, few people had smart phones, and online speech was not a burning issue.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, executive director of city-based CIS, affirms this, and goes on to assert: “Five years ago, privacy was not a mainstream concern. Today, many different actors and stakeholders are interested in the configuration of the draft Privacy Bill. We first warned the public about the draconian measures in the IT Act during the 2008 amendment. Four years later, many more people are familiar with problematic sections and are adopting various strategies to amend the Act and it’s associated rules.”&lt;br /&gt;&lt;br /&gt;Likewise, five years ago, people dismissed “shared spectrum” as a pipe dream; today “shared spectrum” is mentioned in the National Telecom Policy. CIS usually thinks ahead, and works on a range of issues.&lt;br /&gt;&lt;br /&gt;“For internet adoption in India to grow dramatically from the dismal statistics today, we need to ensure continued access to cheap devices and affordable and ubiquitous broadband,” says Abraham.&lt;br /&gt;&lt;br /&gt;“With Ericsson suing Micromax for Rs100 crore, the mobile wars have come to India. If we have to protect innovation in sub-100 dollar devices, we need to configure our patent and copyright policy carefully.”&lt;br /&gt;&lt;br /&gt;But since CIS works primarily on policy issues, shouldn’t it have been based in Delhi rather than in Bangalore? “We do have a small office in Delhi. But we are headquartered in Bangalore because we need to keep learning from technologists and the technical community,” explains Abraham.&lt;br /&gt;&lt;br /&gt;When an organisation calling itself the Centre for Internet and Society (www.cis-india.org) observes its fifth anniversary, it shouldn’t surprise anyone that many of the activities related to the anniversary celebrations (May 20-23) have precious little to do with the internet, and is more about society itself. And yes, an entire evening is devoted to Kannada. There’s a talk by Chandrashekhara Kambara on ‘Kannada in the modern era,’ and another by UB Pavanaja titled ‘From Palm Leaf to Tablet – Journey of Kannada’.&lt;br /&gt;&lt;br /&gt;“We are looking at the complete eco-system. For instance, during the digitalisation of TV in India, what will happen to the internet? Do TV promoting policies undermine the growth of broadband? On the second day we look at the connection between another older technology - cinema and the Internet.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet'&gt;https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-05-20T09:04:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go">
    <title>Sex on-the-go</title>
    <link>https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go</link>
    <description>
        &lt;b&gt;After a freak fire in 2011 reduced the cubbyholes trading in electronic goods inside a Crawford Market shopping plaza to ashes, Junaid has gone alfresco.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Anand Holla was &lt;a class="external-link" href="http://www.mumbaimirror.com/others/sunday-read/Sex-on-the-go/articleshow/19886770.cms"&gt;published in Mumbai Mirror&lt;/a&gt; on May 4, 2013. Pranesh Prakash is quoted in it.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;He sits on a stool by a  chock-full street tinkering with mobile phones while three teenage  staffers hover around him. A laptop receives favourable treatment; it  sits at the centre of the makeshift stall scattered with card readers.  The imaginary wall of hostility he carefully builds over several seconds  crashes when he realises we are genuine customers. "This is not your  regular movie...it will cost you Rs 250 for 4 GB," he mutters, dodging  eye contact. Some bargaining later, he hurriedly transfers 200 short  pornographic clips from the laptop on to a memory card for Rs 150. Most  are the fall-out of crosscountry MMS scandals, the flavour of the  season. "Everyone does it, no one talks about it. A raid means we lose  our equipment and pay a hefty fine," he says in staccato metre, handing  us back the card. Seconds later, head down, he's back to reviving a dead  smartphone.&lt;br /&gt; &lt;br /&gt; The rates vary at a booth a few metres down. It's  Rs 400 for 16GB - the same price as that for loading your phone with the  latest Bollywood and Hollywood films - of a "collection" that includes  foreign porn, and bestiality videos.&lt;br /&gt; &lt;br /&gt; It's hardly a secret that  several of the city's cell phone repair shops and SIM card kiosks that  flaunt a computer, stock smut in secret folders marked by gibberish  names. "We get some women, too," one owner says. "They say, "Zara woh  waale movies daal dena'."&lt;br /&gt; &lt;br /&gt; Which brings you to the rules of the mobile-porn-off-the-street universe.&lt;br /&gt; &lt;br /&gt; A blunt demand for a blue film clip will send shopkeepers into a shell.  Some may even express mock disgust at your request. Blame it on random  raids by the State Anti-Piracy Cell. Around South Mumbai's markets, for  instance, code words 'Daal gosht' or 'Pelampaal' put the  Flashing-Loading-Repairing stall owners at ease. But for tongue-tied  first-timers, body language is the marker. A local cell phone  accessories distributor says, "The more desperate you look and sound,  the easier it is for you to pass off as a bona fide purchaser. If you  are well-dressed, they'll deny they stock it. There's no fixed rate. Sab  grahak dekhke poodi baandhte hain. Considering how it's a simple  copy-paste job, it's free money anyway."&lt;br /&gt; &lt;br /&gt; Regular customers  frequently leave their phones with their trusted 'service' providers for  loading apps, games, the latest films, and porn too. It's a package  deal. "If you know how to ask for it, there's hardly a corner in Mumbai  where you can't buy pocket porn," says a shopkeeper from Mulund.&lt;br /&gt; &lt;br /&gt; In fact, pornography is not high on the authorities' agenda, says Vijay  Mukhi, former member of the High Court/State Government Committee on  Pornography and Cyber Laws. "Unless the Anti-Piracy Cell sends a dummy  customer to lay a trap, it's near impossible to prosecute the  shopkeepers because watching porn is not a crime; only producing,  publishing or distributing it is," he clarifies.&lt;br /&gt; &lt;br /&gt; Shafqat  Usmani, President of the Mobile Dealers Welfare Association of Mumbai,  says, the paltry 2.5 per cent margin on products makes the city's 50,000  mobile phone retailers render additional services, including repairing.  Is loading porn part of the survival mechanism? "The low margin is no  excuse to indulge in disgusting activities," he says.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Hand-held and hi-res&lt;/b&gt;&lt;br /&gt; The cell phone boom - both, cheap Chinese models that allow the  not-so-privileged access to technology and the arrival of high-res  display screens that offer the affluent a viewing experience superior to  television - has worked towards making porn consumption mainstream.  Local train commuters will tell you of the passenger on the corner seat  watching smutty clips, as if it were an impassive pastime. It's even  found favour as a 'stress reliever'. "My friends and I buy phone porn to  watch whenever the workload at office gets out of hand," says a  Mankhurd resident.&lt;br /&gt; &lt;br /&gt; While watching porn on laptops, either  straight off the net or via DVDs, means you could get busted by family  and friends, the handheld experience - with a phone password to boot -  allows complete privacy.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;What would you like?&lt;/b&gt;&lt;br /&gt; Depending on which neighbourhood market you access, the popular  offering varies. In Kurla, says a cell phone mechanic, foreign porn has  no takers. "They (customers) say everything happens too soon and easy.  The demand is for morphed celebrity sex videos, South Indian porn and of  course, MMS clips." Some of these are what the industry refers to as  'kaand' videos. They resemble MMS scandal clips but are staged. It's the  lure of these grainy, sloppily shot videos that landed Karnataka BJP  ministers Lakshman Savdi and CC Patil in a soup last February. The two  were caught watching a clip during assembly. Amid a storm of criticism,  they and Mangalore minister Krishna Palemar, who was accused of  transferring the video to Savdi's phone, resigned.&lt;br /&gt; &lt;br /&gt; On  Ahmedabad's Relief Road, a row of kiosks that sport the 'Downloading'  sign, like the one run by Karimmuddin, offer hi-definition (HD) foreign  porn to affluent students who walk in with large-screen 3G phones  demanding virus-free content. It's Rs 100 for 2GB worth of mp4 clips of  720p resolution, and Rs 50 for 2GB worth low-quality clips, says  21-year-old Moin. Smaller, dirt cheap deals are available too. A single  HD clip at Rs 5.50, a low-res one for Rs 2, and the 'lightest' clip for  Rs 21 paise.&lt;br /&gt; &lt;br /&gt; "My customers are youngsters from middle and upper  middle class families," says 30-year-old Rocky, a shop owner in  Navrangpura, while catering to Vikas, a collegian waiting for a Rs 100  download. "We are a group of six friends, including girls. For Rs 100,  I'm going away with more than 20 HD video clips," he says  straight-faced, adding that his group of friends, girls included, get  together during the holidays for collective viewing. A relationship of  trust between regulars like Vikas and shopkeepers means he will share a  clip with the mobile store owner, in case he doesn't have it in stock.&lt;br /&gt; &lt;br /&gt; It's a business of 100 per cent profits, they admit, and raids are easy  to dodge since the police usually come looking for duplicate cell  phones. They'd make half their monthly earnings if they relied on  selling SIM cards, mobile accessories and software loading alone, says  Ramesh, a 23-year-old staffer at a cell phone shop in Odhav that gets  walk-ins from rickshawallahs and college students.&lt;br /&gt; &lt;br /&gt; The rise of  mobile porn has turned into a thorn in the flesh for pirated DVD  sellers. Ajju, who runs a CD/DVD stand near Panchwati Crossroads,  remembers a time when customers crowded him for 'tragda' or XXX CDs.  "Older women would arrive in cars, roll down the window and ask for  adult movies. I'd notice how they'd chuck the explicit cover and plonk  the CD in an unsuspecting plastic bag." Mobile porn has hit his profits,  bringing it down by 20 per cent.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Southward bound&lt;/b&gt;&lt;br /&gt; Surprisingly, in Bengaluru, the erotic DVD trend is experiencing freak  survival. Two years ago, the youth scoured Majestic and SP Road for  downloaded porn. But with affordable mobile phone data plans and pirated  DVD sellers ratting on their competitors, mobile repair shop owners  have had to stick to doing just that - fiddle with hardware.&lt;br /&gt; &lt;br /&gt; It's the tier II and III cities across India that are waking up to the  potential of porn-on-phone. Earlier this year, Mysore-based moral  awareness group Rescue conducted a survey across 964 junior college  students from Mysore, Chamarajanagar and Bengaluru. More than 75 per  cent watched porn regularly, and most watched six times more porn on  their phones than on any other device, said the findings.&lt;br /&gt; &lt;br /&gt; Mangalore, Belgaum, Dharwad and Mysore, all educational centres, support  a thriving porn-lending library system. A student from Moodabidri says,  "Most hostel students venture out to these shops once a week, and pay  Rs 50 for a porn-loaded memory card. They return it a week later in  exchange for fresh content."&lt;br /&gt; &lt;br /&gt; Mangalore leads the pack in the  sleaze game. It's believed that the clip that got the Karnataka  ministers into trouble was called Fasila, and was a hit in Mangalore and  neighbouring Kasargod two years ago. Six years ago, a seven-minute MMS  sex clip was converted into a half-hour CD named Mangalooru Mungaru Male  and sold widely. In 2000, before mobiles became the rage they are now,  sex CDs flew off the shelves. The famous 40-minute clip, Mysore Mallige  (known as MM CD) that featured a girl from Puttur, was sold for as much  as Rs 1,000.&lt;br /&gt; &lt;br /&gt; A mobile accessories shop owner in Puttur says the  porn viewing audience has grown to include blue collar workers, who  aren't tech-savvy to figure their own Internet downloads. "All they want  is clarity of clips,' he says.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Watch, don't act&lt;/b&gt;&lt;br /&gt; His customers then, are not very different from 22-year-old Manoj Sah  and his 19-year-old companion Pradeep Kumar, who admitted to  investigators probing the rape of a five-year-old girl in East Delhi  last month, that they were drinking and watching porn on their mobile  phone before they lured the girl into Sah's house with a chocolate.&lt;br /&gt; &lt;br /&gt; While the nation erupted in protest, the confession drew attention to  the possible fallout of easy access to pornographic content. The Delhi  case isn't isolated. In January, Mumbai cringed when 70-year-old Niyaz  Raza was arrested in the Govandi rape case involving a 13-year-old girl.  His SIM was found loaded with sex clips, including one where he had  filmed the girl performing oral sex on him.&lt;br /&gt; &lt;br /&gt; Last month, Indore  advocate Kamlesh Vaswani filed a writ petition in the Supreme Court  seeking a change in Internet laws that would make watching pornography a  nonbailable offence. It estimates that the number of such clips  accessible to Indians is more than 200 million. The petition states:  "The sexual content that kids are accessing today is far more graphic,  violent, brutal, deviant, and destructive (than before), and has put the  entire society in danger." It also finds the increasing "severity and  gravity" of these visuals a concern, and accuses accessible pornography  of "fuelling" most of the offences committed against women and children.&lt;br /&gt; &lt;br /&gt; So, more than porn, it's the exposure of a larger audience to its  extreme forms - bondage, bestiality, even paedophila - that's spurred a  debate. To sum up the sentiment in the words of award-winning writer  Robin Morgan: "Pornography is the theory, rape is the practice."&lt;br /&gt; &lt;br /&gt; There are enough and more voices refuting Vaswani's claim. Pranesh  Prakash is one of them. The policy director with Bengaluru-based Centre  for Internet and Society, says, "There is no data to establish a direct  co-relation between porn and sexual crimes. To be alarmed over the  widespread availability of porn through mobile phone loading alone is a  classist reaction; those who are well-to-do have had easy digital access  anyway."&lt;br /&gt; &lt;br /&gt; Way before those accused of rape were introduced to  porn, they were exposed to a culture of misogyny that says women must be  controlled, and their bodies are free to loot.&lt;br /&gt; &lt;br /&gt; &lt;i&gt;- With  Hemington James and Yogesh Avasthi in Ahmedabad, Rakesh Prakash in  Bengaluru and Deepthi Shridhar in Mangalore (Some names been changed to  protect identity)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go'&gt;https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:08:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground">
    <title>WORLD WIDE PLAYGROUND </title>
    <link>https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground</link>
    <description>
        &lt;b&gt;The Delhi High Court recently asked the central government to explain why minors are allowed to create online accounts on social networking sites such as Facebook or Orkut. The High Court’s question stems from a petition filed by former senior BJP leader K.N. Govindacharya last year. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The Op-ed was &lt;a class="external-link" href="http://www.telegraphindia.com/1130515/jsp/opinion/story_16900282.jsp#.Ua8HhthmMQN"&gt;published in the Telegraph&lt;/a&gt; on May 15, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Govindacharya argued that by allowing minors to open accounts on social media sites, the companies of these sites were violating the Indian Majority Act, 1875, the Indian Contract Act, 1872, and the Information Technology Act, 2000.&lt;/p&gt;
&lt;p align="left" class="story"&gt;One of Govindacharya’s main concerns is  that when minors give false information to open an account on an online  portal, they are liable to be held guilty for a criminal offence.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;“Providing  false information about oneself is more of a crime than a civil wrong,”  explains Debsankar Chowdhury, a Calcutta-based cyber law expert.  “However, if it is provided with an intention to enter into a contract  which otherwise is not allowed, it is tantamount to fraud under Section  17 of the Contract Act of 1872.”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;For minors,  though, Chowdhury points out that the Juvenile Justice Act, 2005, will  be brought into play, and they will face lighter sentences.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;As for the  social networking companies themselves, according to the law of the land  they can be held accountable if a user provides them with false  information. As Pavan Duggal, a Supreme Court advocate and expert on  cyber law, points out, “All social networking sites are intermediaries  under Section 2(1)(w) of the amended Information Technology Act, 2000.  They are made responsible for all third party data or information made  available by them under Section 79 of the Information Technology Act,  2000.” As such, social networking sites would be held accountable for  allowing people, especially minors, to create fake profiles on their  networks under Section 79 and 85 of the Information Technology Act,  2000, he adds.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;The other  problem here is that while a social networking site  like Facebook  allows anyone over 13 to open an account, according to Indian law,  anyone under 18 years of age is a minor; and a minor cannot enter into a  contract with any entity. “The issue raised in Govindacharya’s petition  is of a fundamental nature,” opines Duggal. “Section 3 of the Indian  Majority Act, 1875, clearly states that every person domiciled in India  shall attain the age of majority on his completing the age of 18 years.  However, Facebook allows 13-year-olds to become its members. Since  children lack the inherent capacity to contract under the Indian  Contract Act, 1872, the contract entered into between  Indian children  below the age of 18 years and Facebook is null and void.”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;But though  the nitty gritty of the law seems to be weighted against children below  18 — or even 13 — joining social networking sites, not everyone believes  that kids should be prevented from having a presence online. Six months  ago, 10-year-old Shruti (name changed) met with an accident, and was  bedridden for some time. She was bored and miserable. To cheer her up,  her father signed her on to Facebook — yes, by providing false  information about her age.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;Other  parents may not take a similar view of their young children joining  Facebook under false pretexts. But Ashok Agarwal, a Delhi-based lawyer  and child rights activist, believes that Govindacharya’s petition  demonstrates an outdated way of thinking. “We are letting children speak  at the UN and in Parliament, but we don’t want to let them speak  online,” he says. “Allowing children to use sites like Facebook doesn’t  hurt them, and if anything, denying them access to it would be denying  them their universal Right to Participate. This right is part of  Unicef’s Convention on the Rights of the Child.” And also it’s denying  them access to a tool and medium that is, and will be, an integral part  of their lives, adds Agarwal.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;Leaving  aside the debate on whether or not children below a certain age should  be allowed on social networking sites, Chowdhury points out that right  now there is no means of checking the age of those who are signing in to  these online portals.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;In fact,  Section D of Govindacharya’s petition does point out the need for some  kind of verification process when people create an online account, much  like what phone service providers do when someone applies for a new  connection.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;But experts  point out that this is not feasible in the case of social networking  sites. Says Chowdhury, “Mobile companies operate their network in  specific locations, whereas sites like Facebook exist worldwide.  Moreover, these portals don’t take a single penny from their users. So  do you really think it is possible to make offline verification?”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;Indeed,  verification of user data — ostensibly to cut out underage persons from  logging on to social networking sites — has much wider ramifications.  Pranesh Prakash, policy director at the Centre for Internet and Society  in Bangalore, points out that it could start a downward spiral towards  loss of online privacy. “If anyone wants to create an account on a  website, but has to provide some sort of verifiable data, you’re going  to remove a person’s ability to post anonymously on the Internet. Then  what happens to freedom of speech? People like to post online  anonymously, but if everyone’s identity is known, that privacy is  revoked.”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;The effect  of social networking sites on children will be debated for a long time.  But clearly, it would be tough to enforce laws to prevent children from  logging on to these sites.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground'&gt;https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:47:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother">
    <title>Is India's government becoming Big Brother? </title>
    <link>https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother</link>
    <description>
        &lt;b&gt;India's new Central Monitoring System will give officials unprecedented access to calls, texts, and online activity.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The blog post by Talia Ralph and Jason Overdorf was &lt;a class="external-link" href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt;published in Global Post&lt;/a&gt; on May 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government has quietly started putting into place its new Central  Monitoring System, a project that will give it access to its citizens'  telephone calls, texts, and online activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system, &lt;a href="http://www.pcworld.com/article/183229/article.html" target="_blank"&gt;in development since 2009&lt;/a&gt;, will enable state agencies to monitor all digital interactions, &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms" target="_blank"&gt;the Times of India reported&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Work on CMS has been kept quiet for the past few years, although the  newspaper reported that several government agencies ordered specialized  equipment and systems for monitoring telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's government has steadily been increasing its access to  telecommunications since the 2008 Mumbai bombings to help track  militants and illegal activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The country — one of the world's fastest-growing internet markets —  enacted its information technology law in 2000, and amended it twice, in  2008 and again in 2011.&lt;/p&gt;
&lt;p&gt;As PCWorld described the new system,&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;The CMS will have central and regional databases to help  central and state-level enforcement agencies intercept and monitor  communications, the government said. It will also have direct electronic  provisioning of target numbers by government agencies without any  intervention from telecom service providers, it added. It will also  feature analysis of call data records and data mining of these records  to identify call details, location details, and other information of the  target numbers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Internet freedom activists and privacy experts worry the project  offers far too much access to citizens' communications. They say  official agencies allegedly misused and leaked tapped phone  conversations, while the government has sought to quash dissent and  silence critics on the internet under the guise of preventing hate  speech.&lt;/p&gt;
&lt;p&gt;"In the absence of a strong privacy law that promotes transparency  about surveillance and thus allows us to judge the utility of the  surveillance, this kind of development is very worrisome," Pranesh  Prakash, the director of policy at the Center for Internet and Society,  told the Times of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Further, this has been done with neither public nor parliamentary  dialog, making the government unaccountable to its citizens," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government last year &lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/120824/india-china-censorship-internet"&gt;blocked mobile phones and shut down social media&lt;/a&gt; sites ostensibly to prevent communal riots, but in the process blocked  some 16 Twitter handles known to be critical of the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics of the CMS movement &lt;a href="http://stopicms.org/2013/05/the-what-why-and-how-for-stopicms/" target="_blank"&gt;wrote a blog post &lt;/a&gt;arguing that the Indian government wants to use the law to censor "hate speeches and government criticism."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We know the government today hates public criticizing it," the group  Stop ICMS wrote on their blog. "The recent arrests of people for  tweeting or posting on Facebook has proved that. Govt. does not like  criticism that can be seen by everyone on the Internet."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS program is in place in a "preliminary state" right now, with the full version expected to be in place by August 2014.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother'&gt;https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:39:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication">
    <title>India's Rs 400-crore Central Monitoring System to snoop on all communication </title>
    <link>https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication</link>
    <description>
        &lt;b&gt;Latest reports confirm that the government's longstanding aim of initiating the Central Monitoring System in the country is materialising now.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://tech2.in.com/news/general/indias-rs-400crore-central-monitoring-system-to-snoop-on-all-communication/872510"&gt;published in Tech 2&lt;/a&gt; on May 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms" rel="nofollow" target="_blank" title="TOI report"&gt;The Times of India&lt;/a&gt;&lt;/b&gt; reports that the government began rolling out the project last month,  and it lets them access all communication in the country – comprising  online activities, phone calls, SMSes, social media conversations and  even the geographical location of individuals. Using the Central  Monitoring System, officials with the National Investigation Agency or  tax officials will have access to "every byte of communication".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pavan Duggal, an advocate with the Supreme Court, believes that the  new system "is capable of tremendous abuse". He went on to say that the  government hasn't revealed much on what it intends to monitor with this  new system, and under what criteria.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Development of Telematics has been given the task of  putting this system in place to give government officials this crucial  access to communication in the country. In his statement to the  Parliament in December last year, IT minister Milind Deora had said that  the Central Monitoring System will "lawfully intercept Internet and  telephone services".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This system was initiated in the wake of the horrying bomb blast in  Mumbai in November 2008. Post that incident, the government reportedly  took on the task of making itself technologically adept to "eavesdrop on  digital communications".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would be important to quote here that the IT law – enacted in  2000, amended in 2008 and in 2011 – confers upon government officials  the authority to intercept phone calls, SMSes, emails and even monitor  websites. That, however, can only be done for "reasonable security  practices and procedures".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication'&gt;https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-05T10:39:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013">
    <title>Google Policy Fellowship Programme: Call for Applications </title>
    <link>https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is inviting applications for the Google Policy Fellowship programme. Google is providing a USD 7,500 stipend to the India Fellow, who will be selected by July 1, 2013.&lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;The &lt;a href="http://www.google.com/policyfellowship/"&gt;Google Policy Fellowship&lt;/a&gt; offers successful candidates an opportunity to develop research and debate on the fellowship focus areas, which include Access to Knowledge, Openness in India, Freedom of Expression, Privacy, and Telecom, for a period of about ten weeks starting from July 7, 2013 upto October 1, 2013. CIS will select the India Fellow. Send in your applications for the position by June 15, 2013.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To apply, please send to&lt;a href="mailto:google.fellowship@cis-india.org"&gt; google.fellowship@cis-india.org&lt;/a&gt; the following materials:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Statement 	of Purpose&lt;/b&gt;: 	A brief write-up outlining about your interest and qualifications 	for the programme including the relevant academic, professional and 	extracurricular experiences. As part of the write-up, also explain 	on what you hope to gain from participation in the programme and 	what research work concerning free expression online you would like 	to further through this programme. (About 1200 words max).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Resume&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Three 	references&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Fellowship Focus Areas&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;: Studies looking at access to knowledge issues in India in light of copyright law, consumers law, parallel imports and the interplay between pervasive technologies and intellectual property rights, targeted at policymakers, Members of Parliament, publishers, photographers, filmmakers, etc.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Openness 	in India&lt;/b&gt;: 	Studies with policy recommendations on open access to scholarly 	literature, free access to law, open content, open standards, free 	and open source software, aimed at policymakers, policy researchers, 	academics and the general public.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Freedom 	of Expression&lt;/b&gt;: 	Studies on policy, regulatory and legislative issues concerning 	censorship and freedom of speech and expression online, aimed at 	bloggers, journalists, authors and the general public.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Privacy&lt;/b&gt;: 	Studies on privacy issues like data protection and the right to 	information, limits to privacy in light of the provisions of the 	constitution, media norms and privacy, banking and financial 	privacy, workplace privacy, privacy and wire-tapping, e-governance 	and privacy, medical privacy, consumer privacy, etc., aimed at 	policymakers and the public.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Telecom&lt;/b&gt;: 	Building awareness and capacity on telecommunication policy in India 	for researchers and academicians, policymakers and regulators, 	consumer and civil society organisations, education and library 	institutions and lay persons through the creation of a dedicated web 	based resource focusing on knowledge dissemination.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 align="JUSTIFY"&gt;Frequently Asked Questions&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;What is the Google Policy Fellowship program?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Google Policy Fellowship program offers students interested in Internet and technology related policy issues with an opportunity to spend their summer working on these issues at the Centre for Internet and Society at Bangalore. Students will work for a period of ten weeks starting from June 1, 2013. The research agenda for the program is based on legal and policy frameworks in the region connected to the ground-level perceptions of the fellowship focus areas mentioned above.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;I 	am an International student can I apply and participate in the 	program? Are there any age restrictions on participating?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Yes. 	You must be 18 years of age or older by January 1, 2013 	to be eligible to participate in Google Policy Fellowship program in 	2013.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Are 	there citizenship requirements for the Fellowship?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;For 	the time being, we are only accepting students eligible to work in 	India (e.g. Indian citizens, permanent residents of India, and 	individuals presently holding an Indian student visa. Google cannot 	provide guidance or assistance on obtaining the necessary 	documentation to meet the criteria.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Who 	is eligible to participate as a student in Google Policy Fellowship 	program?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In 	order to participate in the program, you must be a student. Google 	defines a student as an individual enrolled in or accepted into an 	accredited institution including (but not necessarily limited to) 	colleges, universities, masters programs, PhD programs and 	undergraduate programs. Eligibility is based on enrollment in an 	accredited university by January 1, 2013.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;I 	am an International student can I apply and participate in the 	program?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In 	order to participate in the program, you must be a student (see 	Google's definition of a student above). You must also be eligible 	to work in India (see section on citizen requirements for fellowship 	above). Google cannot provide guidance or assistance on obtaining 	the necessary documentation to meet this criterion.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;I 	have been accepted into an accredited post-secondary school program, 	but have not yet begun attending. Can I still take part in the 	program?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;As 	long as you are enrolled in a college or university program as of 	January 1, 2013, 	you are eligible to participate in the program.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;I 	graduate in the middle of the program. Can I still participate?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;As 	long as you are enrolled in a college or university program as of 	January 1, 2013, 	you are eligible to participate in the program.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 class="western"&gt;Payments, Forms, and Other Administrative Stuff&lt;/h3&gt;
&lt;p class="western"&gt;&lt;b&gt;How do payments work?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Google will provide a stipend of USD 7,500 equivalent to each Fellow for the summer.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Accepted 	students in good standing with their host organization will receive 	a USD 2,500 stipend payable shortly after they begin the Fellowship 	in June 2013.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Students 	who receive passing mid-term evaluations by their host organization 	will receive a USD 1,500 stipend shortly after the mid-term 	evaluation in July 2013.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Students 	who receive passing final evaluations by their host organization and 	who have submitted their final program evaluations will receive a 	USD 3,500 stipend shortly after final evaluations in August 2013.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Please note: &lt;i&gt;Payments will be made by electronic bank transfer, and are contingent upon satisfactory evaluations by the host organization, completion of all required enrollment and other forms. Fellows are responsible for payment of any taxes associated with their receipt of the Fellowship stipend&lt;/i&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;*&lt;/b&gt;While the three step payment structure given here corresponds to the one in the United States, disbursement of the amount may be altered as felt necessary.&lt;/p&gt;
&lt;p class="western"&gt;&lt;b&gt;What documentation is required from students?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Students should be prepared, upon request, to provide Google or the host organization with transcripts from their accredited institution as proof of enrollment or admission status. Transcripts do not need to be official (photo copy of original will be sufficient).&lt;/p&gt;
&lt;p class="western"&gt;&lt;b&gt;I would like to use the work I did for my Google Policy Fellowship to obtain course credit from my university. Is this acceptable?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yes. If you need documentation from Google to provide to your school for course credit, you can contact Google. We will not provide documentation until we have received a final evaluation from your mentoring organization.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Host Organizations&lt;/h2&gt;
&lt;p class="western"&gt;&lt;b&gt;What is Google's relationship with the Centre for Internet and Society?&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Google provides the funding and administrative support for individual fellows directly. Google and the Centre for Internet and Society are not partners or affiliates. The Centre for Internet and Society does not represent the views or opinions of Google and cannot bind Google legally.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;Important Dates&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;What is the program timeline?&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;June 15, 2013&lt;/td&gt;
&lt;td&gt;Student Application Deadline. Applications must be received by midnight. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;July 1, 2013&lt;/td&gt;
&lt;td&gt;Student applicants are notified of the status of their applications. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;July 2013&lt;/td&gt;
&lt;td&gt;Students begin their fellowship with the host organization (start date to be determined by students and the host organization); Google issues initial student stipends. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;August 2013 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mid-term evaluations; Google issues mid-term stipends. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;October 2013&lt;/td&gt;
&lt;td&gt;Final evaluations; Google issues final stipends. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013'&gt;https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-05-17T01:01:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations">
    <title>Central Monitoring System to make government privy to phone calls, text messages and social media conversations</title>
    <link>https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations</link>
    <description>
        &lt;b&gt;The government last month quietly began rolling out a project that gives it access to everything that happens over India's telecommunications network—online activities, phone calls, text messages and even social media conversations. Called the Central Monitoring System, it will be the single window from where government arms such as the National Investigation Agency or the tax authorities will be able to monitor every byte of communication. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Indu Nandakumar was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/Business/India-Business/Central-Monitoring-System-to-make-government-privy-to-phone-calls-text-messages-and-social-media-conversations/articleshow/19927923.cms"&gt;published in the Times of India&lt;/a&gt; on May 7, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But privacy and Internet  freedom advocates are worried that in the name of security, the  government could end up snooping on people, possibly abusing a system  that does not have enough safeguards to protect ordinary citizens. &lt;br /&gt;&lt;br /&gt; "In the absence of a strong privacy law that promotes transparency  about surveillance and thus allows us to judge the utility of the  surveillance, this kind of development is very worrisome," warned  Pranesh Prakash, director of policy at the Centre for Internet and  Society. "Further, this has been done with neither public nor  parliamentary dialogue, making the government unaccountable to its  citizens." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;span id="advenueINTEXT"&gt;After the Mumbai blasts in  November 2008, the government has been arming itself with powers and  technology to help it eavesdrop on digital communications. The  information technology law, enacted in 2000 and amended twice in 2008  and 2011, gives designated government officials the authority to listen  in on phone calls, read SMSes, emails, and monitor websites. &lt;br /&gt;&lt;br /&gt; Such access is allowed for purposes of "reasonable security practices and procedures". &lt;br /&gt;&lt;br /&gt; However, Pavan Duggal, a Supreme Court advocate specialising in cyber  law, said the government has given itself unprecedented powers to  monitor private Internet records of citizens. "This system is capable of  tremendous abuse," he said. The Central Monitoring System, being set up  by the Centre for Development of Telematics, plugs into telecom gear  and gives central and state investigative agencies a single point of  access to call records, text messages and emails as well as the  geographical location of individuals. &lt;br /&gt;&lt;br /&gt; Duggal, who closely  follows New Delhi's battle with Internet firms, said there hasn't been  much details from the government on what exactly the system intends to  monitor and under what conditions. &lt;br /&gt;&lt;br /&gt; In December 2012, the then  information technology minister Milind Deora told Parliament that the  monitoring system, on which the government is spending Rs 400 crore,  will "lawfully intercept Internet and telephone services". &lt;br /&gt;&lt;br /&gt; Work  on the system has been kept under wraps for nearly two years. Several  government agencies have issued tenders seeking specialised equipment  and systems for such monitoring. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;span id="advenueINTEXT"&gt;As part of modernisation,  the home ministry is updating all its offices in state capitals with  such gear. C-DOT group head Shikha Srivastava declined comment.  Information technology ministry spokeswoman Mamta Verma redirected the  queries to Gulshan Rai, director of India's Cyber Emergency Response  Team, but Rai declined comment. &lt;br /&gt;&lt;br /&gt; With over 100 million users,  India is one of the fastest-growing Internet markets in the world. The  government has come under criticism from activists for increased  censorship and tracking of user records. Internet activist group  Anonymous has started raising the pitch against the monitoring system,  claiming that security is just a pretext for spying on citizens. &lt;br /&gt;&lt;br /&gt; Disclosures by Google show that the number of requests from the  government seeking personal information has been on the rise. In the  second half of 2012, the government made nearly 2,500 requests, Google  said. &lt;br /&gt;&lt;br /&gt; "Even legitimate conversations could end up being tracked," cautioned Duggal, the Supreme Court lawyer. &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations'&gt;https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:17:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator">
    <title>Messaging apps find another foe in India’s market regulator</title>
    <link>https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator</link>
    <description>
        &lt;b&gt;Paranoid governments and mobile operators aren’t the only one that dislike messaging apps. Regulatory bodies aren’t crazy about them either. The Securities and Exchange Board of India (SEBI) is worried that attempts to pass on confidential information or manipulate markets are originating from within services like WhatsApp and Blackberry Messenger.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This &lt;a class="external-link" href="http://qz.com/82488/messaging-apps-find-another-foe-in-indias-market-regulator/"&gt;blog post was published in Quartz&lt;/a&gt; on May 8, 2013. Elonnai Hickok is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The regulator already analyzes data from trades for irregularities  through its “integrated market surveillance system”. That gives it an  idea of what stocks are being manipulated. Now it wants to expand its  horizons. The &lt;a href="http://www.thehindu.com/business/Industry/sebi-mulls-steps-to-check-manipulation-through-bbm-whatsapp/article4686269.ece"&gt;Press Trust of India&lt;/a&gt; reports that SEBI has looked into tracking Twitter and Facebook and is  grappling with messaging apps—though as yet it has no systems in place  for doing either, according to Elonnai Hickok of the Center for Internet  Studies in Bangalore. A SEBI spokesperson could not be reached for  comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if SEBI did start following you on Twitter, it  cannot snoop on your WhatsApp messages. That sort of power is the  preserve of intelligence and police authorities. And there is good  reason for SEBI’s restricted powers. Keeping the markets clean may be an  honorable pursuit, but the regulator hasn’t always used honorable  means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s finance minister last year said that SEBI would be allowed to &lt;a href="http://articles.economictimes.indiatimes.com/2012-11-19/news/35203786_1_sebi-data-records-securities-and-exchange-board"&gt;request call records&lt;/a&gt;,  which are the data kept by operators about who called whom, for how  long and from where. Such information can help investigators discover  sources of leaked information. It can also be used to figure out whether  traders are trying to influence other investigators. But a  freedom-of-information request &lt;a href="http://www.cobrapost.com/index.php/news-detail?nid=359&amp;amp;cid=23"&gt;recently revealed&lt;/a&gt; that SEBI had been requesting—and receiving—such data from carriers at  least since 2009, well before it was supposedly allowed to do so.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator'&gt;https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-05T10:46:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-chennai">
    <title>A Privacy Round Table in Chennai</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-chennai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Data Security Council of India and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at the Residency Towers in Chennai on Saturday, May 18, 2013, 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt;Click for the invite&lt;/a&gt;&lt;/li&gt;
&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt; 
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To discuss the "Report of the Group of Experts on Privacy" by the Justice AP Shah Committee, the text of the "Citizens' Privacy (Protection) Bill 2013", drafted by the Centre for Internet and Society, and "Strengthening Privacy Protection through Co-regulation" by DSCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published into a compilation, and presented at the Internet Governance meeting planned for October 2013.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Draft Agenda for the Roundtable Discussion&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 p.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.15 p.m.&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.15 p.m.&lt;/td&gt;
&lt;td&gt;In depth discussions: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Confirmations and RSVP&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the Chennai Privacy Roundtable on &lt;b&gt;May 18th, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Monday&lt;b&gt; May 13, 2013&lt;/b&gt;.  As the conference is a roundtable dialogue, we request that attendees  submit a brief introduction about themselves and their interest in the  topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-chennai'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-chennai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-05-06T10:01:45Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary">
    <title>CIS anniversary</title>
    <link>https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society will celebrate five years of its existence with an exhibition showcasing its works and accomplishments. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This was published in &lt;a class="external-link" href="http://www.thehindubusinessline.com/news/cis-anniversary/article4686344.ece"&gt;Hindu Business Line&lt;/a&gt; on May 5, 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The exhibition will be held concurrently at both Bangalore and Delhi offices from May 20 to 24, 2013, said a press release.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“To promote transparency, we're getting the general public to be our  auditors by throwing open our account books and contracts which show how  we have spent the Rs 8.3 crore received from our donors.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The exhibition will also see artists like Kiran Subbaiah, Tara Kelton,  Navin Thomas, Abhishek Hazra, among others exhibiting their works, as  well as lectures.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary'&gt;https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-05-06T07:28:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis">
    <title>Celebrating 5 Years of CIS</title>
    <link>https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is celebrating 5 years of its existence with an exhibition showcasing its activities and accomplishments. The exhibition will be held at its offices in Bangalore and Delhi from May 20 to 23, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-5-years-all-posters.zip" class="internal-link"&gt;Download all the posters exhibited during the recent exhibition here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;As a move to promote transparency, CIS is inviting the general public to be its auditors by throwing open its account books and contracts which show how it has spent the Rs. 13.13 crores received from its donors. The four-day event will see renowned artists like Kiran Subbaiah, Tara Kelton, Navin Thomas and Abhishek Hazra featuring their work and also giving live demonstrations.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;h2 align="JUSTIFY"&gt;Agenda&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;&lt;i&gt;Open exhibition on all the 4 days from 10.00 a.m. to &lt;/i&gt;&lt;i&gt;8&lt;/i&gt;&lt;i&gt;.00 p.m., in Bangalore and Delhi. The evening  programmes will be held in Bangalore&lt;/i&gt;. &lt;i&gt;Dinner will be served right afterwards.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Evening Programmes&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 align="JUSTIFY"&gt;May&lt;i&gt; &lt;/i&gt;20&lt;i&gt;, &lt;/i&gt;2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;19.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Why did I buy a set-top box?: What we know, don't know and need to know about Digitalisation &lt;/b&gt;&lt;b&gt;— A Talk by Vibodh Parthasarathi&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Why are we being asked to install set-top boxes? How will this change what we want, and pay for, on TV? Grappling with these questions, the talk will evaluate the rationale of the digital migration in cable currently underway, and the less talked about digital migration being planned for the public broadcaster. These scarcely debated and often contentious issues form the core of a recent &lt;a href="http://www.opensocietyfoundations.org/reports/mapping-digital-media-india"&gt;Country Report on the Media in India&lt;/a&gt;, anchored by the speaker. The India Country Report, the first inter-sectoral and policy oriented study of our electronic media landscape, finds the ongoing digitalisation of cable, the infusion of digital tools in the press and the proposed digital switchover of the public broadcaster, posing varied challenges not only to journalism but to public interest at large. This report is part of a global initiative, &lt;a href="http://www.opensocietyfoundations.org/projects/mapping-digital-media" target="_blank"&gt;Mapping Digital Media&lt;/a&gt;, examining opportunities and risks amidst the transitions to a digital media ecology across 50 countries.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/N8gCYiYS9VY" width="250"&gt;&lt;/iframe&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.00&lt;br /&gt;19.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Film Screening on Cyber Cafes of Rural India by Video Volunteers&lt;/b&gt;&lt;br /&gt;Video Volunteers in partnership with CIS have been documenting the cyber cafes of rural India. Kamini Menon and Christy Raj will do the screening of seven 2-minute films:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafe Trends Slowly Changing in Imphal&lt;/b&gt; by Achungmei Kamei (Manipur)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Transgender Interaction with Cyber Cafes &lt;/b&gt; by Christy Raj (Karnataka)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafes Prevail Over Mobile Phones in Nagaland&lt;/b&gt; by Meribeni Kikon (Nagaland)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Mobile Technology Threatens Cyber Cafes in HP&lt;/b&gt; by Avdhesh Negi (Himachal Pradesh)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafe Visit - A Day's Journey&lt;/b&gt; by Saroj Paraste (Madhya Pradesh)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Challenges of Establishing Cyber Cafes&lt;/b&gt; by Rohini Pawar (Maharashtra)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Community Service Centre - Myth or Reality?&lt;/b&gt; by Neeru Rathod (Gujarat)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Video&lt;/b&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2OxWtwIWNdc" width="250"&gt;&lt;/iframe&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.30&lt;br /&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Hindustani Classical Performance by Aditya Dipankar &lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 align="JUSTIFY"&gt;May 21, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;18.00&lt;br /&gt;19.00&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Screening of Sabaka &lt;br /&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;A young elephant trainer in India vows revenge against the cult that killed his family. He seeks help from the local Maharajah who refuses, and he sets out alone to battle the enemy... &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sabaka"&gt;Sabaka&lt;/a&gt; is a 1954 film produced and directed by Frank Ferrin starring Boris  Karloff, Reginald Denny, June Foray, et.al.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.00&lt;br /&gt;20.00&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Slouching towards Tlön: An Encyclopedia for the 2nd century of Indian cinema — A Talk by Lawrence Liang &lt;/b&gt;&lt;br /&gt;Ashish Rajadhyaksha and Paul Willemen’s Encyclopedia of Indian cinema (1994) marked an important moment for the study of Indian film history. In the two decades since its publication we have seen a rise in the academic community working on Indian film history along with the rise of various new archival initiatives online. Materials that were hitherto unavailable have also made their way into the public domain via the efforts of film historians, cinephiles and other enthusiasts. It is perhaps fitting to think about what a collaborative encyclopedia of Indian cinema for the 21st century may look like. Using Rajadhayksha and Willemen’s Encyclopedia as a base, Lawrence has been working on an online version that incorporates moving images, photographs and archival materials and his presentation will open up questions of how one thinks of an online encyclopedia as well as larger conceptual questions of the relationship between the encyclopedias, the internet and moving image archives.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2n5ZON8M_0E" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;May 22, 2013&lt;/h3&gt;
&lt;p&gt;Cybersecurity, Privacy and Surveillance&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;18.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;“&lt;b&gt;The Indian Surveillance State”&lt;/b&gt;&lt;b&gt;—&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;A Talk by Maria Xynou &lt;/b&gt;&lt;br /&gt;The Central Monitoring System confirms that, starting from last month ‘Big Brother’ is a reality in India. But how do authorities get the tech to spy on us? Maria has started investigating surveillance technology companies operating in India. So far, 76 companies have been detected which are producing and selling different types of surveillance gear to Indian law enforcement agencies. Join us to see India´s first investigation of who is aiding our watchers!&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/fshPBINoACs" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.30&lt;br /&gt;19.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Why Privacy and How?&lt;/b&gt; &lt;b&gt;A Talk &lt;/b&gt;&lt;b&gt;by Bernadette Langle &lt;/b&gt;&lt;br /&gt;"But I have nothing to hide!" That's what most people think. Are you sure? What about all the services you use for free, don't you think the service provider has to spend money on that, and that he needs to earn it somehow? Bernadette will show some alternatives and also how easy it can be, to put your messages in a virtual private envelope as you use to do with messages on paper.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/DVa8dkda1D0" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.00&lt;br /&gt;19.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Cyber Security Preview &lt;/b&gt;&lt;b&gt;—&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Presentation&lt;/b&gt;&lt;b&gt; by Laird Brown&lt;/b&gt; and&lt;b&gt; Purba Sarkar &lt;/b&gt;&lt;br /&gt;CIS in cooperation with Citizen Lab, Munk School of Global Affairs at the University of Toronto, is developing a film project on cyber security in India from a civil society perspective. Laird will show the preview of the project. The preview will include an overview of the project along with a video footage from the first series of interviews.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/moqgZ6tDl4g" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.45&lt;br /&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Faking of Fingerprints: &lt;/b&gt;&lt;b&gt;A Presentation by &lt;/b&gt;&lt;b&gt;Bernadette Langle &lt;/b&gt;&lt;br /&gt;Bernadette will give a brief presentation on how easy it is to fake a fingerprint. Afterwards you can get hands-on. Fake a fingerprint yourself and take it with you to your home.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/3q6UBK6lLRI" width="250"&gt;&lt;/iframe&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;May 23, 2013&lt;/h3&gt;
&lt;p&gt;Kannada Language and IT&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;18.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Kannada in Modern Era: A Guest Talk&lt;/b&gt;&lt;b&gt; by Dr. Chandrashekhara Kambara &lt;/b&gt;&lt;br /&gt;Dr. Chandrashekhara will be the chief guest for this session and will give a guest lecture.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/9bMUu08f_JU" width="250"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.15&lt;br /&gt;19.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;From Palm Leaf to Tablet – Journey of Kannada: A Talk by Dr. U.B. Pavanaja &lt;/b&gt;&lt;br /&gt;Kannada language which has a history of 2000 years and quite rich in literature started on palm leaves. Kannada advanced with modern times adopting the marvels of Information Technology. This is accomplished by successfully implementing Kannada in various facets of IT. It is being used everywhere from data driven applications to websites to hand held devices like tablets. These aspects will be brought out during the talk.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Summary in Kannada:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ತಾಳೆಗರಿಯಿಂದ ಟ್ಯಾಬ್ಲೆಟ್ ತನಕ ಕನ್ನಡದ ಪಯಣ&lt;br /&gt;ಸುಮಾರು ಎರಡು ಸಾವಿರ ವರ್ಷಗಳ ಭವ್ಯ ಇತಿಹಾಸವಿರುವ ಕನ್ನಡ ಸಾಹಿತ್ಯದ ಉಗಮ ತಾಳೆಗರಿಗಳ ಮೇಲೆ ಆಯಿತು. ಕನ್ನಡ ಭಾಷೆಯು ಆಧುನಿಕ ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಅದ್ಭುತ ಕೊಡುಗೆಗಳನ್ನು ತನ್ನದಾಗಿಸಿಕೊಂಡು ಬೆಳೆಯಿತು. ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಎಲ್ಲ ಅಂಗಗಳಲ್ಲಿ ಕನ್ನಡವನ್ನು ಅಳವಡಿಸಿ ಬಳಸಿಕೊಳ್ಳುವುದರ ಮೂಲಕ ಇದು ಸಾಧ್ಯವಾಯಿತು. ಆನ್ವಯಿಕ ತಂತ್ರಾಂಶವಿರಲಿ, ಪ್ರತಿಸ್ಪಂದನಾತ್ಮಕ ಜಾಲತಾಣವಿರಲಿ, ಕೈಯಲ್ಲಿ ಹಿಡಿದು ಕೆಲಸ ಮಾಡುವ ಟ್ಯಾಬ್ಲೆಟ್ ಇರಲಿ –ಎಲ್ಲ ಕಡೆ ಕನ್ನಡದ ಬಳಕೆ ಆಗುತ್ತಿದೆ. ಈ ಎಲ್ಲ ವಿಷಯಗಳ ಕಡೆ ಒಂದು ಪಕ್ಷಿನೋಟವನ್ನು ಈ ಭಾಷಣದಲ್ಲಿ ನೀಡಲಾಗುವುದು.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/w4CiHwpX9X0" width="250"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.30&lt;br /&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Carnatic Music Performance by Nirmita Narasimhan&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Video&lt;br /&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="255" src="http://www.youtube.com/embed/-P4v5u_Q34M" width="250"&gt;&lt;/iframe&gt; &lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Speakers&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/VPforblurb.jpg" alt="Vibodh" class="image-inline" title="Vibodh" /&gt;&lt;br /&gt;Vibodh Parthasarathi&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Vibodh Parthasarathi &lt;/b&gt;works with the Centre for Culture and Media Governance, Jamia Millia Islamia, New  Delhi. He is also a Board Member at the Centre for Internet and Society, Bangalore. He maintains a multidisciplinary interest in media and development policy, business history of creative industries, and governance of media infrastructure. At the Centre for Culture, Media &amp;amp; Governance, Jamia Millia Islamia, New Delhi, his ongoing research addresses media policy literacy, the TV news industry and the digital switchover in India. He is the co-editor of the critically acclaimed tri-series on Communication Process (Sage).&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Lawrence.png" alt="Lawrence" class="image-inline" title="Lawrence" /&gt;&lt;/p&gt;
&lt;p&gt;Lawrence Liang&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Lawrence Liang&lt;/b&gt; is the Chairman of the Board at the Centre for Internet and Society. He is a  graduate of the National Law School. He subsequently pursued his Masters degree in Law and Development at Warwick, on a Chevening Scholarship. His key areas of interest are law, technology and culture, the politics of copyright and he has been working closely with Sarai, New Delhi on a joint research project Intellectual Property and the Knowledge/Culture Commons. A keen follower of the open source movement in software, Lawrence has been working on ways of translating the open source ideas into the cultural domain. He has written extensively on these issues and is the author of &lt;i&gt;The Public is Watching: Sex, Laws and Videotape&lt;/i&gt; and &lt;i&gt;A Guide to Open Content Licenses&lt;/i&gt;. Lawrence has taught at NLS, the Asian College of Journalism, NALSAR, etc., and is currently working on a Ph.D. on the idea of cinematic justice at Jawaharlal Nehru University.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_maria.jpg" alt="Maria" class="image-inline" title="Maria" /&gt;&lt;br /&gt;Maria Xynou&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Maria Xynou&lt;/b&gt; is a Policy Associate on the Privacy Project at the CIS. She has previously interned with Privacy International and with the Parliament of Greece. Maria holds a Master of Science in Security Studies from the University College London (UCL). &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Bernadette.jpg" alt="Bernadette" class="image-inline" title="Bernadette" /&gt;
&lt;p&gt;Bernadette Langle&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Bernadette Längle &lt;/b&gt;recently graduated in social and cultural anthropology, philosophy and computer science. She is also a so-called hacktivist together with one of the oldest hacker associations of the world, the Chaos Computer Club, having a lot of influence in German politics. As one of the core-team organizer of Chaos Communication Congress in Germany she also has a lot of experience in organizing events.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Laird.png" alt="Laird Brown" class="image-inline" title="Laird Brown" /&gt;&lt;br /&gt;Laird Brown&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Laird Brown&lt;/b&gt; is a strategic planner and writer. His core competencies are brand analysis, public relations, and resource management. Laird has worked at the United Nations in New York; high-tech ventures in North America, Europe, and India; and, is a guest speaker at ICT conferences internationally. He is currently working on a film project for CIS on cyber security in India with Purba Sarkar.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/purba.jpg" alt="Purba" class="image-inline" title="Purba" /&gt;&lt;br /&gt;Purba Sarkar&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Purba Sarkar&lt;/b&gt; is an associate producer with the cyber security film project. She holds a Bachelor in Technology degree from West Bengal University of Technology. Purba worked as a strategic advisor in the field of SAP Retail for 4 years before joining CIS in January, 2013.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Kambara.png" alt="Kambara" class="image-inline" title="Kambara" /&gt;Dr.Chandrashekhara Kambara&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Chandrashekhara Kambara&lt;/b&gt; is a prominent poet, playwriter, folklorist, film director in Kannada language. He is also the founder-vice-chancellor of Kannada University in Hampi. He is known for his effective usage of North Karnataka dialect of Kannada language in his plays and poems and is often compared with D.R. Bendre. He has been conferred with many prestigious awards including the Jnanpith Award (the highest literary honour conferred in India) in 2011 for the year 2010, the Sahitya Akademi Award, the Padma Shri by Government of India, Kabir Samman, Kalidas Samman and Pampa Award. After his retirement, Kambara was nominated Member of Karnataka Legislative Council, to which he made significant contributions through his interventions. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_Pavanaja.png" alt="Pavanaja" class="image-inline" title="Pavanaja" /&gt;&lt;br /&gt;Dr. U.B. Pavanaja&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr U B Pavanaja&lt;/b&gt; holds a Master’s degree from Mysore University and Ph.D. from Mumbai University. He was a scientist at the Bhabha Atomic Research Centre, Mumbai, for about 15 years. He has done advanced research in Taiwan. He resigned from BARC in 1997 and dedicated himself fully for the cause of Computer and Indian languages. He has to his credit many firsts, viz., first Kannada website, first Kannada online magazine, first Indian language (Kannada) website to receive Golden Web Award, first Indian language (Kannada) editor for Palm OS, first Indian language (Kannada) editor for WinCE device (HP Jornado 720), first Indian language version (Kannada) of universally popular Logo (programming language for children) software, etc. His Kannada logo won the Manthan Award for the year 2006. He was a member of the technical advisory committee setup by the Govt. of Karnataka for Standardization of Kannada on Computers (2000). He is also a member of the Kannada Software Committee of Govt. of Karnataka (2008-current). &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;The Artists&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Kiran.png" alt="Kiran Subbaiah" class="image-inline" title="Kiran Subbaiah" /&gt;&lt;br /&gt;Kiran Subbaiah&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Kiran Subbaiah&lt;/b&gt; studied sculpture at Santiniketan, MSU Baroda and the RCA London. He was an artist in residence at the Rijksakademie Amsterdam where he worked on art that incorporated informatics and electro-mechanics. He is also known for making videos using custom-built tools that enable him to perform multi-person film-making tasks single-handed. His art is shown extensively in India and abroad. Subbaiah is based in Bangalore and is represented by the Chatterjee and Lal gallery in Mumbai. Kiran will present the Spectator, a robot that can sense the presence of human beings around it. It tries to appreciate them as works of art.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Tara.png" alt="Tara Kelton" class="image-inline" title="Tara Kelton" /&gt;&lt;br /&gt;Tara Kelton&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Tara Kelton&lt;/b&gt; is an artist and designer. She has been living in Brooklyn, USA and Bangalore, India for the last three years. She received her MFA from the Yale School of Art in 2009. Kelton’s video, print, and web-based works investigate moments in which technology alters our perception of the physical world. Kelton has taught at the Srishti School of Art, Design, and Technology and has recently exhibited her work at Vox Populi (USA), Franklin Street Works (USA), GALLERYSKE (Bangalore) and the India Design Forum (Mumbai). Tara will present &lt;i&gt;Trace&lt;/i&gt;, a surveillance camera feed drawn in real-time by anonymous online workers.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Navin.png" alt="Navin Thomas" class="image-inline" title="Navin Thomas" /&gt;&lt;br /&gt;Navin Thomas&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Navin Thomas&lt;/b&gt; is a multimedia artist and a professional scrap market junkie, he spends a good quality of his precious time looking for obscure cultural misfits... after destroying most of himself in the 90's, he now spends his time restoring your mother's brother’s tin space toys and other unusual situations.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Abhishek.png" alt="Abhishek Hazra" class="image-inline" title="Abhishek Hazra" /&gt;Abhishek Hazra&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Abhishek Hazra&lt;/b&gt; approaches his art with a particular emphasis on the study of the historiography of science. He uses videos and prints that often integrate textual fragments drawn from real and fictional scenarios. He has previously exhibited and performed at Science Gallery, Dublin, HEART Herning Museum of Contemporary Art, Denmark, Astrup Fearnley Museum of Modern Art, Oslo, Casino Luxembourg Forum d’art Contemporain, Experiment Marathon Reykjavik, Reykjavik Art Museum and Kunstmuseum Bern. Abhishek was most recently an artist in residence at SymbioticA, the Centre for Excellence in Biological Arts, University of Western Australia, Perth. It was first  performed as part of Beam Me Up, curated by Reinhard Storz and Gitanjali Dang, which was acknowledged by Pro Helvetia, New Delhi and German Book Office, New Delhi. Abhishek will be presenting #cloudrumble56 (attempted to re-animate sections of the Indian parliamentary archives — specifically, the transcripts of the scientist M.N. Saha's (1893-1956) interventions — through a performance that was transmitted only through live tweets on Twitter).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Aditya.png" alt="Aditya Dipankar" class="image-inline" title="Aditya Dipankar" /&gt;Aditya Dipankar&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Aditya Dipankar &lt;/b&gt;started fiddling with music at the age of 4 when he started learning the &lt;i&gt;tabla&lt;/i&gt; and then went on to play it for a long time. Years later, he discovered his strong inclination towards singing. Now, under the noble guidance of Pandit Vijay Sardeshmukh (Senior disciple of Pandit Kumar Gandharva), he is trying to understand the simplicity and spontaneity in the rich tradition of Hindustani classical music.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Nirmita.png" alt="Nirmita Narasimhan" class="image-inline" title="Nirmita Narasimhan" /&gt;Nirmita Narasimhan&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Nirmita Narasimhan&lt;/b&gt; is a Policy Director at CIS and works on accessibility for persons with disabilities. She was awarded the national award for empowerment of persons with disabilities by the President of India and also received the NIVH Excellence Award. Nirmita Narasimhan is a disciple of Dr. Radha Venkatachalam and renowned maestro Prof. T.R. Subramanyam. She began learning music at the age of 5 and went on to complete her Ph.D. in this subject from the Delhi University. Nirmita has been performing since 1995 and received several accolades such as the Sahitya Kala Parishad Scholarship and prizes in several competitions. She received the Gold medal in MA for standing first in the University and also stood first in MPhil. She has released a CD on Ponnayya Pillai compositions and also sung in an album of &lt;i&gt;varnams&lt;/i&gt;. Nirmita has performed in different places in India such as Delhi, Chennai, Tirupathi and Bangalore as well as in Singapore and has also given several thematic concerts such as &lt;i&gt;Eka Raga Sandhya&lt;/i&gt; and &lt;i&gt;Pallavi&lt;/i&gt; concerts. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/sharathcopy.jpg" alt="Sharath Chandra Ram" class="image-inline" title="Sharath Chandra Ram" /&gt;&lt;/p&gt;
&lt;p&gt;Sharath Chandra Ram&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Sharath Chandra Ram (Sharathchandra Ramakrishnan) has interests in multimodal art, cognitive science, accessibility, digital humanities and network cultures. He is a faculty at the Centre for Experimental Media Arts at the Srishti School of Art Design and Technology. At the Centre for Internet and Society he helped set up and manage activities at the Metaculture Media Lab : an open hackerspace and alternative platform for research and exchange. His writings and musings at CIS maybe found here: &lt;a href="https://cis-india.org/author/sharath"&gt;http://cis-india.org/author/sharath&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He graduated from the University of Edinburgh with a degree in Artificial Intelligence specializing in interactive virtual environments. Previously as a Research Associate at the National Institute of Mental Health and Neurosciences he received a special mention award at the International Conference on Consciousness (2012) held at the National Institute of Advanced Studies for his work on ‘Cross modal Integration’. As an amateur radio broadcaster, he is a proponent of the free use of airwaves for relief work, education and transmission art. He has also been a development related radio journalist (PANOS @ Nepal, Voices UNDP@Bangalore), speaker at the International Ham Radio Convention (Port Blair, 2006) and as a film enthusiast has been a Press Reviewer for the Edinburgh International Film Festival.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;span class="author-g-ecflmmhkz122zm34g8fj"&gt;Locations&lt;/span&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;span class="author-g-ecflmmhkz122zm34g8fj"&gt;Bangalore&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society&lt;br /&gt;No. 194, Second 'C' Cross, Domlur,&lt;br /&gt;2nd Stage, Bangalore - 560071,&lt;br /&gt;Karnataka, India &lt;br /&gt;Ph: +91 80 4092 6283                 &lt;br /&gt; Fax: +91 80 2535 0955&lt;/p&gt;
&lt;h3&gt;Delhi&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society&lt;br /&gt;G 15, Top floor&lt;br /&gt;Behind Hauz Khas, G Block Market&lt;br /&gt;Hauz Khas,&lt;br /&gt;New Delhi 110016&lt;br /&gt;Ph: + 91 011 40503285&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Event Brochure&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-celebrates-5-years.pdf" class="internal-link"&gt;Event Flier&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Event Posters/Banners and Videos&lt;/h2&gt;
&lt;hr /&gt;
&lt;h3&gt;Accessibility&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;National Resource Kit (&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;NVDA E-Speak (&lt;a href="https://cis-india.org/accessibility/blog/nvda-espeak.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/nvda-espeak" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;International Collaborations (&lt;a href="https://cis-india.org/accessibility/blog/international-collaborations.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/international-collaborations" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Partners (&lt;a href="https://cis-india.org/accessibility/blog/partners.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/partners" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Publications (&lt;a href="https://cis-india.org/accessibility/blog/publications.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/publications" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Timeline (&lt;a href="https://cis-india.org/accessibility/blog/timeline.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/timeline" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Inclusive Planet (PDF, &lt;a href="https://cis-india.org/accessibility/blog/inclusive-planet" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;In the below video Anandhi Viswanathan gives a demo of the National Resource Kit project  and Rameshwar Nagar gives a demo of the NVDA and ESpeak (Text-to-Speech)  project during the exhibition.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2Z1xfwvkFoQ" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;Access to Knowledge&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Broadcast Treaty (&lt;a href="https://cis-india.org/a2k/blogs/broadcast-treaty.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/broadcast-treaty" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Copyright (&lt;a href="https://cis-india.org/a2k/blogs/copyright-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/copyright" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software Patent 1 (&lt;a href="https://cis-india.org/a2k/blogs/software-patent-1.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/software-patent-1" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software Patent 2 (&lt;a href="https://cis-india.org/a2k/blogs/software-patent-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/software-patent-2" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Pervasive Technologies (&lt;a href="https://cis-india.org/a2k/blogs/pervasive-technologies-exhibition-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/pervasive-technologies-poster.pdf" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Access to Knowledge (Wikipedia)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Factsheet (&lt;a href="https://cis-india.org/openness/blog-old/indian-language-factsheet.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/indian-language-wikipedia-factsheet" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Reaching Out (&lt;a href="https://cis-india.org/openness/blog-old/reaching-out.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/reaching-out-to-participants" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Outreach (&lt;a href="https://cis-india.org/openness/blog-old/outreach.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/outreach" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Bridging Gender Gap (&lt;a href="https://cis-india.org/openness/blog-old/bridging-gender-gap.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/bridging-the-gender-gap" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Press Coverage (&lt;a href="https://cis-india.org/openness/blog-old/press-coverage.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/wikipedia-press-coverage" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Education Programmes (&lt;a href="https://cis-india.org/openness/blog-old/education-programmes.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/wiki-education-programs" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Team Achievements (&lt;a href="https://cis-india.org/openness/blog-old/achievements.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/access-to-knowledge-team-achievements" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Visualization (&lt;a href="https://cis-india.org/openness/blog-old/visualization.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/indic-wikipedia-project-visualization" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Open Access to Scholarly Literature (&lt;a href="https://cis-india.org/openness/blog-old/open-access-to-scholarly-literature.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-access-2-scholarly-literature" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Open Access to Law (&lt;a href="https://cis-india.org/openness/blog-old/open-access-to-law-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-access-2-law" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Open Standards (&lt;a href="https://cis-india.org/openness/blog-old/open-standards-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-standards" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Free/Open Source Software (&lt;a href="https://cis-india.org/openness/blog-old/foss-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/foss" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;Internet Governance (Free Speech)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Blocking of Websites (&lt;a href="https://cis-india.org/internet-governance/blog/blocking-websites.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/blocking-websites" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Freedom of Speech  (&lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-speech.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/free-speech" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Intermediary Liability (&lt;a href="https://cis-india.org/internet-governance/blog/intermediary-liability-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/intermediary" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Internet Governance Forum (&lt;a href="https://cis-india.org/internet-governance/blog/internet-governance-forum.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/igf" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Internet Governance (Privacy)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Privacy Events (&lt;a href="https://cis-india.org/internet-governance/blog/privacy-events.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/events" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Timeline (&lt;a href="https://cis-india.org/internet-governance/blog/privacy-timeline.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/events" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;UID (1) (&lt;a href="https://cis-india.org/internet-governance/blog/uid" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/uid" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unique-identity" class="internal-link"&gt;&lt;/a&gt;UID (2) (&lt;a href="https://cis-india.org/internet-governance/blog/uid-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/unique-identity" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;DNA (1) (&lt;a href="https://cis-india.org/internet-governance/blog/dna-1.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-1" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;DNA (2) (&lt;a href="https://cis-india.org/internet-governance/blog/dna-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-2" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Telecom&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Institutional Framework for Indian Telecommunication (&lt;a href="https://cis-india.org/telecom/blog/institutional-framework-for-indian-telecommunication.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/institutional-framework" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Growth of Telecom Industry in India (&lt;a href="https://cis-india.org/telecom/blog/growth-of-telecom-industry-in-india.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/growth-of-telecom" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Delicensed Spectrum (&lt;a href="https://cis-india.org/telecom/blog/delicensed-spectrum.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/delicensed" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Spectrum Sharing (&lt;a href="https://cis-india.org/telecom/blog/spectrum-sharing.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/spectrum" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;RAW Monographs&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Archives and Access (&lt;a href="https://cis-india.org/raw/archives-and-access.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/archives-access" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Internet, Society and Space in Indian Cities (&lt;a href="https://cis-india.org/raw/internet-society-and-space.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/internet-society-space" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;The Last Cultural Mile (&lt;a href="https://cis-india.org/raw/last-cultural-mile.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/last-cultural-mile" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Porn, Law, Video Technology (&lt;a href="https://cis-india.org/raw/porn-law-video-technology.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/porn-law-video-technology" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Re:Wiring Bodies (&lt;a href="https://cis-india.org/raw/rewiring-bodies.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/re-wiring-bodies" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Community Informatics and Open Government Data (Special Issue) (&lt;a href="https://cis-india.org/raw/community-informatics-open-govt-data.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/spl-issue-community-informatics-and-ogd" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;News and Media&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Media Coverage (&lt;a href="https://cis-india.org/internet-governance/blog/media-coverage.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/home-images/MC.png/view" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Organizational Chart (&lt;a href="https://cis-india.org/internet-governance/blog/organizational-chart.pdf" class="internal-link"&gt;PDF&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis'&gt;https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2014-02-25T09:15:58Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
