<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2711 to 2725.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/learn-yourself"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-statement-un-cirp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-sexual-minorities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/media-economics-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-india-chronicles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/hacking-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/understanding-right-to-information"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/learn-yourself">
    <title>Learn It Yourself</title>
    <link>https://cis-india.org/news/learn-yourself</link>
    <description>
        &lt;b&gt;The peer-to-peer world of online learning encourages conversations and reciprocal learning, writes Nishant Shah in an article published in the Indian Express on 30 October 2011. &lt;/b&gt;
        
&lt;p&gt;Technologies and learning have always had a close link. In the past, distance learning programmes of higher education through the postal service, remote education programmes using satellite TV and interactive learning projects using information and communication infrastructure, have all been deployed with varied results in promoting literacy and higher education. In the last two decades, the internet has also joined this technology ecology in trying to provide quality and affordable education to remotely located areas through “citizen service centres” envisioned to reach 6,40,000 Indian villages in the future.&lt;/p&gt;
&lt;p&gt;These technology-based information outreach programmes expand the ability of traditional formal learning centres like universities, to cater to the needs of those who might not have access to learning resources. This vision of networked education relies on existing systems of centralised syllabus making, teacher-to-student information transfer, grade-based evaluation and accreditation systems, and a degree-centred approach to learning.&lt;/p&gt;
&lt;p&gt;I was in New York last week, at an international summit on the future of learning, Mobility Shifts, organised by the New School, where more than 260 speakers from 21 countries discussed the possibility of learning beyond the bounds of the school and university system. Many discussions were around the declining public education system (with huge disinvestment moves from the government), privatisation of education, increasing tuition and fees, and the non-relevance of current education. However, along with this digital expansion of the traditional education system is an emerging trend that challenges the ways in which we understand education and learning – DIY Learning or Do It Yourself Learning.&lt;/p&gt;
&lt;p&gt;DIY Learning is a product of the networked condition. It recognises that as more people get onto digital information networks, there is a possibility of producing peer-to-peer learning conditions, which do not have to follow our accepted models of learning and education.&lt;/p&gt;
&lt;p&gt;We have seen the rise of various decentralised and democratised knowledge repositories like Wikipedia. The search based algorithms of search engines also take into consideration the idea that knowledge is personal. User generated content sites like eHow.com show that the individual learner is not merely a recipient of information and knowledge. Information seeking spaces like Quora have shown that knowledge-sharing communities can incite new conditions of learning. Our contexts, experiences, everyday practices, aspirations etc. equip us with valuable information, which not only shape how we learn but also what we find relevant to learn for ourselves. DIY Learning picks up on the idea that the infrastructure of education is not necessarily designed towards learning. Learning often happens outside the classrooms, in informal conversations.&lt;/p&gt;
&lt;p&gt;Thus DIY Learning offers a new model of learning. It destabilises the established hierarchy of knowledge production and pedagogy and creates an each-one-teach-one model with a twist. Instead of a centralised board of curriculum designer who shape syllabi for the “average” student, you have the possibility of customised, highly individual, interest-based learning curricula where the student is a part of deciding what s/he wants to learn. DIY Learning doesn’t recognise the distinctions between teachers and students, but recognises them as “peers” within a network, encouraging conversations and reciprocal learning rather than information transfer based classroom models. Instead of mass-produced education that caters only to an imagined average, the DIY Learning model recognises that within the same student group, there are different rates and scales of learning, thus offering environments suited to the aptitude of the students.&lt;/p&gt;
&lt;p&gt;Within the DIY Learning model, aspects of education, from the design of curriculum and learning methods, to grading and evaluation are geared towards individual preferences and aspirations.&lt;/p&gt;
&lt;p&gt;Many people think of DIY Learning as an alternative to mainstream learning processes and structures. However, it is perhaps more fruitful to think of DIY Learning as a way of figuring out the problems that beset our traditional educational system. It allows us to rethink the relationships between learning, education, teaching and technologies. It recalibrates the space of the classroom and reconfigures the role of the teacher and the student.&lt;/p&gt;
&lt;p&gt;DIY Learning emphasises that merely building schools and universities is not enough to assure that learning happens. Learning happens through experiences, practice, conversations, internalisations and through making mistakes. DIY Learning offers these possibilities in an education universe that is constantly refusing to take risks, innovate and adapt to the needs of the present. By itself it might not be able to take on the roles and functions of the existing education systems. But it does warn us that we are preparing our students for our pasts rather than their futures. And the time to change is now.&lt;/p&gt;
&lt;p&gt;The original story was published in the Indian Express, it can be read &lt;a class="external-link" href="http://www.indianexpress.com/news/learn-it-yourself/867069/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/learn-yourself'&gt;https://cis-india.org/news/learn-yourself&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-23T05:01:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics">
    <title>CIS Comments on the Draft National Policy on Electronics</title>
    <link>https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics</link>
    <description>
        &lt;b&gt;These were the comments submitted by CIS to the request for comments put out by the Department of Information Technology on its draft 'National Policy on Electronics'.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Department of Information Technology must be commended for taking the initiative to create &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/Draft-NationalPolicyonElectronics2011_4102011(2).pdf"&gt;this policy&lt;/a&gt; which aims to reduce India’s dependence on other countries for crucial electronic hardware requirements, and to increase Indian production to such a capacity as to not only serve India’s increasing demand for electronics, but to fulfil foreign demand as well.&lt;/p&gt;
&lt;p&gt;We have mainly focused our comments on the implications of the patent regime on this laudable goal.&lt;/p&gt;
&lt;h2 id="technology-transfer"&gt;Technology Transfer&lt;/h2&gt;
&lt;p&gt;An area that the policy is silent on is technology transfer. In relation to technology, the main bargain embedded in the Trade-Related Intellectual Property Rights (TRIPS) Agreement of the WTO was the increase in the level of protection offered under patent laws of developing countries in exchange for increased transfer of technological know-how from the developed countries. While India has increased patent protection in accordance with the TRIPS Agreement, there has been no commensurate transfer of technology from countries which are currently hubs of electronics know-how.&lt;/p&gt;
&lt;p&gt;One important example is China’s policy on transfer of technology along the whole value chain to enable domestic firms to gain technological expertise.&lt;/p&gt;
&lt;p&gt;The Association of American Manufacturing notes, “One of the most potent weapons China has used to move up the value chain is forced technology transfer … It is only through the acquisition (rather than internal development) of sophisticated technologies that Chinese companies have been able to rapidly enter and expand in sophisticated industries ….”&lt;/p&gt;
&lt;p&gt;This insistence on technology transfer as a national policy has served China well, and their experience should be incorporated into India’s National Policy on Electronics. This is not to say that India should not internally develop our own technological capabilities, but that the Indian government must use the policy space available to it to ensure that acquisition of technological capabilities happens alongside.&lt;/p&gt;
&lt;h2 id="outflow-of-foreign-exchange-as-royalties-creating-adverse-balance-of-payments"&gt;Outflow of Foreign Exchange as Royalties Creating Adverse Balance of Payments&lt;/h2&gt;
&lt;p&gt;The latest data from the World Bank shows that our balance of payments is increasing adversely at an alarming rate, and has now reached over USD 2.38 billion.&lt;/p&gt;
&lt;p&gt;Our royalty and licence fee payments have kept on increasing at an astounding rate.&lt;/p&gt;
&lt;h3 id="table-indias-royalty-and-licence-fees-payments-current-usd"&gt;Table: India’s royalty and licence fees payments (current USD)&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th align="right"&gt;1991&lt;/th&gt;
&lt;th align="right"&gt;2006&lt;/th&gt;
&lt;th align="right"&gt;2007&lt;/th&gt;
&lt;th align="right"&gt;2008&lt;/th&gt;
&lt;th align="right"&gt;2009&lt;/th&gt;
&lt;th align="right"&gt;2010&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="right"&gt;49,565,208&lt;/td&gt;
&lt;td align="right"&gt;845,949,436&lt;/td&gt;
&lt;td align="right"&gt;1,159,824,391&lt;/td&gt;
&lt;td align="right"&gt;1,528,826,913&lt;/td&gt;
&lt;td align="right"&gt;1,860,283,808&lt;/td&gt;
&lt;td align="right"&gt;2,437,500,663&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Meanwhile India’s income is gaining slowly and erratically, and in 20100 reached USD 59.6 million.&lt;/p&gt;
&lt;h3 id="table-indias-royalty-and-licence-fees-receipts-current-usd"&gt;Table: India’s royalty and licence fees, receipts (current USD)&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr class="header"&gt;
&lt;th align="right"&gt;1991&lt;/th&gt;
&lt;th align="right"&gt;2006&lt;/th&gt;
&lt;th align="right"&gt;2007&lt;/th&gt;
&lt;th align="right"&gt;2008&lt;/th&gt;
&lt;th align="right"&gt;2009&lt;/th&gt;
&lt;th align="right"&gt;2010&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="right"&gt;615,525&lt;/td&gt;
&lt;td align="right"&gt;13,445,053&lt;/td&gt;
&lt;td align="right"&gt;30,690,000&lt;/td&gt;
&lt;td align="right"&gt;27,211,957&lt;/td&gt;
&lt;td align="right"&gt;38,128,141&lt;/td&gt;
&lt;td align="right"&gt;59,560,687&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;This bleeds the Indian economy through a very inefficient outflow of capital. Insisting on transfer of technology is an important component in slowing down this trend.&lt;/p&gt;
&lt;h2 id="linking-of-value-chain-and-preferential-treatment"&gt;Linking of Value Chain and Preferential Treatment&lt;/h2&gt;
&lt;p&gt;One important clarification that is needed in the policy (specifically clause IV.1.3) is that “domestically manufactured electronic products” is intended to mean not those products for which the last part of value has been added in India. This way essentially non-Indian products with Indian branding can be seen to be “domestically manufactured electronic products”. The longer the Indian part of the value chain, the more preference it should be given, and holding by Indian companies of essential patent rights (or the availability of greater number of components of the product under royalty-free, FRAND and RAND licences) could be an important criteria. This will also encourage the transfer of technological know-how to Indian firms.&lt;/p&gt;
&lt;h2 id="preferential-treatment"&gt;Preferential Treatment&lt;/h2&gt;
&lt;p&gt;Some may argue that the provision of preferential treatment to domestic manufacturers contravenes the GATT Agreement, however the GATT Agreement itself provides a usable exception in Article 3(8):&lt;/p&gt;
&lt;blockquote class="callout"&gt;
&lt;p&gt;Article III: National Treatment on Internal Taxation and Regulation&lt;/p&gt;
&lt;p&gt;8 (a) The provisions of this Article shall not apply to laws, regulations or requirements governing the procurement by governmental agencies of products purchased for governmental purposes and not with a view to commercial resale or with a view to use in the production of goods for commercial sale.&lt;/p&gt;
&lt;p&gt;(b) The provisions of this Article shall not prevent the payment of subsidies exclusively to domestic producers, including payments to domestic producers derived from the proceeds of internal taxes or charges applied consistently with the provisions of this Article and subsidies effected through governmental purchases of domestic products.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thus, by crafting any further regulation under this policy to fit within this exception, India would not fall afoul of its obligations under GATT.&lt;/p&gt;
&lt;h2 id="cybersecurity-and-source-code"&gt;Cybersecurity and Source Code&lt;/h2&gt;
&lt;p&gt;An important aspect of the cybersecurity that is discussed in clause IV.5 is the ability to validate the lack of malicious code in the electronics used in strategically important infrastructure. For this, manufacturers must be required to provide the source code as part of government tenders in strategically important infrastructure.&lt;/p&gt;
&lt;h2 id="distinction-between-innovation-and-intellectual-property"&gt;Distinction between Innovation and Intellectual Property&lt;/h2&gt;
&lt;p&gt;The Electronic Development Fund must seek to promote innovation, research and development, and commercialization of products, and must be used to strategically acquire patents. Promotion of patents is not an end in itself, unlike promotion of innovation and ensuring that research and development reaches markets through commercialization. Patents are only a means to an end, and may sometimes be strategically useful, and often stand in way of gaining optimal use of technology by markets due to their monopolistic nature. Thus, it is recommended that “promotion of IP” be dropped from this clause, and instead “promotion of strategic acquirement and use of patents” be substituted in its place.&lt;/p&gt;
&lt;h2 id="national-electronics-mission"&gt;National Electronics Mission&lt;/h2&gt;
&lt;p&gt;The National Electronics Mission should not only have industry participation but also participation from academia and civil society.&lt;/p&gt;
&lt;h2 id="funding"&gt;Funding&lt;/h2&gt;
&lt;p&gt;The issue of funding for the initiatives outlined in this policy must be addressed as well.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics'&gt;https://cis-india.org/internet-governance/comments-draft-national-policy-on-electronics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Government Feedback</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>e-Governance</dc:subject>
    
    
        <dc:subject>Submissions</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    

   <dc:date>2011-11-01T00:05:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-statement-un-cirp">
    <title>India's Statement Proposing UN Committee for Internet-Related Policy</title>
    <link>https://cis-india.org/internet-governance/blog/india-statement-un-cirp</link>
    <description>
        &lt;b&gt;This is the statement made by India at the 66th session of the United Nations General Assembly, in which its proposal for the UN Committee for Internet-Related Policy was presented.&lt;/b&gt;
        
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;66th Session of the UN General Assembly&lt;/h2&gt;
&lt;h2&gt;New York. October 26, 2011.&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Agenda Item 16: Information and Communications&lt;/h2&gt;
&lt;h2&gt;Technologies for Development (ICT): Global Internet Governance&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Statement by India&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;&lt;br /&gt;Mr. Chairman,&lt;br /&gt;&lt;br /&gt;We thank the Secretary-General for his report on enhanced cooperation on public policy issues pertaining to the Internet, contained in document A/66/77, which provides a useful introduction to the discussions under this agenda item.&lt;br /&gt;&lt;br /&gt;As a multi-ethnic, multi-cultural and democratic society with an open economy and an abiding culture of pluralism, India emphasizes the importance that we attach to the strengthening of the Internet as a vehicle for openness, democracy, freedom of expression, human rights, diversity, inclusiveness, creativity, free and unhindered access to information and knowledge, global connectivity, innovation and socio-economic growth.&lt;br /&gt;&lt;br /&gt;We believe that the governance of such an unprecedented global medium that embodies the values of democracy, pluralism, inclusion, openness and transparency should also be similarly inclusive, democratic, participatory, multilateral and transparent in nature.&lt;br /&gt;&lt;br /&gt;Indeed, this was already recognized and mandated by the Tunis Agenda in 2005, as reflected in paragraphs 34, 35, 56, 58, 59, 60, 61 and 69 of the Agenda. Regrettably, in the six long years that have gone by, no substantial initiative has been taken by the global community to give effect to this mandate.&lt;br /&gt;&lt;br /&gt;Meanwhile, the internet has grown exponentially in its reach and scope, throwing up several new and rapidly emerging challenges in the area of global internet governance that continue to remain inadequately addressed. It is becoming increasingly evident that the Internet as a rapidly-evolving and inherently global medium, needs quick-footed and timely global solutions and policies, not divergent and fragmented national policies.&lt;br /&gt;&lt;br /&gt;The range and criticality of these pressing global digital issues that continue to remain unaddressed, are growing rapidly with each passing day. It is, therefore, urgent and imperative that a multilateral, democratic participative and transparent global policy-making mechanism be urgently instituted, as mandated by the Tunis Agenda under the process of ‘Enhanced Co-operation’, to enable coherent and integrated global policy-making on all aspects of global Internet governance.&lt;br /&gt;&lt;br /&gt;Operationalizing the Tunis mandate in this regard should not be viewed as an attempt by governments to “take over” or “regulate and circumscribe” the internet. Indeed, any such misguided attempt would be antithetical not only to the internet, but also to human welfare. As a democratic and open society that has historically welcomed outside influences and believes in openness to all views and ideas and is wedded to free dialogue, pluralism and diversity, India attaches great importance to the preservation of the Internet as an unrestricted, open and free global medium that flourishes through private innovation and individual creativity and serves as a vehicle for open communication, access to culture, knowledge, democratization and development.&lt;br /&gt;&lt;br /&gt;India recognizes the role played by various actors and stakeholders in the development and continued enrichment of the internet, and is firmly committed to multi-stakeholderism in internet governance, both at the national and global level. India believes that global internet governance can only be functional, effective and credible if all relevant stake-holders contribute to, and are consulted in, the process.&lt;br /&gt;&lt;br /&gt;Bearing in mind the need for a transparent, democratic, and multilateral mechanism that enables all stakeholders to participate in their respective roles, to address the many cross-cutting international public policy issues that require attention and are not adequately addressed by current mechanisms and the need for enhanced cooperation to enable governments, on an equal footing, to carry out their roles and responsibilities in international public policy issues pertaining to the Internet, India proposes the establishment of a new institutional mechanism in the United Nations for global internet-related policies, to be called the United Nations Committee for Internet-Related Policies (CIRP). The intent behind proposing a multilateral and multi-stakeholder mechanism is not to “control the internet’’ or allow Governments to have the last word in regulating the internet, but to make sure that the Internet is governed not unilaterally, but in an open, democratic, inclusive and participatory manner, with the participation of all stakeholders, so as to evolve universally acceptable, and globally harmonized policies in important areas and pave the way for a credible, constantly evolving, stable and well-functioning Internet that plays its due role in improving the quality of peoples’ lives everywhere.&lt;br /&gt;&lt;br /&gt;The CIRP shall be mandated to undertake the following tasks:&lt;/p&gt;
&lt;ol type="i"&gt;&lt;li&gt;Develop and establish international public policies with a view to ensuring coordination and coherence in cross-cutting Internet-related global issues;&lt;/li&gt;&lt;li&gt;Coordinate and oversee the bodies responsible for technical and operational functioning of the Internet, including global standards setting;&lt;/li&gt;&lt;li&gt;Facilitate negotiation of treaties, conventions and agreements on Internet-related public policies;&lt;/li&gt;&lt;li&gt;Address developmental issues related to the internet;&lt;/li&gt;&lt;li&gt;Promote the promotion and protection of all human rights, namely, civil, political, social, economic and cultural rights, including the Right to Development;&lt;/li&gt;&lt;li&gt;Undertake arbitration and dispute resolution, where necessary; and,&lt;/li&gt;&lt;li&gt;Crisis management in relation to the Internet.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;br /&gt;The main features of CIRP are provided in the annex to this statement. In brief, the CIRP will comprise 50 Member States chosen on the basis of equitable geographical representation, and will meet annually for two working weeks in Geneva. It will ensure the participation of all relevant stakeholders by establishing four Advisory Groups, one each for civil society, the private sector, inter-governmental and international organizations, and the technical and academic community. The Advisory Groups will provide their inputs and recommendations to the CIRP. The meetings of CIRP and the advisory groups will be serviced by the UNCTAD Secretariat that also services the meetings of the Commission on Science and Technology for Development. The Internet Governance Forum will provide inputs to CIRP in the spirit of complementarity between the two. CIRP will report directly to the General Assembly and present recommendations for consideration, adoption and dissemination among all relevant inter-governmental bodies and international organizations. CIRP will be supported by the regular budget of the United Nations; a separate Fund would be set up by drawing from the domain registration fees collected by various bodies, in order to mainly finance the Research Wing to be established by CIRP to support its activities.&lt;br /&gt;&lt;br /&gt;Those familiar with the discourse on global internet governance since the beginning of the WSIS process at the turn of the millennium, will recognize that neither the mandated tasks of the CIRP, nor its proposed modalities, are new. The Working Group on Internet Governance (WGIG) set up by the UN Secretary- General had explicitly recognized the institutional gaps in global internet governance and had proposed four institutional models in its report to the UN General Assembly in 2005. The contours of the CIRP, as proposed above, reflect the common elements in the four WGIG institutional models. While the excellent report of the WGIG was much discussed and deliberated in 2005, unfortunately, no concrete follow-up action was taken to give effect to its recommendations on the institutional front. We hope that this anomaly will be redressed at least six years later, with the timely establishment of the CIRP.&lt;br /&gt;&lt;br /&gt;In order to operationalize this proposal, India calls for the establishment of an open-ended working group under the Commission on Science and Technology for Development for drawing up the detailed terms of reference for CIRP, with a view to actualizing it within the next 18 months. We are open to the views and suggestions of all Member States, and stand ready to work with other delegations to carry forward this proposal, and thus seek to fill the serious gap in the implementation of the Tunis Agenda, by providing substance and content to the concept of Enhanced Co-operation enshrined in the Tunis Agenda.&lt;br /&gt;&lt;br /&gt;Thank you, Mr. Chairman.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;***&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Annex&lt;/h2&gt;
&lt;h3&gt;The United Nations Committee for Internet-Related Policies (CIRP)&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;The United Nations Committee for Internet-Related Policies (CIRP) will have the following features:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Membership&lt;/strong&gt;: The CIRP will consist of 50 Member States of the United Nations, chosen/elected on the basis of equitable geographical representation. It will provide for equitable representation of all UN Member States, in accordance with established UN principles and practices. It will have a Bureau consisting of one Chair, three Vice-Chairs and a Rapporteur.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Meetings&lt;/strong&gt;: The CIRP will meet annually for two working weeks in Geneva, preferably in May/June, and convene additional meetings, as and when required. The UNCTAD Secretariat will provide substantive and logistical support to the CIRP by servicing these meetings.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Multi-stakeholder participation&lt;/strong&gt;: Recognizing the need to involve all stakeholders in Global Internet Governance in their respective roles, the CIRP shall ensure the participation of all stakeholders recognized in the Tunis Agenda. Four Advisory Groups – one each for Civil Society, the Private Sector, Inter-Governmental and International Organisations, and the Technical and Academic Community - will be established, to assist and advise the CIRP. These Groups would be self-organized, as per agreed principles, to ensure transparency, representativity and inclusiveness. The Advisory Groups will meet annually in Geneva and in conjunction with any additional meetings of the CIRP. Their meetings will be held back-to- back with the meetings of the CIRP, so that they are able to provide their inputs and recommendations in a timely manner, to the CIRP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reporting&lt;/strong&gt;: The CIRP will report directly to the UN General Assembly annually, on its meetings and present recommendations in the areas of policy and implementation for consideration, adoption and dissemination to all relevant inter-governmental bodies and international organizations. .&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Research Wing&lt;/strong&gt;: The Internet is a rapidly-evolving and dynamic medium that throws up urgent and rapidly-evolving challenges that need timely solutions. In order to deal effectively and prudently with these emerging issues in a timely manner, it would be vital to have a well-resourced Research Wing attached to the CIRP to provide ready and comprehensive background material, analysis and inputs to the CIRP, as required.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Links with the IGF&lt;/strong&gt;: Recognizing the value of the Internet Governance Forum as an open, unique forum for multi-stakeholder policy dialogue on Internet issues, the deliberations in the IGF along with any inputs, background information and analysis it may provide, will be taken as inputs for consideration of the CIRP. An improved and strengthened IGF that can serve as a purposeful body for policy consultations and provide meaningful policy inputs to the CIRP, will ensure a stronger and more effective complementarity between the CIRP and the IGF.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Budget&lt;/strong&gt;: Like other UN bodies, the CIRP should be supported by the regular budget of the United Nations. In addition, keeping in view its unique multi-stakeholder format for inclusive participation, and the need for a well-resourced Research Wing and regular meetings, a separate Fund should also be set up drawing from the domain registration fees collected by various bodies involved in the technical functioning of the Internet, especially in terms of names and addresses.&lt;br /&gt;&lt;br /&gt;***&lt;/p&gt;
&lt;h3&gt;Excerpts from the Tunis Agenda&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;Paragraph 34 of the Tunis Agenda defines Internet Governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet”.&lt;br /&gt;&lt;br /&gt;Paragraph 35 reaffirms the respective roles of stakeholders as follows: “(a) Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues”. (b) The private sector has had, and should continue to have, an important role in the development of the Internet, both in the technical an economic fields. (c) Civil society has also played an important role on Internet matters, especially at community level, and should continue to play such a role. (d) Intergovernmental organizations have had, and should continue to have, a facilitating role in the coordination of Internet-related public policy issues. (e) International organizations have also had and should continue to have an important role in the development of Internet-related technical standards and relevant policies.”&lt;br /&gt;&lt;br /&gt;While delineating the respective roles of stakeholders, Paragraph 56 recognizes the need for an inclusive, multi-stakeholder approach by affirming that “The Internet remains a highly dynamic medium and therefore any framework and mechanisms designed to deal with Internet governance should be inclusive and responsive to the exponential growth and fast evolution of the Internet as a common platform for the development of multiple applications”.&lt;br /&gt;&lt;br /&gt;Paragraph 58 recognizes “that Internet governance includes more than Internet naming and addressing. It also includes other significant public policy issues such as, &lt;em&gt;inter alia&lt;/em&gt;, critical Internet resources, the security and safety of the Internet, and developmental aspects and issues pertaining to the use of the Internet”.&lt;br /&gt;&lt;br /&gt;Paragraph 59 further recognizes that “Internet governance includes social, economic and technical issues including affordability, reliability and quality of service”. Paragraph 60 further recognizes that “there are many cross-cutting international public policy issues that require attention and are not adequately addressed by the current mechanisms”.&lt;br /&gt;&lt;br /&gt;Paragraph 61 of the Tunis Agenda therefore concludes that “We are convinced that there is a need to initiate, and reinforce, as appropriate, a transparent, democratic, and multilateral process, with the participation of governments, private sector, civil society and international organisations, in their respective roles. This process could envisage creation of a suitable framework or mechanisms, where justified, thus spurring the ongoing and active evolution of the current arrangements in order to synergize the efforts in this regard”.&lt;br /&gt;&lt;br /&gt;Paragraph 69 further recognizes “the need for enhanced cooperation in the future, to enable governments, on an equal footing, to carry out their roles and responsibilities, in international public policy issues pertaining to the Internet, but not in the day-to-day technical and operational matters, that do not impact on international public policy issues”.&lt;br /&gt;&lt;br /&gt;***&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-statement-un-cirp'&gt;https://cis-india.org/internet-governance/blog/india-statement-un-cirp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-31T15:28:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking">
    <title>Analysis of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;In this blog post, Pranesh Prakash briefly analyses the DIT's response to an RTI request on website blocking alongside the most recent edition of Google's Transparency Report, and what it tells us about the online censorship regime in India.&lt;/b&gt;
        
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;What the DIT's Response Tells Us, and What It Doesn't&lt;/h2&gt;
&lt;p&gt;We at the Centre for Internet and Society had sent in a right to information request to the Department of Information Technology (DIT) asking for more information about website blocking in India. The &lt;a href="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="internal-link" title="Text of DIT's Response to Second RTI on Website Blocking"&gt;response we got from the DIT&lt;/a&gt; was illuminating in many ways. The following are the noteworthy points, in brief:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Six government officials, and one politician have so far made requests for 'disabling access' to certain online content under s.69A of the Information Technology (IT) Act.&lt;/li&gt;

    &lt;li&gt;68 individual items have been requested to be blocked, those being 64 websites (domain-level blocking), 1 sub-domain, and 3 specific web pages. Seemingly, none of these requests have been accepted.&lt;/li&gt;

    &lt;li&gt;The data provided by the government seemingly conflicts with the data released by the likes of Google (via its Transparency Report).&lt;/li&gt;

    &lt;li&gt;India's law enforcement agencies are circumventing the IT Act, the Indian Penal Code (IPC), and ultimately the Constitution, by not following proper procedure for removal of online content.&lt;/li&gt;

    &lt;li&gt;Either the DIT is not providing us all the relevant information on blocking, or is not following the law.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="conflicting-data-on-censorship-requests"&gt;Conflicting Data on Censorship Requests&lt;/h2&gt;
&lt;p&gt;The latest &lt;a href="http://www.google.com/transparencyreport/governmentrequests/IN/"&gt;Google Transparency Report&lt;/a&gt;, released on October 25, 2011, shows that there were 68 written requests (imaginably taking the form of forceful requests/orders) from Indian law enforcement agencies for removal of 358 items from Google's various. If you take the figures since January 2010, it adds up to over 765.&lt;/p&gt;
&lt;p&gt;However, the official government statistics show only eight separate requests having been made to the&amp;nbsp; DIT (which, under the IT Act, is the only authority that can order the blocking of online content), adding up to a total of 64 websites (domain-level), 1 sub-domain, and 3 specific web pages. Of these only 3 are for Google's services (2 for Blogger, and 1 for YouTube).&lt;/p&gt;
&lt;p&gt;If classified according to presumable reason for seeking of the block, that would be 61 domains hosting adult content; 1 domain (tamil.net.in), 1 sub-domain (ulaginazhagiyamuthalpenn.blogspot.com), and 2 specific pages (video of a speech by Bal Thackeray on YouTube and Wikipedia page for Sukhbir Singh Badal) for political content; 1 for religious content (a blog post titled "Insults against Islam" in Malay); and 1 domain hosting online gambling (betfair.com). It is unclear for why one of the requests was made (topix.net).&lt;sup&gt;&lt;a id="fnref1" class="footnoteRef" name="fnref1" href="#fn1"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="content-removal-vs.-content-blocking"&gt;Content Removal vs. Content Blocking&lt;/h2&gt;
&lt;p&gt;Section 69A of the IT Act provides the Central Government the power to "direct any agency of the Government or intermediary to block for access by the public or cause to be blocked for access by the public any information generated, transmitted, received, stored or hosted in any computer resource". The only person through whom this power can be exercised is the 'Designated Officer' (currently Dr. Gulshan Rai of the DIT), who in turn has to follow the procedure laid down in the rules drafted under s.69A ("Information Technology (Procedure and Safeguard for Blocking for Access of Information by Public) Rules, 2009", the 'Blocking Rules').&lt;/p&gt;
&lt;p&gt;Because of this, we see everyone from the Secretary of the Public Law and Order Department of Tamil Nadu to the Joint Commissioner of Police of Mumbai and the State President of the Bharatiya Janata Minority Morcha approaching the Designated Officer for blocking of websites.&lt;/p&gt;
&lt;p&gt;However, as the data from Google shows, there are many times more requests being sent to remove content. The only explanation for this is that an order to 'block for access... or cause to be blocked for access by the public' is taken to be different from an order for removal of content. Nothing in the IT Act, nor in the Blocking Rules actually address this issue.&lt;sup&gt;&lt;a id="fnref2" class="footnoteRef" name="fnref2" href="#fn2"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Thus, there is a possibility that the forcible removal of content is treated separately from blocking of content. That would mean that while blocking is regulated by the IT Act, forcible removal of content is not. Thus, it would seem that forcible removal of online content is happening without clear regulation or limits.&lt;sup&gt;&lt;a id="fnref3" class="footnoteRef" name="fnref3" href="#fn3"&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="role-of-the-indian-penal-code-and-code-of-criminal-procedure"&gt;Role of the Indian Penal Code and Code of Criminal Procedure&lt;/h2&gt;
&lt;p&gt;There are existing provisions in the Indian Penal Code that provide the government the power to censor book, pamphlets, and other material on varied grounds, including obscenity, causing of enmity between communities, etc. The police is provided powers to enforce such governmental orders. Section 95 of the Code of Criminal Procedure allows the State Government to declare (through an official notification) certain publications which seem to violate the Indian Penal Code as 'forfeited to the Government' and to issue search warrants for the same. After this the police can enforce that notification.&lt;/p&gt;
&lt;p&gt;It is clear that this is not the case for any of the content removal requests that were sent to Google.&lt;/p&gt;
&lt;h2 id="police-are-defeating-the-constitution-and-the-it-act"&gt;Police Are Defeating the Constitution and the IT Act&lt;/h2&gt;
&lt;p&gt;Therefore, it would seem that law enforcement agencies are operating outside the bounds set up under the Indian Penal Code, the Code of Criminal Procedure, as also the Information Technology Act, when they send requests for removal of content to companies like Google. While a company might comply with it because it appears to them to violate their own terms of service (which generally include a wide clause about content being in accordance with all local laws), community guidelines, etc., it would appear that it is not required under the law to do so if the order itself is not legal.&lt;/p&gt;
&lt;p&gt;However, anecdotal evidence has it that most companies comply with such 'requests' even when they are not under any legal obligation to do so.&lt;/p&gt;
&lt;p&gt;This way the intention of Parliament in enacting s.69A of the IT Act—to regulate government censorship of the Internet and bring it within the bounds laid down in the Constitution—is defeated.&lt;/p&gt;
&lt;h2 id="dit-either-evasive-or-not-following-rules"&gt;DIT Either Evasive or Not Following Rules&lt;/h2&gt;
&lt;p&gt;The DIT did not provide answers on:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Whether any block ordered by the DIT has ever been revoked&lt;/li&gt;

    &lt;li&gt;On what basis DIT decides which intermediary (web host, ISP, etc.) to send the order of blocking to&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It also provided the minutes for only one meeting&lt;sup&gt;&lt;a id="fnref4" class="footnoteRef" name="fnref4" href="#fn4"&gt;4&lt;/a&gt;&lt;/sup&gt; of the committee that decides whether to carry out a block, when we had requested for minutes of all the meetings it has ever held. That committee (the Committee for Examination of Requests, constituted under Rule 8(4) of the Blocking Rules) has to consider every single item in every single request forwarded to the Designated Officer, and 68 items were sent to the Designated Officer in 6 requests. Quite clearly something doesn't add up. Either the Committee is not following the Blocking Rules or the DIT is not providing a full reply under the RTI Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
      &lt;li id="fn1"&gt;
&lt;p&gt;A request was made to block http://www.topix.net, by the 'Commmissioner, Maharashtra State, Colaba, Mumbai—400001', presumably the Commissioner of State Intelligence Department of Maharashtra, whose office is located in Colaba. &lt;a title="Jump back to footnote 1" class="footnoteBackLink" href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn2"&gt;
&lt;p&gt;However, the Blocking Rules require the person or the hosting intermediary being contacted for a response. This provides the person/intermediary the opportunity to remove the content voluntarily or to oppose the request for blocking.&lt;/p&gt;
&lt;p&gt;"Rule 8. Examination of request: (1) On receipt of request under rule 6, the Designated Officer shall make all reasonable efforts to identify the person or intermediary who has hosted the information or part thereof as well as the computer resource on which such information or part thereof is being hosted and where he is able to identify such person or intermediary and the computer resource hosting the information or part thereof which have been requested to be blocked for public access, he shall issue a notice by way of letters or fax or e-mail signed with electronic signatures to such person or intermediary in control of such computer resource to appear and submit their reply and clarifications if any, before the committee referred to in rule 7, at a specified date and time, which shall not be less than forty-eight hours from the time of receipt of such notice by such person or intermediary." &lt;a title="Jump back to footnote 2" class="footnoteBackLink" href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn3"&gt;
&lt;p&gt;While it is possible to imagine that the Indian Penal Code and the Code of Criminal Procedure lay down limits, it is clear from the Google Transparency Report that the requests from removal are not coming based only on court orders, but from the executive and the police. The police have no powers under the IPC or the CrPC to request removal of content without either a public notification issued by the State Government or a court order. &lt;a title="Jump back to footnote 3" class="footnoteBackLink" href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn4"&gt;
&lt;p&gt;The minutes of the meeting held on August 24, 2010, on the request for blocking of www.betfair.com were sent as 'Annexure III' of the DIT response.&amp;nbsp; This request was not granted.&amp;nbsp; &lt;a title="Jump back to footnote 4" class="footnoteBackLink" href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-12-02T09:26:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking">
    <title>Text of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;CIS had filed a request under the Right to Information Act with the government, asking a number of questions relating to blocking of content under the IT Act.  We have reproduced below the response we got from the government.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Government of India&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Ministry of Communications &amp;amp; Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;Department of Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Electronics Niketan, 6 CGO Complex,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;New Delhi-110003&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No: 14(12)/2011-ESD&lt;br /&gt;10.6.2011&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Shri Pranesh Prakash,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Centre for Internet and Society,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;194, 2C Cross, Domlur Stage II,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Bangalore - 560071&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Subject: Request for information under RTI Act, 2005.&lt;/p&gt;
&lt;p&gt;Sir,&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; Reference your request dated 13 May 2011, which was received in this office on 18.5.2011 on the above subject.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The information as received from the custodian of information is attached herewith (Annexure-I, II and III).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp;Yours faithfully,&lt;br /&gt;&amp;nbsp;&amp;nbsp; (A.K.Kaushik)&lt;br /&gt;&amp;nbsp; &amp;nbsp;Additional Director &amp;amp; CPIO&lt;br /&gt;&amp;nbsp; &amp;nbsp;Cyber Laws &amp;amp; E-Security Division&lt;br /&gt;&amp;nbsp; &amp;nbsp;Tel: 011-24364803&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Annexure I&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;strong&gt;Reply to Shri Pranesh Prakash&lt;/strong&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;ol&gt;&lt;li&gt;How many orders have been issued for blocking of computer resources prior to the coming into force of the Information Technology (Amendment) Act, 2008 (i.e., before October 27, 2009) under the Information Technology Act, 2000, or any other law for the time being in force.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Five orders were issued for blocking access to web content.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the websites for which the DIT has issued blocking orders and the dates on which each website was blocked.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The following websites have been blocked pursuant to court orders&lt;br /&gt;&lt;br /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Sl&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of issuing&amp;nbsp;direction by designated&amp;nbsp;officer&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.zone.h.org/"&gt;www.zone-h.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.03.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://donotdiall00.webs.com"&gt;http://donotdiall00.webs.com&amp;nbsp;&lt;/a&gt;&amp;nbsp;(IP 216.52.115.50)&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.08.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;www.bloggernews.net/124029&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;15.11.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba"&gt;http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html"&gt;http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.chakpak.com/find/images/kamasutra-hindi-movie"&gt;http://www.chakpak.com/find/images/kamasutra-hindi-movie&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html"&gt;http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html"&gt;http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076"&gt;http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;25.02.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.indvbav.org/"&gt;&amp;nbsp;&lt;/a&gt;&lt;a class="external-link" href="http://www.indybay.org/"&gt;www.indybay.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;a class="external-link" href="http://www.arizona.indymedia.org/"&gt;www.arizona.indymedia.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;&lt;li&gt;Please provide a list of all the persons to whom such orders were issued.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The directions were issued to Department of Telecommunications.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the requests for blocking of information that have been received by the Designated Officer under the Information Technology (Procedures and Safeguards for Blocking Access of Information by Public) Rules, 2009 ("Rules").&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all persons/authorities from whom the Designated Officer under the Rules has received requests for blocking of information and the dates these requests were received.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 4 &amp;amp; 5&lt;/strong&gt; - The details are given in Annexure-II.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been rejected,&amp;nbsp;including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been&amp;nbsp;accepted, including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that are still being&amp;nbsp;processed (e.g. more information has been sought on the request), including file notings.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 6,7 &amp;amp; 8&lt;/strong&gt; - Files are available in section and can be viewed.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of the minutes of all meetings held by the Committee for&amp;nbsp;Examination of Requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide copies of all the recommendations of the Committee for Examination&amp;nbsp;of requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 9 &amp;amp; 10&lt;/strong&gt; - &amp;nbsp;Copy of the minutes/recommendation of the meeting of the Committee is&amp;nbsp;at Annexure III.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us the dates and copies of the minutes of all meetings held by the&amp;nbsp;Review Committee under Rule 14 of the Rules to periodically review the blocked&amp;nbsp;resources.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of all the findings of the Review Committee.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the Review Committee has not met, please provide us the reason for the meetings&amp;nbsp;not happenings as per the requirement of Rule 14 of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 11, 12 &amp;amp; 13&lt;/strong&gt; - This meeting is coordinated by Department of Telecommunications&amp;nbsp;and DIT is not in possession of details.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does "intermediary" in Rule 13 include intermediaries not located in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; -&amp;nbsp;Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Has any block ordered by the DIT ever been revoked by the DIT or any other&amp;nbsp;governmental authority?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such questions are not permitted under RTI Act as per DOPT OM No. 1 /7/2009&amp;nbsp;IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;On what basis does the DIT decide whether the appropriate intermediary is the person&amp;nbsp;who has put up content, the web host, or the different Internet service providers in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does Rule 16 of the Rules override the Right to Information Act?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the answer to the previous question is yes, please provide any correspondence with any legal officer who provided the DIT advice that it could override the Right to Information Act through delegated legislation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Annexure II&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt;Request received by Designated Officer&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of receipt of request &lt;/strong&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Request by&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/www.tamil.net.in" class="external-link"&gt;www.tamil.net.in&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;29.03.2010&lt;/td&gt;
&lt;td&gt;Secretary Public (Law &amp;amp; Order) Deptt.&lt;br /&gt;Secretariat, Chennai 600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;28.06.2010&lt;/td&gt;
&lt;td&gt;Sr. Inspector, Cyber Crime Cell, &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;http://www.youtube.com/ch?&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;wat&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;v=tHUNESaC0E4&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;05.07.2010&lt;/td&gt;
&lt;td&gt;Jt. Commissioner of Police (Crime), &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ulaginazhagiyamuthalpenn.blogspot.com"&gt;http://ulaginazhagiyamuthalpenn.blogspot.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;21.07.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary, &lt;br /&gt;IT Department, &lt;br /&gt;Chennai–600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/en.wikipedia.org/Wiki/Sukhbir Singh Badal" class="external-link"&gt;en.wikipedia.org/Wiki/Sukhbir Singh Badal&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;11.08.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary to Govt. of Punjab, &lt;br /&gt;Dept. of IT, &lt;br /&gt;Chandigarh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.exbii.com"&gt;http://www.exbii.com&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.topix.net/"&gt;http://www.topix.net&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;05.10.2010&lt;/td&gt;
&lt;td&gt;Commissioner, &lt;br /&gt;Maharashtra State, &lt;br /&gt;Colaba, Mumbai–400 001&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html"&gt;http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;20.08.2010&lt;/td&gt;
&lt;td&gt;Shri Haneef Ali, &lt;br /&gt;State President, &lt;br /&gt;Bharatiya Janata Minority Morcha, &lt;br /&gt;Andhra Pradesh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.angelsofindia.com/"&gt;http://www.angelsofindia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.adult-gals.com/"&gt;http://www.adult-gals.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianangels.net/"&gt;http://www.indianangels.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.arabexposed.com/"&gt;http://www.arabexposed.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiamafia.com/"&gt;http://indiamafia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianasfuckers.com/"&gt;http://www.indianasfuckers.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpronvideos.in/"&gt;http://www.indianpronvideos.in/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporntube.com/"&gt;http://www.peterporntube.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywood-sex.net/"&gt;http://www.bollywood-sex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianworldsex.com/"&gt;http://www.indianworldsex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianhomevideo.com/"&gt;http://indianhomevideo.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-pakistani-girls.com/"&gt;http://indian-pakistani-girls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianvidz.com/"&gt;http://indianvidz.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianparadise.net/"&gt;http://indianparadise.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodscandals.net/"&gt;http://bollywoodscandals.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpics.net/"&gt;http://indiansexpics.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-hardcore-movies.com/"&gt;http://www.indian-hardcore-movies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodnudesex.net/"&gt;http://www.bollywoodnudesex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bangmyindianwife.com/"&gt;http://www.bangmyindianwife.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-angel-teens.com/"&gt;http://www.indian-angel-teens.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://south-indian-sex.com/"&gt;http://south-indian-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianseduction.com/"&gt;http://www.indianseduction.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexuniversity.com/"&gt;http://www.indiansexuniversity.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpassion.com/"&gt;http://www.indianpassion.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://fuckmyindianass.com/"&gt;http://fuckmyindianass.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexwebcams.com/"&gt;http://indiansexwebcams.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://exoticpics4u.com/"&gt;http://exoticpics4u.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianfreesexmovies.com/"&gt;http://www.indianfreesexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindiansexmovies.com/"&gt;http://www.newsindiansexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporn.net/"&gt;http://www.peterporn.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindianmovies.com/"&gt;http://www.3xindianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.amateur-indian-girls.com/"&gt;http://www.amateur-indian-girls.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodhardcore.net/"&gt;http://www.bollywoodhardcore.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpost.com/"&gt;http://www. indiansexpost.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.desi-amateurs.com/"&gt;http://www.desi-amateurs.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xasianmovies.com/"&gt;http://www.3xasianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://allindiansex.com/"&gt;http://allindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiapornmovies.com/"&gt;http://www.indiapornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindiansex.com/"&gt;http://www.3xindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianxclips.com/"&gt;http://www.indianxclips.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexvideos.org/"&gt;http://indiansexvideos.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pureindianporn.com/"&gt;http://www.pureindianporn.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-porn-sex.com/"&gt;http://indian-porn-sex.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindianpornmovies.com/"&gt;http://www.newsindianpornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://juicyindiangirls.com/"&gt;http://juicyindiangirls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www/hardcoreindiansex.net/"&gt;http://www/hardcoreindiansex.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodboobs.com/"&gt;http://bollywoodboobs.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianmovietgp.com/"&gt;http://indianmovietgp.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.365indian.com/"&gt;http://www.365indian.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-hoes.com/"&gt;http://www.indian-sex-hoes.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-photos.net/"&gt;http://www.indian-sex-photos.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-free-sex.com/"&gt;http://www.indian-free-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-movies.org/"&gt;http://www.indian-sex-movies.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://ww.tamil-sex-movies.net/"&gt;http://ww.tamil-sex-movies.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianteens.org/"&gt;http://www.indianteens.org/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://secredir.com/?sov=rook-sexyindianbooty.com"&gt;http://www.sexyindianbooty.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianposing.com/"&gt;http://www.indianposing.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pornhub.com/"&gt;http://www.pornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpornhub.com/"&gt;http://www.indianpornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.exvideos.com"&gt;http://www.exvideos.com&amp;nbsp;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;25.11.2010&lt;/td&gt;
&lt;td&gt;Jt.Commissioner of Police (Crime), Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Annexure III&lt;/h2&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Minutes of the meeting held on 24-08-2010 for the request for blocking of website &lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;A meeting of "Committee for examination of request"&amp;nbsp;constituted under the provisions of Information Technology&amp;nbsp;(Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009&amp;nbsp;under section 69A of the Information Technology Act, 2000 was held on 24.08.2010 at&amp;nbsp;Electronics Niketan. New Delhi to examine the Request sent by Government of Maharashtra to block the website&amp;nbsp;&lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. The meeting was participated by the following members:&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;Dr. Gulshan Rai, Group Coordinator, Department of Information Technology&lt;/li&gt;&lt;li&gt;Shri Dharmendra Sharma, Joint Secretary, Ministry of Home Affairs&lt;/li&gt;&lt;li&gt;Shri Arvind Kumar, Joint Secretary, Ministry of Information &amp;amp; Broadcasting&lt;/li&gt;&lt;li&gt;Shri Ashok C. Prakash, Additional L.A., Department of Legal Affairs&lt;/li&gt;&lt;li&gt;Shri B.J. Srinath, Sr. Director, CERT-In&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;The Committee discussed the case and observed that Govt. of Maharashtra has requested for blocking of website &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt; on the grounds of "public order". The Committee also noted the reply from Cyber Crime Cell, Mumbai that no case has been registered against &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. Further, no details suggesting the "impact" of the said site on public order has been made available by the State Government.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Keeping in view the directions of the Hon'ble High Court to dispose the application strictly as per law, the Committee assessed that based on the data/facts/details provided by Government of Maharashtra and Cyber Crime Cell, Mumbai, violation of section 69A of the Information Technology Act, 2000 is not being established.&amp;nbsp;&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;Download a scanned version of the letter received from the DIT office &lt;a href="https://cis-india.org/internet-governance/request-for-website-blocking.pdf" class="internal-link" title="Request for Blocking of Websites"&gt;here&lt;/a&gt; &lt;/strong&gt;[PDF, 1.74 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-10-28T14:37:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question">
    <title>India’s vanishing fingerprints put UID in question</title>
    <link>https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question</link>
    <description>
        &lt;b&gt;A curious situation has come to light at the UID (unique identity) enrolment centres. Call it the phenomenon of vanishing fingerprints. You see, our unique fingerprints don’t necessarily last a lifetime and they can be damaged or destroyed and, in some cases, even non-existent. And that is not the best scenario for the first-of-its-kind project that endeavours to create a unique identity for India’s billion-plus population based on fingerprints and iris scans (or biometric data).&lt;/b&gt;
        
&lt;p&gt;To find out more,&lt;em&gt; Firstpost &lt;/em&gt;visited five UID centres in the North West district, which incidentally has the highest enrolments (619,571 and counting) among Delhi’s nine districts since the show hit the road in February 2011, and one centre in North Delhi.&lt;/p&gt;
&lt;p&gt;The officials at the Unique Identification Authority of India (UIDAI) will tell you that there is no overemphasising the importance of the quality of biometric data to the success of the super ambitious UID, now known as Aadhar project. If the quality of a person’s biometric data is poor, it automatically compromises the authentication of that data by him when he wants to access a service based on his UID.&lt;/p&gt;
&lt;p&gt;So what happens when the data – fingerprints, for instance – are inherently unreliable on account of various biological and socio-economic reasons, some of which are especially relevant to the Indian context.&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&lt;img src="https://cis-india.org/home-images/uid2.jpg/image_preview" alt="uid 2" class="image-inline" title="uid 2" /&gt;&lt;/p&gt;
&lt;p&gt;The UIDAI’s Committee on Biometrics in a December 2009 was rather forthright about its reservations on the fingerprint reliability. Titled Biometrics Design Standards For UID Applications (page 4, para 4), it stated, "….two factors however, raise uncertainty about the accuracy that can be achieved through fingerprints. First, retaining efficacy while scaling the database size from fifty million to a billion has not been adequately analysed. Second, fingerprint quality, the most important variable for determining de-duplication accuracy, has not been studied in depth in the Indian context." (Emphasis added).&lt;/p&gt;
&lt;p&gt;The findings on the ground were revelatory. Operators and technical experts at the UID enrolment centres confirmed to Firstpost that they routinely came across cases where fingerprints had been damaged/destroyed/underdeveloped. And such cases, they said, were more common among senior citizens, those involved in manual labour (who handle rough objects, for instance) and children (mostly below 10 years of age).&lt;/p&gt;
&lt;p&gt;Here is an example that &lt;em&gt;Firstpost &lt;/em&gt;observed.&lt;/p&gt;
&lt;p&gt;Batuli, 72, arrived at around noon at the Basti Vikas Kendra, now also a UID centre, in Mangol Puri to get herself a ‘smart card’ everyone has been talking about. (The 'Aadhar' brand name hasn’t caught on in these parts of Delhi, with everyone insisting on calling it the 'smart card'.)&lt;/p&gt;
&lt;p&gt;The helpful operator with the fancy gadgets helps Batuli to her seat. After her photo is taken, Batuli is asked to place four fingers — one hand at a time — on a green-lit device. Right hand, then left hand.&lt;/p&gt;
&lt;p&gt;She is, however, asked to repeat the exercise a second time for the left hand. The operator explains. "In some case, we have to scan the fingerprints and Iris multiple times. If it doesn’t pass the required quality percentage of 70 per cent (the quality is indicated in percentage terms on the computer screen that is connected to the fingerprint machine, see pic), we repeat the exercise up to four times."&lt;/p&gt;
&lt;p&gt;Batuli’s hands are then wiped using a cloth and placed back on the device. The exercise is repeated a fourth and final time. But still the same result. 'Fail', declares the reading on the operator’s computer.&lt;/p&gt;
&lt;p&gt;An operator at the next station, says, "In the case of senior citizens, Iris scans also sometime fail. It registers weakly when the retina is damaged."&lt;/p&gt;
&lt;p&gt;(Enrolment centres are run by private companies on contracts given by registrars chosen by the UIDAI. Strategic Outsourcing is one such company and it runs many of centres in the North West and South West districts of Delhi.)&lt;/p&gt;
&lt;p&gt;The project coordinator of the UID enrolment centre working out of the Destitute Welfare Trust, an NGO in Sultanpuri, too, confirmed that he was aware of the problem of damaged fingerprints and the challenge it posed in getting good quality fingerprint data.&lt;/p&gt;
&lt;p&gt;"The hands of children are very soft and in some cases fingerprints are not yet fully developed. Also, children tend to have sweaty hands and this can interfere with the quality of fingerprints. Extremely dry hands also pose problems. We have to often, wipe the hands or provide lotion to improve the quality of fingerprints," said a technical expert working with Strategic Outsourcing.&lt;/p&gt;
&lt;p&gt;While the number of attempts, as prescribed by the UIDAI, to get a stronger finger print when the result reads 'fail' is four, operators report that sometimes attempts go up to 10 to 15. (The machine picks up the strongest impression of the attempts made). They say they didn’t anticipate such a problem and it was only when they started enrolments in January that they were confronted with such a scenario. “Now, of course, everybody knows about it."&lt;/p&gt;
&lt;p&gt;'Everybody' implies those who are directly involved in collecting biometric data. An operator from another private company Smartchip working in a JJ (slum) colony in the North Delhi district of Model town, revealed similar problems on being probed. &amp;nbsp;"A fingerprint strength of 70 percent or more is pass. About 10 per cent of the cases we get every day register the 'fail' reading. What can we do? In the case of stone cutters, for instance, the fingers are completely smooth, the fingerprints are completely wiped out."&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_copy5_of_copy4_of_copy3_of_copy2_of_copy_of_uid3.jpg/image_preview" alt="uid 3" class="image-inline image-inline" title="uid 3" /&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;So what are the implications of poor quality fingerprints for the UID project? The UIDAI admitted that it could provide challenges to authentication.&lt;br /&gt;&lt;br /&gt;In an email response to Firstpost, Sujata Chaturvedi, UIDAI’s Deputy Director General for the Delhi region said, "It could provide some challenges in de-duplication although that has been mitigated to a large extent by the decision of the UIDAI to go in for iris an additional de-duplication factor… Also to be noted is the fact that normally not all fingers are equally de-graded. So UIDAI is evolving a protocol to inform the residents about their good quality fingerprints as part of the Aadhaar letter so that they are aware of the finger to use for authentication."&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;But not everyone is convinced. Sunil Abraham is the executive director of Centre for Internet and Society (CIS), which has written seven open letters to the Standing Committee on the Finance Branch (before which is the National Identification Authority of India Bill, 2010) asking the committee to consider their research on the UID project and change aspects of the Bill and the project.&lt;/p&gt;
&lt;p&gt;The seventh letter sent last week, says Abraham, provides statistical analysis that demonstrates how the UID will never be able to create a unique database.&lt;/p&gt;
&lt;div class="pullquote"&gt;"In CIS’s seventh open letter to the finance committee, statistical analysis reveals that UIDAI tender specification is 1,000 times less accurate than it should be to have a reasonable chance of building a truly unique database. This analysis depends on high quality biometrics. With poor biometric quality the problem of de-duplication is compounded."&lt;/div&gt;
&lt;p&gt;When UIDAI was asked what the percentage of the population enrolled (all India and Delhi) had recorded below-standard fingerprint quality, no specific data was forthcoming.&lt;/p&gt;
&lt;p&gt;Chaturvedi wrote, "Currently the population with very poor quality fingerprints is a very small percentage. It must also be remembered that this population is scattered all over the country."&lt;/p&gt;
&lt;p&gt;In India, even a small percentage translates to millions of people. "Small percentage could mean absolutely anything. Why can’t they be more specific? One percent in the Indian context is 12 million people," said Abraham.&lt;/p&gt;
&lt;p&gt;On how the UIDAI was dealing with challenge of poor fingerprint quality, Chaturvedi said, "Even amongst the populace that has damaged/destroyed/underdeveloped fingerprints, chances are very high that they would have at least one good fingerprint that could be used for authentication. Second, UIDAI is also starting to actively develop iris authentication ecosystem. Fingerprint authentication and iris authentication could supplement each other to ensure a universal coverage."&lt;/p&gt;
&lt;p&gt;She added that Aadhaar authentication will supplement and work in conjunction with existing authentication systems to strengthen the overall authentication rather than replace completely the existing authentication systems.&lt;/p&gt;
&lt;p&gt;That begs the question, as Abraham puts it, "If the UIDAI is not going to replace existing forms of authentication it is not clear why the government is spending all this money on unproven biometric technology."&lt;/p&gt;
&lt;p&gt;Chaturvedi, however, maintained that the initial PoC (proof of concept) study that was taken up in Andhra Pradesh, Karnataka and Jharkhand collected about 60,000 enrolments indicated that the biometric accuracy levels necessary for de-duplication of all residents of India are achievable.&lt;/p&gt;
&lt;p&gt;"The PoC results also indicated the time needed for capture of biometrics in typical rural conditions is small enough to support large scale enrolment. Over and above the initial PoC, the UIDAI has currently completed over 5 crore enrolments for which Aadhaars have been generated. This experience reinforces the initial PoC results that the de-duplication accuracy is sufficient and sustainable to enrol the rest of the population."&lt;/p&gt;
&lt;p&gt;The original article is written by Pallavi Polanki. It was published in Firstpost on October 24, 2011 and can be read &lt;a class="external-link" href="http://www.firstpost.com/politics/aadhar-indias-vanishing-fingerprints-put-unique-identity-in-question-115144.html/2"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question'&gt;https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-26T10:05:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-sexual-minorities">
    <title>Privacy &amp; Sexual Minorities</title>
    <link>https://cis-india.org/internet-governance/privacy-sexual-minorities</link>
    <description>
        &lt;b&gt;Danish Sheikh examines the status of sexual minorities in the light of privacy framework in India. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, the research brings to light the privacy violations being committed by both individuals as well as state authorities. The research concludes by saying that privacy doesn’t necessarily encompass a one-size-fits-all approach, and can raise as many questions as it answers.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Defining Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In examining the status of sexual minorities vis-à-vis the privacy framework in India, this research takes into account a definition of privacy that encompasses protection against physical interference with a person and their property as well as the state of being free from intrusion in one’s private life or affairs.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; This involves an understanding of privacy violations being committed by both an individual as well as the State. On the one hand is the extent to which a private individual is entitled to personal information about another individual and on the other is the extent to which government authorities can intrude into the private life of a citizen to keep watch over his or her movements or exercise control over personal choices.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No mention of sexuality and privacy in India can stand without a nod to Section 377 of the Indian Penal Code (IPC). In 1860, with the institution of the IPC by Lord Macaulay, section 377 criminalized homosexuality by putting forth that, "carnal intercourse against the order of nature"&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; was to be punishable by law. While this archaic law stands even today, it was read down significantly in a landmark Delhi High Court judgment in 2009&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; which will be referred to later. As stated in an open letter by Vikram Seth and a host of others and endorsed by Amartya Sen, the law has been used to "systematically arrest, prosecute, terrorize and blackmail sexual minorities. It has spawned public intolerance and abuse, forcing tens of millions of gay and bisexual men and women to live in fear and secrecy at tragic cost to themselves and their families."&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; When understood in its conception as non-interference by the State, as the right to be left alone,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; privacy isn’t necessarily an empowering right for lesbian, gay, bisexual and transgender (LGBT) persons. For one, the claim to privacy when it comes to same-sex acts tends to get construed as a claim for secrecy: it is to carry out purportedly "clandestine" acts that the sexual minority community wants refuge from the State. The same strategy can further backfire when claims for heightened scrutiny might in fact be requested, such as in discrimination actions.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A zonal understanding of privacy also subverts the fact that many instances of expression of identity happen in the public sphere.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a while, privacy jurisprudence hinged on this idea of privacy as a negative right by disallowing infringement of a person’s right to a private life by the State. This understanding may be located in an international regime which has for a while insisted on dividing civil and political rights at one side, and social and economic rights on the other. With this split, what was institutionalized was the idea that civil and political rights were as such "negative" rights, while social and economic rights were "positive" in their content. In effect, the presumption that stood was that while states needed to expand resources to uphold social and economic rights, no such correlative obligation required observance in respect of civil and political rights.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Recent human rights conventions such as the Convention on the Rights of Persons with Disabilities acknowledge the flaw in this understanding, based on the reasoning that both civil and political rights and social and economic rights give rise to positive and negative duties.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; The Naz Foundation&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; judgment propels the understanding of privacy as a positive right. It’s easy enough to split the analysis in this study neatly with the judgment which, in the course of declaring unconstitutional the aforementioned IPC provision, discussed at length the right to privacy, exploring it as a function of dignity. To divide what the Delhi High Court said about the right into three parts — first, they discussed privacy as dealing with persons and not places,&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; implying that the right to privacy is not only a claim to space from state intervention but that it protects the autonomy of the private will and a person’s freedom of choice and action, second, they tied it in with dignity and connected it with the value and worth of all individuals,&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; and third, they talked of the right to privacy as being based on one’s autonomous identity. In the context of privacy, this means that it is "the inner sanctum of the person such as his/her family life, sexual preference and home environment which is shielded from erosion by conflicting rights of the community."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there will be a bit of a before-Naz/after-Naz tint to the analysis, it is important to appreciate that the nature of privacy discourse when it comes to sexual minorities remains somewhat murky even after the grand affirmation that the judgment provided. A large part of this of course is concerned with society struggling to catch up with the developments in the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before moving on to the next chapter, I’ll unpack the term "sexual minority" to delineate the different communities that will feature in the course of this paper, whilst also attempting to renegotiate the idea of privacy contextually. Using Arvind Narrain’s seminal monograph Queer as a template,&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; the term gay will be employed to describe a man who is attracted to another man emotionally, sexually or physically; a lesbian woman is attracted to women emotionally, sexually or romantically; while someone who is bisexual maintains that attraction towards members of both sexes. A transgender person assumes the gender identity of the opposite sex; within Indian discourse they are called as &lt;i&gt;hijras&lt;/i&gt;, constituted of a transgender person who is biologically male and takes on the gender role of a female. The &lt;i&gt;hijra&lt;/i&gt; community in India maintains a unique form of social organization within its parallel society. We then have the term "eunuch", used in a more derogatory fashion, which medically refers to a castrated male, and is sometimes employed in India to refer to the &lt;i&gt;hijras&lt;/i&gt;. Another South Asian constructed identity is that of the &lt;i&gt;kothi&lt;/i&gt; — a male homosexual who is feminized and takes a passive/receptive role in sex.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next section of this study will look at a string of privacy concerns of sexual minorities in India as sourced from various studies and media reports. The analysis pauses at the interplay of rights surrounding the transgender community in particular: how do issues of recognition of their particular category impact members of the community?  The subsequent section jumps past the timeline of the Naz Foundation judgment to understand the kind of changes – if at all – that the high court’s words have effected when it comes to this idea of privacy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Privacy Rights and Wrongs&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The incidents highlighted in this chapter took place before the Delhi High Court altered the way we conceived of queer rights in general and privacy in particular. Two issues permeate this analysis: one, the notion of criminality hovering above queer identity, and two, the somewhat one-dimensional idea of privacy that existed then. A third, more complex issue in the context of the &lt;i&gt;hijra&lt;/i&gt; community becomes the idea that one conception of privacy may not always be the most empowering for a community, and the subsequent negotiations that have to be made in that sphere.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Entrapment: The Lucknow Incidents&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In July of 2001, a set of raids: first on a public park frequented by the men who have sex with men (MSM)&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; community, and next on the offices of two NGOs working on safe sex issues led to the arrests of ten people. The operation was conducted on the basis of an FIR filed with a Lucknow police station wherein it was alleged that a certain Suresh had sodomized the complainant. Notable in the incident was the climate of homophobia stoked by the media which indulged in sensationalizing headlines,&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; with the magistrate concerned further refusing bail to the men. In denial of bail, instead of siding with the relevant law, the magistrate clearly proceeded on the basis of his perceptions regarding homosexuality: "they…are polluting the entire society by encouraging the young persons and abetting them for committing the offence of sodomy."&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we were to extend the Supreme Court’s reasoning in the catena of surveillance cases vis-a-vis privacy starting from &lt;i&gt;Kharak Singh v. State of U.P.&lt;/i&gt;, &lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; it is clear that the NGO members’ right to privacy was violated by the way of unwarranted search and seizure operations carried out by the police. As the court said in &lt;i&gt;Govind v. State of M.P.,&lt;/i&gt;&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; domiciliary visits and picketing by the police should be reduced to the clearest cases of danger to community security. While the judges were referring to matters relating to follow-up from a conviction/release from prison, it seems evident that a higher standard should be given to cases where such prior conviction itself hasn’t taken place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for the accused, Narrain notes how the response of the State and media ended up harming them, regardless of the final judicial decision. &lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; The public hearings meant that in Lucknow, their sexual identities became public, with a definite impact on their future prospects and present perceptions. The question, as Narrain poses, is the issue of the suitability of the courts to protect the rights of people who are still in the closet. If approaching the courts means compulsory 'outing' with all its attendant negative outcomes, how does one articulate the rights of such a minority?&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are thus three major facets of privacy violation here: the police’s lawlessness resulting in the primary intrusion; the media’s sensationalization which harshly exposed the accused to the public glare; and finally, the magistrate’s bias which legitimized these privacy violations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet another set of arrests took place in the city, this time in 2006, with the police in Lucknow arresting four men under section 377 for allegedly having sex in a public park. News reports revealed pictures of all the four men with their names and home addresses.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first information report (FIR) here contradicted the investigation of a fact finding team of activists and lawyers: it emerged that none of the men were actually involved having public sex, with the story by the police being a completely fabricated one. It turned out that one of the men had been arrested by the police on their knowledge about his homosexuality, following which his contacts were tapped to stage an entrapment of the other three men.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This notion of raiding homosexual gatherings was taken to its extreme by a police raid on a gay party in the outskirts of Mumbai in 2008, in the course of which six persons were detained. "…. neither was he able to give a satisfactory explanation for organizing the party," said the API on questioning the event organizer.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In these instances of interplay between criminal procedure, media ethics and judicial process, it is worth questioning whether general reforms in those areas will positively affect privacy rights of sexual minorities in particular. Unwarranted searches and arrests are barely an uncommon occurrence in the country, neither is the fact of accounts of people’s sexual behaviour finding themselves very publicly outed in the media, and nor, again, are accounts of judges overlooking police excesses rare. It’s a bit difficult to make an exact value judgment over what kinds of privacy violations is more damning, in a society that takes its sexual mores quite seriously, be they with regard to hetero or homosexual sex. More than anything though, that just makes the need for across the board reforms in these areas more urgent, and sharpens the kind of alliances across communities that would be required to effect change. Of course, this kind of advocacy can only happen in an atmosphere where homosexuality continues to be decriminalized – the fate of the Naz Foundation appeal before the Supreme Court is of paramount importance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Gender Identity and Transgender Issues&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A survey of the situation regarding the transgender community in India throws up a fascinating picture of instances where seemingly positive sounding regulation doesn't always serve its intended effects – when such "positive sounding" regulation does happen at all. To start with, there is the question of the status of the transgender community in India itself – a PUCL report&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; notably documented, and numerous reports and articles&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; have affirmed, the reality of the transgender community today as one of harassment, abuse, and sexual violence. These accounts reveal a deep-rooted fear inculcated by mainstream society of sexual and gender non-conformity, which manifests itself in the refusal of basic citizenship rights to these communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PUCL report gives a detailed account of harassment by the police in public places, at home, in police stations, and instances of entrapment similar to the Lucknow cases. Instead of reiterating that aspect which would simply involve repeating the above analysis, this section will look into other gender-specific issues that arise with respect to the community and the multiple questions these give rise to:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transgender Toilets&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first example relates to efforts by the Chennai Municipal Corporation to build toilets specifically for the transgender population,&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; in a move stated as being part of a pilot project to recognize the considerable community in South and Central Chennai. Each lavatory in these toilets was to contain male, as well as female urinals. In the words of the municipal commissioner, the scheme was aimed at "extending recognition to the community and mainstreaming them", and more facilities could be built if the public responded well to the idea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reaction from the community was mixed at best: sure, it was regarded as a positive move to the extent that not every person who identified themselves as transgender had undergone sex change; simultaneously, the city saw one section of the community fearing the move as a step towards discrimination and isolation. "I don’t agree with this. We want to mingle with the mainstream. We don’t want to be separated like this," said Aasha Bharati, president of the Aravanigal Association. The idea of privacy here is at odds with something else the community is striving for: inclusion. The fear then was of one kind of recognition trumping another. What would a policy maker then privilege? Would this possibly be a better short-term move, as we move towards a future understanding of not being disabled by difference, or would the ideal of privacy trump even that?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The way this issue has played out in the Indian context stands in interesting contrast to cases in America. A bill in Maine which would allow restroom owners in business establishments and institutions from mandating what gender persons would use what washroom was met with sharp opposition from the transgender community on claims of dignity and privacy.&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt; For a person who, say, externally had strongly masculine features, but identified as a woman, two options existed: either break the law and walk discreetly into the male compartment – or risk the outrage of other women as she walked into their compartment and was faced with their indignation of having a "man" use their toilet. In such an instance, there stand two rival conceptions of privacy: one in which respecting privacy would, somewhat ironically, stand as a transgender person’s right to assert their distinct identity in public without fear, versus a conception of privacy as anonymity – their right not to be compelled to make a political statement in the course of going about their daily lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now that kind of issue wouldn’t come up in the Indian context for a large section of the transgender community simply owing to the hyper-visibility of the &lt;i&gt;hijras&lt;/i&gt;. For all its contemporary stigmatization, the &lt;i&gt;hijra&lt;/i&gt; community is a discernible one in public with an acknowledged history. &lt;i&gt;Hijras&lt;/i&gt; have won elections in India, and are very much an acknowledged part of public space.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; To that extent, privacy isn’t quite the overriding concern here in the way that it might be in the West – one might even say that the lack of such a conception can in this particular case be somewhat empowering.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Passport Forms&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next example concerns gender-sensitivity when it comes to passport forms.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; The Ministry of External Affairs moved to allow for the option of entering a person's sex as "E" instead of either "M" or "F", the "E" then standing for "Eunuch". At the time of introduction of this category there was a degree of ambivalence: it was not available on the form itself, instead being listed as an option only in the rules. As activists noted however, it was a victory in the sense of being the first official recognition of the community. The particular category of recognition was problematic: for one the term "eunuch" would only reasonably represent one part of the transgender population; for another, large sections of the community would consider that term insulting. The government subsequently made an ameliorative measure by changing the category to "Other".&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; Again, the logical privacy question that would arise here would be regarding one's desire to be identified as transgendered in the first place. Similar to the toilets example, the issue would play out differently in India in many cases, given the hyper-visibility of the &lt;i&gt;hijra&lt;/i&gt; community which provides an instant marker for a &lt;i&gt;hijra&lt;/i&gt;, and subsequently ensures that there isn’t really a privacy violation when it comes to such kind of identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, this declaration of otherness leads to issues for someone uncomfortable with disclosing transgender identity as such, and wanting to perform maleness or femaleness specifically. Would marking either the "M" or "F" column be considered an illegality?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognition – and Resolving Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where official recognition is clearly ameliorative, it doesn't always stay. Following years of struggle, the community was given recognition in Andhra Pradesh under the Minorities Welfare Department. It was short-lived, however: protests by religious minority groups forced the government to go back on its decision.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; The kind of privacy violations that the &lt;i&gt;hijra&lt;/i&gt; community suffers in India are thus in stark contrast to the kinds suffered by members of the gay and lesbian community: where one side deals with its invisibility, the other contends with the problems of its hyper-visibility. &lt;i&gt;Hijras&lt;/i&gt; walk about as constant targets of police intrusion.  A gay man or lesbian woman wouldn’t necessarily face those issues at the same level, except in instances where public sex is involved. The exceptions to even that are incidents of entrapment such as the Lucknow case, but it is evident that it is the &lt;i&gt;hijra&lt;/i&gt; community which deals with such police action much more than the others. What is also uniquely empowering for the community is this very aspect of their identity, this ever-present identification. The kind of fears of disclosure and blackmail that someone who fears outing might face fizzle out in the case of the &lt;i&gt;hijras&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discourse gets complicated when you take up the identities of non-&lt;i&gt;hijra&lt;/i&gt; transgendered persons: there are the female-to-male transgendered identities of Thirunambigal in Tamil Nadu, Magaraidu in Andhra Pradesh and Gandabasaka in Karnataka – as well as male to female identities such as the Jogappas in Northern Karnataka, and Jogathas in Andhra Pradesh.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; The idea of hyper-visibility which is so crucial to locating a sense of empowerment for the &lt;i&gt;hijra&lt;/i&gt; community in their lack of loss of privacy disappears here. The discussion here then springs back to the U.S. example of transgender toilets, and the complications that arise when external identity doesn’t necessarily match the internal one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Medical Establishment&lt;/b&gt;&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relevant to this section of the study is the understanding of privacy under the ambit of autonomy. Referring to Naz Foundation, instead of using liberty to describe and support privacy as under Article 21 of the Constitution of India, the court refers to autonomy holding that "exercise of autonomy enables an individual to attain fulfillment, grow in self-esteem and form relationships of his or her choice and fulfill all legitimate goals that he/she may set."&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt;;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The medical establishment in India constantly undermines that autonomy by its treatment of homosexuality as a disease, and of LGBT persons as "others". LGBTs in India have often been detained in clinics against their will and subjected to treatment including shock therapy aimed at curing them.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2001, the National Human Rights Commission (NHRC) admitted a complaint from a patient at the All Indian Institute of Medical Sciences, alleging psychiatric abuse at the hands of the consulting doctor, having been put on a four year course of drugs and told he had to be "cured" of his homosexuality. The NHRC finally chose to reject the complaint, with informal conversations with the chairman showing his belief that till section 377 was read down, nothing could be done. &lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Vinay Chandran, Executive Director of the Swabhava Trust, medicine in India continues to be obsessed with curing homosexuality, with health professionals in many places still offering behavioural therapy including electric shock treatment as well as psychiatric drugs and hormones in order to "cure" patients of homosexual desire. Vinay reports that a couple of psychiatrists in Bangalore mentioned that there were possibilities of discovering which gene determines sexual preference and scientifically suppressing it.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course quacks exist across the spectrum, and medicinal malpractice is barely limited to serving disastrous advice/ treatment to persons "afflicted" with homosexuality. For understanding how the debate moves beyond merely unqualified doctors, we have to factor in the category of ego-dystonic homosexuality, which is endorsed by the WHO. Here, the gender identity or sexual preference of the individual is not in doubt, but the individual wishes it were different and seeks treatment.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The way a number of psychiatrists’ engage with the situation is summed up by the statement: "it’s not my job to tell him that it’s okay to be gay." No, the psychiatrist’s job it seems is to attempt to "cure" the oft-acknowledged incurable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fundamental factor not taken into account is that it is very often the environment that surrounds expression of homosexual identity that the patient is concerned about, as opposed to merely the idea of being LGBT. The relationship between patient and doctor is a fiduciary one, premised on absolute trust. In consulting a doctor, the patient entrusts fundamental decision making powers to the practitioner. The medical professional is often unable to comprehend the question of choice. This in turn results in effectively infringing the patient’s autonomy: the component of attaining fulfillment, the growth in self-esteem that the Delhi High Court elaborated on is robbed in the process of stifling sexuality, even when it is something the patient specifically requests the doctor for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lesbian  Unions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maya Sharma, in her book Loving Women locates the stories of a number of working-class lesbian women struggling to be with each other against the odds.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt; In a vein that parallels the reaction elicited to inter-religious or inter-caste marriages in a number of regions, it is often the honour of a family/village that is invoked in opposition to the demands of two people who want to be each other. One incident involves a woman who "dares" to elope with another being beaten and stripped, having her face blackened and being paraded around a village with a garland of shoes on her neck. Sahayatrika, a lesbian women's collective in Kerala has documented 24 cases of lesbian couple suicides in Kerala during the period between 1996 and 2004.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt; Earlier this year, two sets of lesbian couples committed suicide within a month of each – one in Sonarpur,.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt; and the other in Nandigram.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sexuality has often been used as a means for controlling women. The immoral/ tainted woman when placed in contrast with the idealized image of the model Indian woman is an image played out in various daily social interactions. In carrying out the agenda of control, the act of agency displayed by women who choose to step out of the heterosexual woodwork is a direct threat to that very system. The acts of family members in attempting to separate lesbian unions display a lack of respect for autonomy and for the private decisions of the women concerned. The feelings of fear, shame and isolation experienced by women who dare to explore their sexuality are compounded by instances of persecution by the family. The state is further complicit in numerous documented instances with the police often working with the family to track down the runaway brides and get them back home to familial watch under lock and key.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy again battles with privacy in this realm: an oft-heard feminist critique of privacy hinges on the idea that privacy can be dangerous for women when it is used to cover up repression and physical harm to them by creation of the public/private divide.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; The private realm is premised on non-intervention by the State. In this instance however, it is another aspect of privacy that needs to be valued, and one that even calls for state intervention: the aforementioned act of autonomy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Privacy in the Time of Naz&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The examples up until now have been coloured with a pre-Naz conception of privacy and queer rights – this chapter takes up two incidents post the judgment that captured the public imagination. First is the sting operation carried out on an Allahabad Muslim University professor that began a chain of events leading to his death; the second is an "expose" on the gay community carried by TV9. In both incidents, the "Spectre of Naz" &lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; looms in the background, in many ways acting as an empowering, legitimizing force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Allahabad Muslim University Sting Operation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February 2010, newspapers widely reported the story of Dr. Shrinivas Ramchandra Siras a 64 year-old Reader &amp;amp; Chairman, Department of Modern Indian Languages, Aligarh Muslim University (AMU) being filmed having consensual sex with another adult male. When the video was made public, AMU suspended Siras for immoral sexual activity.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; The implications of the suspension both in terms of the perception of homosexuality as immoral despite the judgment of the Delhi High Court as well as the disturbing nature of the occurrence of the filming of Dr. Siras in the privacy of his home prompted a nationwide outrage.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 1 of the same year, the Allahabad High Court ordered AMU to reinstate Siras, holding that his right to privacy had been violated, stating "the right of privacy is a fundamental right, needs to be protected and that unless the conduct of a person, even if he is a teacher is going to affect and has substantial nexus with his employment, it may not be treated as misconduct."&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then comes the news that Uttar Pradesh police had arrested two of those who broke into Siras’ house and filmed him. Many university officials were also charged with criminal offences. As Vinay Sitapati notes, none of this could have happened in a context where gay sex was illegal. In that context, it would have been Siras who was the criminal, and the additional wrongs done simply irrelevant – "this is not how the story was supposed to pan out. Those who broke into Siras’s house and AMU (and there are allegations that they are one and the same) assumed that Siras’s transgressions were so repellent, that their own would be forgiven." The judicial narrative — of a victimized Siras, a callous administration and criminal house-breakers — owes much to the Delhi High Court’s view that Siras’s sexual choice was legitimate.&lt;a href="#fn49" name="fr49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going back to the understanding that the right to privacy is integrally linked to the notion of autonomy and the right to live with dignity ‒ it is this most fundamental of Constitutional safeguards that the AMU authorities clearly colluded in negating by being complicit in the sting operation and subsequently suspending Dr. Siras. A press release by the AMU authorities demonstrated a continuing disrespect for privacy: "the university respects the privacy of a teacher living in its premises but it also expects everyone to behave in a respectful manner giving due regard to its valued cultural ethos and the campus sensitivity including their neighbours concerns and to the great moral credentials that AMU has been nurturing since its inception."&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The TV9 “Expose”&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February of 2011, the news channel TV9 aired what it called an expose on the Hyderabad gay community titled "Gay Culture in Hyderabad". The video starts by worrying about how gay culture in Hyderabad is "increasing drastically". Following this, footage of a gay club is shown, without any attempt to blank out faces. The show then puts itself in the mode of investigative journalism, as TV9 sets itself the target of exposing the "truth" about gay culture in the city.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, viewers are informed about gay dating websites, with the anchor taking special care to inform viewers that it is software employees and students who mostly "fall prey" to this gay culture. Then, in an astonishingly blunt violation of privacy, pictures of men on one dating site are flashed on the screen, accompanied by conversations between the concerned man and a TV9 journalist soliciting sex. "While some do it for new pleasures, some get spoilt by friends, others do it for the crave of money and the remaining are vowed by the lust some of them have changed it into a business by capturing teenager's mind and get them into hell."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The video recording of the telecast on YouTube was taken off the site following a sustained protest from users of the site. Notices for legal action were sent to TV9 offices, including a detailed petition from Adhikaar, a Delhi based NGO. Two questions were primarily asked on LGBT mailing lists across the country&lt;a href="#fn51" name="fr51"&gt;[51]&lt;/a&gt;: first, regarding how safe establishing one’s homosexual identity online, or attending gay parties would be anymore, and secondly, whether a protest should take place, and what the nature of the same should be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As highlighted by the petition drafted by Adhikaar, a Delhi-based NGO, this act of TV9 was violative of Code 6 of the News Broadcasters Association Code which deals with matters of privacy, and states:&lt;a href="#fn52" name="fr52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"As a rule channels must not intrude on private lives, or personal affairs of individuals, unless there is a clearly established larger and identifiable public interest for such a broadcast. The underlying principle that news channels abide by is that the intrusion of the private spaces, records, transcripts, telephone conversations and any other material will not be for salacious interest, but only when warranted in the public interest."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By way of entrapping a set of gay men through calling them and asking them pointed personal questions about their sexual lives, TV9 was further in violation of Code 9 (Self-Regulation Section) of the News Broadcasters Association which deals with sting operations and which states:&lt;a href="#fn53" name="fr53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"As a guiding principle, sting and undercover operations should be a last resort of news channels in an attempt to give the viewer comprehensive coverage of any news story. News channels will not allow sex and sleaze as a means to carry out sting operations, the use of narcotics and psychotropic substances or any act of violence, intimidation, or discrimination as a justifiable means in the recording of any sting operation."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A month later, the News Broadcasting Standards Authority, New Delhi censured TV9 and ordered it to pay a fine of Rs.1,00,000 and broadcast an apology in prime time both in English and in Telugu. The Authority determined that TV9 has violated the codes of ethics and broadcasting standards.&lt;a href="#fn54" name="fr54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice JS Verma called the story a sensationalized depiction of gay culture in Hyderabad and the story needlessly violated the privacy of individuals, with possible alternate sexual orientation. He also pointed out that alternate sexual orientation is no longer considered as a taboo or a criminal act. The channel was directed to run an apology for three consecutive days beginning the Monday next, in prime time with the following text:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"TV9 apologizes for the story “Gay Culture Rampant in Hyderabad” telecast on this channel on 22 February, 2011 from3.11 p.m. to 3.17 p.m. particularly since the story invaded the privacy of certain persons and was in violation of the Code of Ethics &amp;amp; Broadcasting Standards of the News Broadcasters Association. Any hurt or harm caused to any person thereby is sincerely regretted."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, it must be noted that the order of the NBSA would not have been possible in a context where gay sex was illegal: it is that very notion that allowed the Authority to move past the issue of homosexuality and instead delve into the merits of the actual harm done here.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is possible to mount an argument that nothing has really changed post-Naz. The AMU’s attitude even in the face of the flak it received after the sting operation was phlegmatic at best: a summary statement saying that while it respected his privacy, it also expected a certain degree of behavior keeping in line with its "valued cultural ethos". Reactions like this threaten to lock the idea of privacy into a closed epistemic loop of judicial discourse: the courts might go hoarse extolling the significance of privacy, but it is for nought if the AMU decides it can still walk away with its flagrant violation of basic civil liberties. Or perhaps the frenzy generated by the incident will work as a deterrent factor to future institutions fixing their moral gaze upon their members. The strength of an incident as precedent can only be gauged effectively by how its future echoes use it as a reference point.&lt;/p&gt;
&lt;div class="pullquote" style="text-align: justify; "&gt;&lt;b&gt;Meanwhile, what do these stories tell us about privacy? &lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The issues faced by the transgender community tell us that privacy doesn’t necessarily encompass a one-size-fits-all approach, and can raise as many questions as it answers. The issues faced by the Lucknow NGOs narrate a tale of institutionalized disrespect for privacy that has marginally more devastating consequences for the homosexual community by the spectre of outing. The issues faced by lesbian women evidence yet another need for breaching the public/private divide, demonstrating how the protection of the law might be welcome in the family sphere regardless of the bull-in-a-china-shop&lt;a href="#fn55" name="fr55"&gt;[55]&lt;/a&gt; prophecies of doom. Alternate sexual orientation and gender identity might bring the community under a common rubric, but distilling the components of that rubric is essential for engaging in any kind of useful understanding of the community and the kind of privacy violations it suffers – or engage with situations when the lack of privacy is empowering.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Selected incidents reported from 2001-2011&lt;/b&gt;&lt;/h2&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;NGO charged with running gay club&lt;/td&gt;
&lt;td&gt;8 July 2001&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/MNHzw"&gt;http://goo.gl/MNHzw&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Homosexuality okay if practiced in private&lt;/td&gt;
&lt;td&gt;14 September 2011&lt;/td&gt;
&lt;td&gt;Sify News&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/iF3PQ"&gt;http://goo.gl/iF3PQ&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Male callers harass lesbian helpline&lt;/td&gt;
&lt;td&gt;26 October 2003&lt;/td&gt;
&lt;td&gt;Mid Day Mumbai&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/Xf0fj"&gt;http://goo.gl/Xf0fj&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Lesbian marriages, born of a legal loophole, stir debate in India&lt;/td&gt;
&lt;td&gt;4 February 2005&lt;/td&gt;
&lt;td&gt;DesPardes&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/O30Hf"&gt;http://goo.gl/O30Hf&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Third sex finds a place on Indian passport forms&lt;/td&gt;
&lt;td&gt;10 March 2005&lt;/td&gt;
&lt;td&gt;Telegraph&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/nBQIt"&gt;http://goo.gl/nBQIt&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Lesbian couple sparks debate in Uttar Pradesh state&lt;/td&gt;
&lt;td&gt;9 April 2005&lt;/td&gt;
&lt;td&gt;Sify News&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/9GxuF"&gt;http://goo.gl/9GxuF&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;The Indian city of Chennai is set to build toilets for trans people&lt;/td&gt;
&lt;td&gt;July 2005&lt;/td&gt;
&lt;td&gt;Pink News&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/52Llq"&gt;http://goo.gl/52Llq&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Homosexual gangs&lt;/td&gt;
&lt;td&gt;3 January 2006&lt;/td&gt;
&lt;td&gt;Pioneer&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/NX2NP"&gt;http://goo.gl/NX2NP&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Nihal was used to homosexual sex since 1986&lt;/td&gt;
&lt;td&gt;4 January 2006&lt;/td&gt;
&lt;td&gt;Dainik Jagran&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/NX2NP"&gt;http://goo.gl/NX2NP&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Ain’t no cure for love&lt;/td&gt;
&lt;td&gt;6 June 2006&lt;/td&gt;
&lt;td&gt;India Together&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/V9Vjn"&gt;http://goo.gl/V9Vjn&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;Police bust gay party&lt;/td&gt;
&lt;td&gt;4 February 2008&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/n2nyz"&gt;http://goo.gl/n2nyz&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Aligarh Muslim University professor suspended for being gay&lt;/td&gt;
&lt;td&gt;18 February 2010&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/D8LuD"&gt;http://goo.gl/D8LuD&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;Class monitors&lt;/td&gt;
&lt;td&gt;8 March 2010&lt;/td&gt;
&lt;td&gt;Outlook&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/Q2dkV"&gt;http://goo.gl/Q2dkV&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Aligarh gay professor found dead, may have killed self&lt;/td&gt;
&lt;td&gt;8 April 2010&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/FyeIz"&gt;http://goo.gl/FyeIz&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;AMU professor a victim of clash between ‘tradition’ and privacy&lt;/td&gt;
&lt;td&gt;25 February 2010&lt;/td&gt;
&lt;td&gt;The Hindu&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/AtiJW"&gt;http://goo.gl/AtiJW&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Criminal case registered against six in gay professor case&lt;/td&gt;
&lt;td&gt;10 April 2010&lt;/td&gt;
&lt;td&gt;India Today&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/LfwDI"&gt;http://goo.gl/LfwDI&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;AMU Prof promised money for sex: Rickshaw-puller&lt;/td&gt;
&lt;td&gt;19 April 2010&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/aXmBz"&gt;http://goo.gl/aXmBz&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;Varsity paid for sting on gay professor&lt;/td&gt;
&lt;td&gt;19 February 2010&lt;/td&gt;
&lt;td&gt;India Today&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/cyQxL"&gt;http://goo.gl/cyQxL&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19&lt;/td&gt;
&lt;td&gt;TV channel outs gay men, women in Hyderabad&lt;/td&gt;
&lt;td&gt;24 February 2010&lt;/td&gt;
&lt;td&gt;NDTV&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/w6NG4"&gt;http://goo.gl/w6NG4&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;News Broadcasting Standards Authority censures TV9 over privacy violations&lt;/td&gt;
&lt;td&gt;25 March 2011&lt;/td&gt;
&lt;td&gt;Privacy India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/rY7bT"&gt;http://goo.gl/rY7bT&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;21&lt;/td&gt;
&lt;td&gt;In a first, Gurgaon Court recognizes lesbian marriage&lt;/td&gt;
&lt;td&gt;29 July 2011&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/70KPr"&gt;http://goo.gl/70KPr&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Madhavi Goradia Divan, Facets of Media Law, Eastern Book Company, Lucknow, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].For instance, an HIV positive man’s right to marry as discussed in &lt;i&gt;Mr. X v. Hospital Z&lt;/i&gt;, 1998 (8) SCC 296.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].Section 377, Indian Penal Code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].(2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].&lt;a class="external-link" href="http://www.openletter377.com/"&gt;http://www.openletter377.com/&lt;/a&gt;, last accessed 20 October 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].Olmstead v. U.S., 277 U.S. 438, 478 (1928) (Brandeis, J., dissenting).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].Cathy Harris, Outing Privacy Litigation:  Towards a Contextual Strategy for Lesbian and Gay Rights, 65 Geo. Wash. L. Rev. 248.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;].Amita Dhanda, Constructing a New Human Rights Lexicon : Convention on the Rights of Persons with Disabilities, Year 5  No. 8 Sao Paulo June 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;].See Henry Shue, Basic Rights Subsistence Affluence and US Foreign Policy, Princeton University Press, 2nd ed. 1996.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;].&lt;i&gt;Naz Foundation v. Government of NCT, Delhi&lt;/i&gt;, 160 (2009) DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;].Ibid., 47.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;].Ibid., 26, 83, 113.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;].Arvind Narrain, Queer: Law and Despised Sexualities in India, Books for Change, 2004.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;].Men who have sex with men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]."Gay Club Supplied Boys to Politicians"; "Gay Culture Started in UP in 1998 Itself", The Times of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;].Criminal Misc. Case No. 2054/2001, as taken from Arvind Narrain, Queer: Law and Despised Sexualities in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;].AIR 1963 SC 1295; it was Justice Subba Rao’s minority decision here that laid the foundation for the right to privacy in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;].1975 (2) SCC 148.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Arvind Narrain, Queer: Law and Despised Sexualities in India, Books for Change, 2004.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn20"&gt;21&lt;/a&gt;].Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;].Alok Gupta, Section 377 and the Dignity of Indian Homosexuals, &lt;a class="external-link" href="http://www.iglhrc.org/binary-data/ATTACHMENT/file/000/000/15-1.pdf"&gt;http://www.iglhrc.org/binary-data/ATTACHMENT/file/000/000/15-1.pdf&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;].Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;].&lt;a class="external-link" href="http://timesofindia.indiatimes.com/Mumbai/Police_bust_gay_party/articleshow/2753740.cms"&gt;http://timesofindia.indiatimes.com/Mumbai/Police_bust_gay_party/articleshow/2753740.cms&lt;/a&gt;, last accessed on 8 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;].Human Rights Violations in the Transgender Community: A Report by PUCL-K, 2nd ed. 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;].&lt;a class="external-link" href="http://www.guardian.co.uk/world/2008/jul/04/india-gender"&gt;http://www.guardian.co.uk/world/2008/jul/04/india-gender&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].&lt;a class="external-link" href="http://www.pinknews.co.uk/news/articles/2005-11518.html"&gt;http://www.pinknews.co.uk/news/articles/2005-11518.html&lt;/a&gt;, last accessed on 10 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;].Transgender people deserve privacy, dignity, in public bathrooms, Maine Opinion, available at &lt;a class="external-link" href="http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/"&gt;http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;].Transgender people deserve privacy, dignity, in public bathrooms, Maine Opinion, available at &lt;a class="external-link" href="http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/"&gt;http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;].Siddharth Narrain, Being a Eunuch, available at &lt;a class="external-link" href="http://www.countercurrents.org/gen-narrain141003.htm"&gt;http://www.countercurrents.org/gen-narrain141003.htm&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;].&lt;a class="external-link" href="http://webcache.googleusercontent.com/search?q=cache:gLqrElQbWboJ:infochangeindia.org/human-rights/news/-third-sex-finds-a-place-on-indian-passport-forms.html+PASSPORT+APPLICATION+INDIA+gender&amp;amp;cd=4&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in&amp;amp;source=www.google.co.in"&gt;http://webcache.googleusercontent.com/search?q=cache:gLqrElQbWboJ:infochangeindia.org/human-rights/news/-third-sex-finds-a-place-on-indian-passport-forms.html+PASSPORT+APPLICATION+INDIA+gender&amp;amp;cd=4&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in&amp;amp;source=www.google.co.in&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;].&lt;a class="external-link" href="http://passport.gov.in/cpv/ppapp1.pdf"&gt;http://passport.gov.in/cpv/ppapp1.pdf&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;].&lt;a class="external-link" href="http://www.ndtv.com/article/india/andhra-pradesh-government-gives-in-to-sexuality-bias-71454"&gt;http://www.ndtv.com/article/india/andhra-pradesh-government-gives-in-to-sexuality-bias-71454&lt;/a&gt;, last accessed on 8 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;].Gee Ameena Suleiman, Non-Hijra Transgenders Struggle for Identity, Daily News and Analysis, available at &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report_non-hijra-transgenders-struggle-for-identity_1588421"&gt;http://www.dnaindia.com/lifestyle/report_non-hijra-transgenders-struggle-for-identity_1588421&lt;/a&gt;, last accessed on 25 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;].Arvind Narrain and Vinay Chandran, It’s Not My Job to tell you It’s okay to be Gay – Medicalisation of Homosexuality: A Queer Critique, available at http://www.altlawforum.org/gender-and-sexuality/publications/medicalizationfinal.rtf/at_download/file&lt;a class="external-link" href="http://www.altlawforum.org/gender-and-sexuality/publications/medicalizationfinal.rtf/at_download/file"&gt;http://www.altlawforum.org/gender-and-sexuality/publications/medicalizationfinal.rtf/at_download/file&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;].160 (2009) DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;].&lt;a class="external-link" href="http://www.unhcr.org/refworld/pdfid/4b6fe2110.pdf"&gt;http://www.unhcr.org/refworld/pdfid/4b6fe2110.pdf&lt;/a&gt;, last accessed 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;].Arvind Narrain. and Tarunabh Khaitan, Medicalisation of Homosexuality : A Human Rights Approach, as taken from Bina Fernandez (ed.), Humjinsi: A Resource Book on Lesbian, Gay and Bisexual Rights in India (New Delhi : India Centre for Human Rights and the Law, 2002).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;].Vinay Chandran, Ain’t no cure for love, India Together, last accessed on 8 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;].Supra n. 32.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;].Maya Sharma, Loving Women: Being Lesbian in Unprivileged India, Yoda Press, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;].India: Second NGO Shadow Report on CEDAW, November 2006, available at &lt;a class="external-link" href="http://www.iwraw-ap.org/resources/pdf/India%20Shadow%20report.pdf"&gt;http://www.iwraw-ap.org/resources/pdf/India%20Shadow%20report.pdf&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;].&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-01-24/kolkata/28367047_1_girls-suicide-lesbian-couple"&gt;http://articles.timesofindia.indiatimes.com/2011-01-24/kolkata/28367047_1_girls-suicide-lesbian-couple&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;].&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-02-22/kolkata/28624865_1_lesbian-couple-suicide-field"&gt;http://articles.timesofindia.indiatimes.com/2011-02-22/kolkata/28624865_1_lesbian-couple-suicide-field&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;].Saptarshi Mandal, Right to Privacy in Naz Foundation: A Counter-Heteronormative Critique, 3 NUJS L. Rev. 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;].Vinay Sitapati, The Spectre of Naz, as available at &lt;a class="external-link" href="http://www.indianexpress.com/news/the-spectre-of-naz/609695/0"&gt;http://www.indianexpress.com/news/the-spectre-of-naz/609695/0&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;].&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2010-02-18/india/28118769_1_shrinivas-ramchandra-siras-rickshaw-puller-amu-campus"&gt;http://articles.timesofindia.indiatimes.com/2010-02-18/india/28118769_1_shrinivas-ramchandra-siras-rickshaw-puller-amu-campus&lt;/a&gt;, last accessed on 11 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Arvind Narrain, et al, Policing Morality at AMU: An Independent Fact-Finding Report,  available at &lt;a class="external-link" href="http://www.fridae.com/newsfeatures/2010/03/10/9724.policing-morality-at-amu-an-independent-fact-finding-report?n=sea&amp;amp;nm=amu"&gt;http://www.fridae.com/newsfeatures/2010/03/10/9724.policing-morality-at-amu-an-independent-fact-finding-report?n=sea&amp;amp;nm=amu&lt;/a&gt;, last accessed on 11 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;].&lt;i&gt;Dr. Shrinivas Ramchandra Siras &amp;amp; Ors v. The Aligarh Muslim University &amp;amp; Ors&lt;/i&gt;, Civil Misc. Writ Petition No.17549 of 2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;].Vinay Sitapati, The Spectre of Naz, as available at &lt;a class="external-link" href="http://www.indianexpress.com/news/the-spectre-of-naz/609695/0"&gt;http://www.indianexpress.com/news/the-spectre-of-naz/609695/0&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Supra n. 32&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr51" name="fn51"&gt;51&lt;/a&gt;].&lt;a class="external-link" href="mailto:lgbt-india@yahoogroups.com"&gt;Lgbt-india@yahoogroups.com&lt;/a&gt;. This is possibly the most prolific mailing list for LGBT persons in the country, and is constantly active with atleast 4-5 mails being exchanged per day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr52" name="fn52"&gt;52&lt;/a&gt;].Code of Ethics and Broadcasting Standards of the News Broadcasters Association.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr53" name="fn53"&gt;53&lt;/a&gt;].Code 9, Code of Ethics and Broadcasting Standards of the News Broadcasters Association.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr54" name="fn54"&gt;54&lt;/a&gt;].TV9 Ordered to Air Apology for Sting  available at &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report_tv9-ordered-to-air-apology-for-sting_1527622"&gt;http://www.dnaindia.com/lifestyle/report_tv9-ordered-to-air-apology-for-sting_1527622&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr55" name="fn55"&gt;55&lt;/a&gt;].“Introduction of constitutional law in the home … is like introducing a bull in a china shop. It will prove to be a ruthless destroyer of the marriage institution”, Rohatgi, J. in &lt;i&gt;Harvinder Kaur v. Harmander Singh Choudhry&lt;/i&gt;, AIR 1984 Del 66.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;* The author, Danish Sheikh works with the Alternative Law Forum in Bangalore, India. &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-sexual-minorities'&gt;https://cis-india.org/internet-governance/privacy-sexual-minorities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Danish Sheikh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-20T09:22:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf">
    <title>Sixth Annual Meeting of the Internet Governance Forum, Nairobi: A Summary</title>
    <link>https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf</link>
    <description>
        &lt;b&gt;The sixth annual meeting of the Internet Governance Forum was held from 27 to 30 September 2011 at the United Nations Office in Nairobi, Kenya. Sunil Abraham participated in six workshops: Privacy, Security, and Access to Rights: A Technical and Policy Analyses, Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward, The Impact of Regulation: FOSS and Enterprise, Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards, Access and Diversity of Broadband Internet Access and Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/b&gt;
        
&lt;h3&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 219&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Kim Pham, Expression Technologies, Civil Society (United States). The panel members included Carlos Affonso Pereira de Souza, Centro de Technologica e Socieda (Brazil), Christopher Soghoian, Indiana University (United States), Karen Reilly, Tor Project, Technical/Civil Society (United States) and Sunil Abraham, Centre for Internet and Society (India).&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=219"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 184&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Katim S Touray Council Vice Chair, Free Software and Open Source Foundation for Africa and Member, ICANN Board of Directors. Fouad Bajwa of Gerry Morgan Foundation (Pakistan) was the remote moderator. Nnenna Nwakanma of Nnenna.org, Simeon Oriko of @TheKuyuProject &amp;amp;@StorySpaces, Wael Khalil, Activist and Sunil Abraham of the Centre for Internet &amp;amp; Society were the panel members. Nishant Shah from the Centre for Internet &amp;amp; Society participated remotely from Bangalore.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=184"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/873-ei-workshop-80184-use-of-digital-technologies-for-civic-engagement-and-political-change-lessons-learned-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;The Impact of Regulation: FOSS and Enterprise&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 211&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Dorothy Gordon, Director General, AITI-KACE, Judy Okite was the remote moderator. The panel members were Satish Babu, ICFOSS, India, Yves Miezan Ezo, Smile Training, Manager, (France), Sunil Abraham, Executive Director, Centre for Internet &amp;amp; Society, Bangalore, Evans Ikua, FOSS Certification Manager, ict@innovation program.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=211"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/842-28-september-2011-ad-workshop-73211-foss-as-an-instrument-for-accessible-development-the-impact-of-regulation-open-source-and-enterprise"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 201&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Alejandro Pisanty, Director General for Academic Computing Services of the National University of Mexico (UNAM), Mexico. Tracy Hackshaw, Computer Society of Trinadad and Tobago, Trinadad and Tobago, Venkatesh Hariharan, Head of Public Policy and Government Affairs at Google, India and Scott O Bradner, University Technology Security Officer, Harvard University, USA were the panel members.&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=201"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/835-28-september-2011-other-201-proprietary-influences-in-free-and-open-source-software-lessons-to-open-and-universal-internet-standards"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Access and Diversity of Broadband Internet Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 113&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by N Ravi Shanker, Addl Secy, Department of Information Technology, Ministry of Information Technology, Government of India (Chair). Abhishek Singh, Director, Department of Information Technology, Ministry of Information Technology, Government of India, Venkatesh Hariharan, Head of Public Policy and Government &amp;nbsp;Relations, Google India and Sunil Abraham, Executive Director, The Centre for Internet and Society, India were the panel members.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=113"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/811-ad-feeder-workshop-113-access-and-diversity-of-broadband-internet-access-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Putting users First: How can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 75&lt;/strong&gt;&lt;br /&gt;This workshop was moderated by Ambassador David Gross, Partner, Wiley Rein LLP, Yiannis Theodorou, Regulatory Policy Manager, GSMA was the remote moderator. The panel members included Pat Walshe, Director of Privacy-GSMA), Jeff Brueggeman (Vice President-Publiy Policy AT&amp;amp;T), Patrick Ryan, Policy Counsel, Open Internet for Google Inc, Ms Juliana Rotich, Executive Director of Ushahidi Inc, Sunil Abraham, Executive Director, The Centre for Internet and Society (India) and Ian Brown, co-director of Oxford University's Information Security and Privacy Programme.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=75"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/870-sop-75-putting-users-first-how-can-privacy-"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf'&gt;https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-24T09:09:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/media-economics-workshop">
    <title>Ninth Workshop on Media Economics</title>
    <link>https://cis-india.org/news/media-economics-workshop</link>
    <description>
        &lt;b&gt;The Higher School of Economics and the New Economic School have joined hands to organize the ninth workshop on media economics in Moscow on October 28 and 29, 2011. All events are scheduled to take place in Marriott Courtyard, a hotel in the centre of Moscow within 10-minute walking distance from the Kremlin, the Red Square, and the Bolshoi Theatre.&lt;/b&gt;
        
&lt;h2&gt;Workshop Program&lt;/h2&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Friday, October 28, 2011&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning coffee&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;8:45 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Opening remarks&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Media markets - 1: Newspapers, Mergers, and Diversity&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Michal MASIKA, University of Munich&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Free commuter newspapers and the market for paid-for daily newspapers&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergey V. Popov, Higher School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lapo FILISTRUCCHI, Tilburg University and University of Florence&lt;/div&gt;
&lt;div&gt;Tobias J. Klein, Tilburg University&lt;/div&gt;
&lt;div&gt;Thomas Michielsen, Tilburg University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Merger Simulation in a Two-Sided Market: The Case of the Dutch Daily &amp;nbsp; Newspapers&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;Felix Oberholzer-Gee, Harvard Business School&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Diversity in Local Television News&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: François Keslair, Paris School of Economics&amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Media markets and Internet - 1: Advertising and Search Engines&lt;/h3&gt;
&lt;div&gt;11:30 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexandre de CORNIÈRE, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Search advertising&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Simon Anderson, University of Virginia&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexander WHITE, Tsinghua University School of Economics and Management&lt;/div&gt;
&lt;div&gt;Kamal Jain, Microsoft Research&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;The Attention Economy of Search and Web Advertisement&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Izmalkov, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:50 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Lunch&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Political Economy - 1: Media, Elites, and the Groups of Influence&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Leopoldo FERGUSSON, Universidad de Los Andes&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media Markets, Special Interests, and Voters&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Alexei V. Zakharov, Higher School of Economics &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Ben Qin, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Yanhui Wu, USC Marshall School of Business&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Determinants of Media Capture in China&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Maria Petrova, New Economic School&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Daniel STONE, Oregon State University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media and Gridlock&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Elena Panova, Academy of National Economy and Gaidar Institute&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;4:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets and Internet - 2: Internet Effects and Offline Media Markets&lt;/h3&gt;
&lt;div&gt;4:30 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Joel WALDFOGEL, University of Minnesota&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Bye, Bye, Miss American Pie? The Supply of New Recorded Music since Napster&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Enikolopov, New Economic School&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Ignacio FRANCESCHELLI, Northwestern University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;When the Ink is Gone: The Impact of Internet on News Coverage&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Durante, Sciences Po Paris &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:50 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Adjourn&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;7:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Dinner&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Saturday October 29th&lt;/h2&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning Coffee&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 2: Interactions in Traditional and Digital Media Industry&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Harald Nygård Bergh, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Hans Jarle KIND, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Bjørn-Atle Reme, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Competition between Content Distributors in Two-Sided Markets&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Guido Friebel, Goethe University Frankfurt &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Larbi Alaoui, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;Fabrizio GERMANO, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Time Scarcity and the Market for News&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Guriev, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Political Economy - 2: Media Effects&lt;/h3&gt;
&lt;div&gt;10:50 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Francesco Drago, University of Naples&lt;/div&gt;
&lt;div&gt;Tommaso Nannicini, Bocconi University&lt;/div&gt;
&lt;div&gt;Francesco SOBBRIO, IMT Lucca&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Newspapers, Local News and Electoral Politics&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ekaterina Zhuravskaya, Paris School of Economics &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Julia CAGÉ, Harvard University&lt;/div&gt;
&lt;div&gt;François Keslair, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Trash Media and the Decline of Turnout: Theory and Evidence from Local Media Competition in France, 1944-2010&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Francesco Sobbrio, IMT Lucca &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Parallel events (choose your favorite):&lt;/div&gt;
&lt;div&gt;Lunch &amp;nbsp;- or -&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Global New Media Policy&lt;/h3&gt;
&lt;div&gt;Roundtable (with refreshments, RSVP required, more details here)&lt;/div&gt;
&lt;div&gt;Pedro MIZUKAMI, FGV Center for Technology and Society, Rio de Janeiro, Brazil&lt;/div&gt;
&lt;div&gt;Sunil ABRAHAM, Centre for Internet and Society, Bangalore, India&lt;/div&gt;
&lt;div&gt;Bruce ETLING and Robert FARIS, Berkman Center for Internet and Society, Harvard University, United States&lt;/div&gt;
&lt;div&gt;Marina ZHUNICH, Google Russia&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 3: Media Bias&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Alec Kennedy, San Francisco Federal Reserve Bank&lt;/div&gt;
&lt;div&gt;“Does Media Concentration Lead to Biased Coverage? Evidence from Movie Reviews”&lt;/div&gt;
&lt;div&gt;Discussant: Joel Waldfogel, University of Minnesota &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Matthias HEINZ, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;Guido Friebel, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media bias against foreign owners: Downsizing&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Olga Kuzmina, New Economic School &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Future Directions of Research in Media Economics&lt;/h3&gt;
&lt;div&gt;3:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Roundtable&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;Simon ANDERSON, University of Virginia&lt;/div&gt;
&lt;div&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;4:45 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Farewell reception&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;The above agenda was published in Higher School of Economics website, &lt;a class="external-link" href="http://www.hse.ru/mew/program"&gt;click here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/div&gt;
&lt;iframe src="http://www.youtube.com/embed/WUL21Zc8UnU" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/media-economics-workshop'&gt;https://cis-india.org/news/media-economics-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T09:12:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-india-chronicles">
    <title>Growing Wikipedia: The India Chronicles</title>
    <link>https://cis-india.org/news/the-india-chronicles</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;Tory Read, a professional researcher, writer and journalist was commissioned by the Wikimedia Foundation to create a vivid description of its work in India. This was done in the interest of transparency and to ensure that it captured lessons from this new approach. Tory travelled for a couple of weeks across Mumbai, Pune, Bangalore and some towns in Kerala — attending community meet-ups speaking with a host of individual community members in these cities. Tory has given a journalistic account and analysis, based on document review, interviews and observations conducted between November 2010 and June 2011, including 16 days in India in June 2011.The views expressed herein are his own and do not necessarily reflect the views of Wikimedia Foundation.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director of the Centre for Internet and Society has been quoted in this report. The following are some direct quotes extracted out from this report:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"Feuding and flaming is an integral part of free software culture.” “You can’t imagine a mailing list without flaming." [The Chapter and the Community Tangle, page 16]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The crisis on the mailing list was ultimately a great thing.” “There was conflict, dozens of offline conversations, private and public negotiation and airing of views and doubts, followed by a public commitment to work together for a shared purpose." [Necessity Breeds Collaboration, page 19]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The Foundation’s job is having meetings and growing and holding the consensus." "It should&amp;nbsp;be creating situations in which trust is gained, and you do this through radical transparency and participation. The point of the Foundation’s work is to build the community." [For the Foundation, page 24]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Download the entire report &lt;a href="https://cis-india.org/internet-governance/india-chronicles.pdf" class="internal-link" title="The India Chronicles"&gt;here&lt;/a&gt;&amp;nbsp;[PDF, 2.9 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-india-chronicles'&gt;https://cis-india.org/news/the-india-chronicles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-14T09:17:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid">
    <title>SCOSTA and UID Comparison not Valid, says Finance Committee</title>
    <link>https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid</link>
    <description>
        &lt;b&gt;The Standing Committee on Finance Branch, Lok Sabha Secretariat has responded to the suggestions offered by CIS on the National Identification Authority of India, Bill 2010 and has requested it to mail its views by 14 October 2011.&lt;/b&gt;
        
&lt;p&gt;On January 6, 2011, CIS had sent an &lt;a href="https://cis-india.org/internet-governance/blog/blog/privacy/letter-to-finance-committee" class="external-link"&gt;open letter to the Parliamentary Finance Committee&lt;/a&gt; demonstrating how the Aadhaar biometric standard is weaker than the SCOSTA standard. The text of the reply is reproduced below.&lt;/p&gt;
&lt;p&gt;Sir,&lt;/p&gt;
&lt;p&gt;This is in response to one of the views/suggestions offered by CIS on the National Identification Authority of India Bill, 2010.&lt;/p&gt;
&lt;h3&gt;CIS View /Suggestion:&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;"Though the Aadhaar biometrics are useful for the de-duplication and identification of individuals, the Smart Card Operating System for Transport Application [(SCOSTA), developed by the National Informatics Centre in India)] standard is a more secure, structurally sound, and cost-effective approach to authentication of identity for India. Therefore, the Aadhaar biometric based authentication process should be replaced with a SCOSTA standard based authentication process."&lt;/p&gt;
&lt;p&gt;In this regard, do you agree with the following view? If not, please justify.&lt;/p&gt;
&lt;p&gt;"Comparison between SCOSTA and the UID project are not valid since SCOSTA is fundamentally a standard for smart card based authentication and does not work for the objectives of the unique id project.&lt;/p&gt;
&lt;p&gt;The UID project follows a different approach and has multiple objectives — providing identity to residents of India, ensuring inclusion of poor and marginalized residents in order to enable access to benefits and services, eliminating the fakes, duplicates and ghost identities prevalent in other databases and provide a platform for authentication in a cost effective and accessible manner.&lt;/p&gt;
&lt;p&gt;UIDAI is not issuing cards or smart cards. Cards can be issued by agencies that are providing services. UID authentication does not exclude smart cards — service providers can still choose to issue smart&amp;nbsp;cards to their beneficiaries or customers if they want to."&lt;/p&gt;
&lt;p&gt;You are requested to email your view by 14 October, 2011 positively.&lt;/p&gt;
&lt;p&gt;Standing Committee on Finance Branch&lt;br /&gt;Lok Sabha Secretariat&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid'&gt;https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-22T16:37:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers">
    <title>Seventh Open Letter to the Finance Committee: A Note on the Deduplication of Unique Identifiers </title>
    <link>https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers</link>
    <description>
        &lt;b&gt;Sahana Sarkar on behalf of the Centre for Internet and Society (CIS) had sent in a Right to Information application on 30 June 2011 to Ashish Kumar, Central Public Information Officer, UIDAI. The UIDAI sent in its reply. Through the seventh open letter, Hans attempts to characterize in an abstract way the replies that CIS managed to elicit and makes some elementary observations.&lt;/b&gt;
        The UIDAI records one or more biometric &lt;em&gt;signatures&lt;/em&gt; of those individuals to whom it assigns its &lt;em&gt;unique identity&lt;/em&gt; or &lt;em&gt;identifier&lt;/em&gt; ; and for convenience let us call this the process of &lt;em&gt;registering an applicant&lt;/em&gt;. In the normal course of registration the signatures of an applicant will be compared to those already recorded; and the outcomes of this exercise of comparing suites of biometric signatures — fingerprints and iris-scans, say — may be regarded as the values of a binary variable:
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h1.jpg/image_preview" alt="h1" class="image-inline image-inline" title="h1" /&gt;&lt;/p&gt;
&lt;p&gt;With more than one signature, we have Y = 1 only when those of the applicant match the signatures in some other suite of such item by item; and Y = 0 then if at least one of his or her signatures fails to match any already recorded one.&lt;/p&gt;
&lt;p&gt;Though the circumstance should be unlikely, a person who has already been registered may apply again to be registered: with fraudulent intent maybe: or simply because he or she has lost the document – some identity card, perhaps – which bears the identifier assigned to him or her by the UIDAI. And the possibilities here may be regarded as the values of a binary variable:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h2.jpg/image_preview" alt="h2" class="image-inline image-inline" title="h2" /&gt;&lt;/p&gt;
&lt;p&gt;Though we are regarding X and Y as variables equally, and taking them for&lt;em&gt; jointly distributed&lt;/em&gt; ones, there is an evident asymmetry between them. The exercise of trying to match a given suite of signatures to some set of other suites can be performed so long as the signatures remain available; but for a given applicant the values of X refer to events already past. Faced with an applicant of whom they may suppose no more than what he or she may disclose, the personnel of the UIDAI &lt;em&gt;cannot directly estimate&lt;/em&gt; either of the two quantities:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h3.jpg/image_preview" alt="h3" class="image-inline image-inline" title="h3" /&gt;&lt;/p&gt;
&lt;p&gt;We have &lt;em&gt;p[X = 0] + p[X = 1] = 1&lt;/em&gt; here, needless to say, so there is only one quantity that needs estimating. But it is worth emphasizing that even when an applicant declares himself to have been registered already— and has come, say, to have a lost card newly issued — the personnel of the UIDAI are obliged to remain agnostic about &lt;em&gt;p[X = 1]&lt;/em&gt; : no matter how ready they are to believe him.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;That no individual should be assigned more than one identifier is an entirely evident desideratum: so the process of comparing the signatures of a fresh applicant to those already recorded must be a strict one. But the process of comparison should also make it very likely that, when a match of signatures does occur, the applicant is someone who has in fact been registered already. The chance that a genuinely new applicant’s signatures will match some already recorded suite should be very small: the proportion of such mistaken matches, among all matches, should be as low as possible. This proportion is usually denoted by &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; : the &lt;em&gt;conditional probability&lt;/em&gt; that &lt;em&gt;X = 0&lt;/em&gt; given that &lt;em&gt;Y = 1&lt;/em&gt; : the chance that, despite a match of signatures, the applicant has not in fact been registered already. The defining formula:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h4.jpg/image_preview" alt="h4" class="image-inline image-inline" title="h4" /&gt;&lt;/p&gt;
&lt;p&gt;relates this conditional probability to the ‘absolute’ or ‘raw’ probabilities of the events &lt;em&gt;[Y = 1]&lt;/em&gt; and&lt;em&gt; [X = 0 and Y = 1]&lt;/em&gt; ; the second of which is sometimes said to be &lt;em&gt;contained&lt;/em&gt; in the first.&lt;/p&gt;
&lt;p&gt;Suppose that there have been N applicants thus far. It is usual to say N trials of X and Y have occurred; but only the outcomes for Y are known. Suppose that matches have been found some m times out of these N ; then N − m applicants will have been registered. With regard to these trials, set&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h5.jpg/image_preview" alt="h5" class="image-inline image-inline" title="h5" /&gt;&lt;/p&gt;
&lt;p&gt;Note that these numbers are not individually known; but as the specified events exhaust the possibilities, we have &lt;em&gt;c 00 +c 01 +c 10 +c 11 = N&lt;/em&gt; ; and we do know that&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h6.jpg/image_preview" alt="h6" class="image-inline image-inline" title="h6" /&gt;&lt;/p&gt;
&lt;p&gt;The ratio &lt;em&gt;m/N&lt;/em&gt; would be a reasonable estimate of &lt;em&gt;p[Y = 1]&lt;/em&gt; ; and &lt;em&gt;(N − m)/N&lt;/em&gt; a reasonable estimate of &lt;em&gt;p[Y = 0] = 1 − p[Y = 1]&lt;/em&gt; likewise. The quantity we are seeking is &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; however: of which the ratio &lt;em&gt;c 01/m&lt;/em&gt; would be a natural estimate. But unless we have some sense of the relative magnitudes of&lt;em&gt; c 01&lt;/em&gt; and &lt;em&gt;c 11&lt;/em&gt; the quantity&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h7.jpg/image_preview" alt="h7" class="image-inline image-inline" title="h7" /&gt;&lt;/p&gt;
&lt;p&gt;could be anything between 0 and 1 now. To estimate the relative magnitudes of &lt;em&gt;c 01&lt;/em&gt; and &lt;em&gt;c 11&lt;/em&gt; in any direct way would be difficult, because one has no purchase on how likely the events &lt;em&gt;[X = 0 &amp;amp; Y = 1]&lt;/em&gt; or &lt;em&gt;[X = 1 &amp;amp; Y = 1]&lt;/em&gt; are. So &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; must be estimated directly, it would seem; and we shall come back to the question.&lt;/p&gt;
&lt;p&gt;The reply we have received from the UIDAI indicates that 2.59 × 107 registrations — or successful ‘enrolments’, as they have put it — had been effected by 17.08.2011;while the ‘enrolments rejected’ came to 2.005 × 103 they say. Enrolments were rejected when ‘residents were duplicates’: if we take this to mean that an applicant was refused registry on account of his signatures matching some suite of signatures already recorded, then we may suppose that&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h8.jpg/image_preview" alt="h8" class="image-inline image-inline" title="h8" /&gt;&lt;/p&gt;
&lt;p&gt;The False Positive Identification Rate, or FPIR, is defined in that reply as the ratio of the number of the number of false positive identification decisions to the total number of enrolment transactions by unenrolled individuals : if by “unenrolled individual” we understand an applicant of whom [X = 0] actually obtains, then in our notation we have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h9.jpg/image_preview" alt="h9" class="image-inline image-inline" title="h9" /&gt;&lt;/p&gt;
&lt;p&gt;rather: which would be a natural estimate of p[X = 0 &amp;amp; Y = 1] now, and since&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h10.jpg/image_preview" alt="h10" class="image-inline image-inline" title="h10" /&gt;&lt;/p&gt;
&lt;p&gt;the ‘false postive identification rate’ thus construed could be bound, at least, if &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; itself could be. At any rate, this latter proportion seems to be the most pertinent one here: &lt;em&gt;p[X = 0 | Y = 1] &lt;/em&gt;is the conditional probability, of mistaken matches, that the UIDAI must strive to keep as low as possible.&lt;/p&gt;
&lt;p&gt;The reply from the UIDAI defines a false negative identification as an incorrect decision of a biometric system that an applicant for a UID, making no attempt to avoid recognition, has not been previously enrolled in the system, when in fact they have. One is at a loss to understand how the personnel of the UIDAI are to determine when an applicant is making no attempt to avoid recognition. Putting that aside, the False Negative Identification Rate or FNIR would now appear to be p[X = 1 | Y = 0] : the probability that, despite his or her signatures not matching any already recorded suite, an applicant has in fact already been registered: and with our notation&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h11.jpg/image_preview" alt="h11" class="image-inline image-inline" title="h11" /&gt;&lt;/p&gt;
&lt;p&gt;now. But &lt;em&gt;c 10&lt;/em&gt; cannot be reliably estimated, again, because one has no purchase on how likely &lt;em&gt;[X = 1 &amp;amp; Y = 0]&lt;/em&gt; is; and the conditional probability &lt;em&gt;p[X = 1 | Y = 0]&lt;/em&gt; will have to be estimated or bound in some direct way as well.&lt;/p&gt;
&lt;p&gt;The preceding paragraphs have asserted that, in order to estimate or effectively bound the identification rates being sought by the UIDAI, the conditional probabilities p[X = 0 | Y = 1] and p[X = 1 | Y = 0] will have to be addressed in some direct way: without any attempt to estimate the likelihoods of &lt;em&gt;[X = 0 &amp;amp; Y = 1]&lt;/em&gt; and &lt;em&gt;[X = 1 &amp;amp; Y = 0]&lt;/em&gt; by themselves, that is to say. There might be ways of reliably estimating these conditional probabilities; and the manufacturers of the devices that produce the signatures may have provided tight bounds on what they would be — when the devices are working properly, at least. But let us now consider how the UIDAI has elaborated on these rates.&lt;/p&gt;
&lt;p&gt;Their reply to our second question states that &lt;em&gt;the biometric service providers have to meet the following accuracy&lt;/em&gt; SLA’s for FPIR and FNIR:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h12.jpg/image_preview" alt="h 12" class="image-inline image-inline" title="h 12" /&gt;&lt;/p&gt;
&lt;p&gt;The condition of ‘non-duplication’ in the requirement (P) implies that the FPIR is being understood now as the formula in (†) above computes it: as an estimate of the conditional probability &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt;: since one already knows that &lt;em&gt;[X = 0]&lt;/em&gt; for each enrolment here. Such an estimate could be made if one had obtained a sample of suites of signatures from distinct individuals — where no two suites in the sample could have come from the same individual — and compared each suite to every other: the proportion of matches found would be an estimate of &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt; now.[&lt;a href="#2"&gt;2&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The ‘biometric service providers’ the UIDAI has contracted with are presumably able to perform such experiments accurately. But an estimate of &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt; will not, as we shall momentarily see, by itself readily yield a usable bound on &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; : on the crucial likelihood that, despite his or her suite of signatures matching a suite already recorded, an applicant has not in fact been registered.&lt;/p&gt;
&lt;p&gt;The condition “ONLY duplicate enrolments” in the requirement (N) implies that the FNIR is being understood as an estimate of the conditional probability &lt;em&gt;p[Y = 0 |X = 1]&lt;/em&gt; now: as one already knows that [X = 1] for each enrolment here. The biometric service providers should be able to estimate this probability as well. The FNIR as (‡) construes it is an estimate of &lt;em&gt;p[X = 1 | Y = 0]&lt;/em&gt; rather; but a usable bound for this likelihood is readily got from &lt;em&gt;p[Y = 0 |X = 1] &lt;/em&gt;now, for we may surely expect &lt;em&gt;p[X = 1] &amp;lt; p[Y = 0]&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Let us see if the requirement (P) will yield any usable upper bound on the crucial likelihood &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt;: which, to note it again, is what the UIDAI must seek to minimise. Consider the consequences when the FPIR is understood as (P) envisages. Taken together with formula (1) above we have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h13.jpg/image_preview" alt="h13" class="image-inline image-inline" title="h13" /&gt;&lt;/p&gt;
&lt;p&gt;If we are not willing to wager on any upper limit appreciably less than 1 for p[X = 0] , we obtain&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_h12.jpg/image_preview" alt="h 12" class="image-inline" title="h 12" /&gt;&lt;/p&gt;
&lt;p&gt;now.[&lt;a href="#3"&gt;3&lt;/a&gt;] Unless one can reasonably suppose that the event&lt;em&gt; [Y = 1]&lt;/em&gt; never occurs, one must grant that &lt;em&gt;p[Y = 1] &amp;gt; 0&lt;/em&gt; . We have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h15.jpg/image_preview" alt="h15" class="image-inline image-inline" title="h15" /&gt;&lt;/p&gt;
&lt;p&gt;But this inequality yields a usable upper bound only when K &amp;lt; 3: only when K is 1 or 2 that is. In either case, only by supposing that p[Y = 1] &amp;gt; 10−2 will the accuracy mandated for the FPIR by the UIDAI yield a usable upper bound on p[X = 0 | Y = 1] . Since the UIDAI expects that p[Y = 1] &amp;lt; 10−2 surely, we must conclude now that the requirements it has imposed on its ‘biometric service providers’ will not help its personnel estimate an upper limit for the crucial likelihood that, despite his or her suite signatures matching some already recorded suite, an applicant for a UID has not in fact been registered already: which likelihood, to insist again, is what the UIDAI must seek to minimise.&lt;/p&gt;
&lt;p&gt;The argument just made will seem perverse: but the calculation is perfectly general. Suppose an FPIR limit of 10−J is mandated; then, unless one is willing to wager an upper limit on p[X = 0] , one cannot get a usable upper bound on p[X = 0 | Y = 1] from this limit on the FPIR, used all by itself, unless one supposes that p[Y = 1] &amp;gt; 10−J+1.&lt;/p&gt;
&lt;p&gt;To save writing, denote by L01 the crucial likelihood p[X = 0 | Y = 1] ; and suppose that&amp;nbsp;&amp;nbsp; is some desired upper bound on L01 now. Assume that the FPIR achieved by a service provider is an accurate estimate of p[Y = 1 |X = 0] ; then from (1) we get&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h16.jpg/image_preview" alt="h16" class="image-inline image-inline" title="h16" /&gt;&lt;/p&gt;
&lt;p&gt;Now [X = 0] should not be a rare event at all, and, conversely, [Y = 1] should be a rare event.[&lt;a href="#4"&gt;4&lt;/a&gt;] So one should be able to set some reasonable upper limit to the ratio p[Y = 1]/ p[X = 0] : but without attempting any precise estimate, at all, of either individual probability. One may reasonably expect, for instance, that no more than one in a thousand applicants for a uid will already have been registered; and when p[X = 1] &amp;lt; 10−3 we will have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h17.jpg/image_preview" alt="h17" class="image-inline image-inline" title="h17" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h18.jpg/image_preview" alt="h18" class="image-inline image-inline" title="h18" /&gt;&lt;/p&gt;
&lt;p align="center" class="discreet"&gt;&lt;img src="https://cis-india.org/home-images/h19.jpg/image_preview" alt="h19" class="image-inline image-inline" title="h19" /&gt;&lt;/p&gt;
&lt;p&gt;from (3) above. This calculation can be repeated with any number m in place of 3 here, of course, provided p[X = 1] &amp;lt; 10−m and p[Y = 1] &amp;lt; 10−m are both likely; and it seems entirely reasonable, now, for the UIDAI to insist that its biometric service providers meet the requirement.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h20.jpg/image_preview" alt="h20" class="image-inline image-inline" title="h20" /&gt;&lt;/p&gt;
&lt;p&gt;for some appropriate upper bound X on L01 . The considerations leading to (4) make it reasonable to insist on m _ 3 now; and recalling what L01 is — the crucial likelihood that, despite his or her signatures matching some already recorded suite of signatures, an applicant has not in fact been registered — the UIDAI will have to insist on some quite small bound X: for it would not want, too often, to refuse anyone a UID on account of a mistaken match of biometric signatures.[&lt;a href="#6"&gt;6&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;It would be foolish to speculate on what the authorities regard as acceptable error here; but if the UIDAI is of a mind that such mistakes should happen less than one in a thousand times say, then, taking the minimal value of 3 for m in the suggested requirement (R), it should demand an FPIR less than 10−6 : a ‘false positive identification rate’ a thousand-fold less than the limit currently imposed.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]Should it seem entirely odd to talk of probability when one of the events in question — either&lt;em&gt; [X = 0]&lt;/em&gt; or&lt;em&gt; [X = 1]&lt;/em&gt; — will already have occurred, we may regard the probabilities we assign them as measures of our uncertainty only: but no practical question hinges on probabilities being understood ‘subjectively’ rather than ‘objectively’.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]It might be well to note, however, that the size of the sample must be manageable: for a sample of size K a total of K • (K − 1)/2 comparisons will have to be performed.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]Wagering an upper limit on p[X = 0] would require one to reasonably estimate the probability of finding already-registered individuals among applicants.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]The event [Y = 1] must be just as rare, one supposes, as [X = 0] is frequent.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;[5]We are supposing, that is to say, that matches of biometic signatures are very rarely mistaken matches.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;[6]A small _ is consistent with supposing that p[X = 1] and p[Y = 1] are commensurate probabilites. If p[X = 0 | Y = 1] &amp;lt; 10−3 for instance, then p[X = 1 | Y = 1] _ (103 − 1)/103 ; one may suppose, that is, that [X = 1] will be the case 999 out of a 1000 times that [Y = 1] obtains; and, of course, to suppose that [X = 1] will be appreciably more frquent than [Y = 1] is to grant that biometric signatures will fail appreciably often to distinguish individuals.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;strong&gt;&lt;a href="https://cis-india.org/internet-governance/blog/rti-application-june-2011.pdf" class="internal-link" title="RTI Application, 30 June 2011"&gt;See the RTI application of 30/06/2011&lt;/a&gt;&amp;nbsp;[PDF, 15 kb].&lt;/strong&gt;&lt;a name="6"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the Seventh Open Letter &lt;a href="https://cis-india.org/internet-governance/blog/seventh-open-letter.pdf" class="internal-link" title="Seventh Open Letter to the Finance Committee"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers'&gt;https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-22T07:28:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/hacking-cis">
    <title>Hack Night in CIS ― A Meeting of Java Script Hackers</title>
    <link>https://cis-india.org/internet-governance/hacking-cis</link>
    <description>
        &lt;b&gt;CIS hosted a hack night in conjunction with the tech-event organizers HasGeek at its office on 24 September 2011. The event brought together local java script hackers on a common platform. Tom Dane and Kiran Jonnalagadda participated in the event. &lt;/b&gt;
        
&lt;p&gt;The idea behind hosting the event was to have fun building cool stuff. The participants met in the afternoon to decide on projects and group into teams, and then&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/sudarmuthu"&gt;Sudar Muthu&lt;/a&gt;&amp;nbsp;gave an&amp;nbsp;&lt;a href="http://www.youtube.com/watch?v=t8BVYn6vS5g&amp;amp;feature=related" target="_blank"&gt;explanation of node.js&lt;/a&gt;&amp;nbsp;and its usage for the hack. There were also some very cool free t-shirts.&amp;nbsp;Much code was written and caffeine shared until the morning when the projects were uploaded online.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;One project was a game allowing players to pass a ball between computers. The source code is available&amp;nbsp;&lt;a href="https://github.com/sudar/pass-the-ball" target="_blank"&gt;here&lt;/a&gt;&amp;nbsp;on GitHub.&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/netroy"&gt;Aditya Yadav&lt;/a&gt;&amp;nbsp;also worked on the beautiful&amp;nbsp;&lt;a href="http://jsfoo.hasgeek.com/" target="_blank"&gt;jsFoo website&lt;/a&gt;&amp;nbsp;during the night.&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Our friends from&amp;nbsp;HasGeek made a short video showing a snippet of the event:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;iframe src="http://www.youtube.com/embed/D6p3K8XgTzQ" frameborder="0" scrolling="auto" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;
&lt;div&gt;Below is the full list of participants:&lt;br /&gt;&amp;nbsp;&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/jace"&gt;Kiran&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/jackerhack"&gt;Jonnalagadda&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/netroy"&gt;Aditya&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/netroy"&gt;Yadav&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/ritehs85"&gt;Ritesh Kadmawala&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/prakash122"&gt;MS Prakas Kumar Chakka&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Amarjit Singh&lt;/li&gt;&lt;li&gt;Arun Kumar&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/sudar"&gt;Sudar&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="https://twitter.com/#!/sudarmuthu"&gt;Muthu&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/aravindavk"&gt;Aravinda&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/aravindvk"&gt;VK&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/ciju"&gt;Ciju&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/ciju"&gt;Cherian&lt;/a&gt;&amp;nbsp;and&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/caulagi"&gt;Pradip&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/caulagi"&gt;Caulagi&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;If you feel sad missing an event like this, be excited because HasGeek is hosting&amp;nbsp;&lt;a class="external-link" href="http://droidcon.in/"&gt;Droidcon&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://funnel.hasgeek.com/droidcon/"&gt;India&lt;/a&gt;&lt;a href="http://droidcon.in/" target="_blank"&gt;&amp;nbsp;&lt;/a&gt;next month.&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;pre&gt;About Hasgeek&lt;/pre&gt;
&lt;div&gt;HasGeek is a developer-led initiative, and has been un-organising the unconference scene since 2010. HasGeek is an attempt to solve the problem of insipid conferences organised around buzzwords by uninterested, soulless corporate entities who pitch them as company training events or as places for companies to pick up hot developers.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;For more info on Hasgeek, &lt;a class="external-link" href="http://jsfoo.hasgeek.com/2011-pune/#about-hasgeek"&gt;click here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;For info on jsFoo, &lt;a class="external-link" href="http://jsfoo.hasgeek.com/2011-pune/#about-event"&gt;click here&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a class="external-link" href="http://jsfoo.hasgeek.com/2011-pune/#about-event"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/hacking-cis'&gt;https://cis-india.org/internet-governance/hacking-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tom Dane</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-27T11:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers">
    <title>UID: Questions without Answers – A Talk by Usha Ramanathan </title>
    <link>https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers</link>
    <description>
        &lt;b&gt;UID enrolment is in full swing, providing an official identification to millions of Indians, yet there are numerous unanswered questions. A public talk on UID was held at the Institute of Science, Bangalore on September 6, 2011. Usha Ramanathan, an independent law researcher on jurisprudence, poverty and rights, discussed the questions that plague the UID project and the veil of silence enveloping the answers.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Ms. Ramanathan
began her presentation by describing the progress and evolution of the UID
project. She stated three adjectives that reflect the target goal of the Unique
Identification Authority of India (UIDAI): unique, ubiquitous and universal.
She demonstrated how their initial objectives and claims have been drastically
altered in three major ways.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;First and
foremost, the UIDAI claimed that enrolment is voluntary, not mandatory, and
hence, inclusive. Yet, Nandan Nilekani has
consistently maintained that other agencies may make it compulsory.
UID is becoming ubiquitous and is a prerequisite for access to a wide variety
of welfare schemes and services such as PDS, MGNREGS, banks, public health,
etc. It is thus clear that this could
actually exclude those who do not have a number or whose biometrics&amp;nbsp;doesn't&amp;nbsp;work. Therefore, this undermines the inclusive nature of the project.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Second, the
UIDAI claimed that the UID would enable inclusive growth. Ms. Ramanathan expressed a
serious concern surrounding the risk of exclusion. Instead of facilitating
inclusion, around two to five per cent of the Indian population would be
excluded from the current process of authentication and potentially from having
a UID number, as they do not have viable biometric data.&lt;a name="_ftnref" href="#_ftn1"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/a&gt;&amp;nbsp; Physical or visual impairments such as corneal blindness, corneal scars, and
malnourishment induced cataracts or ‘low-quality’ fingerprints from a lifetime
of hard labour inhibit those from providing valid fingerprints or iris scans.&lt;a name="_ftnref" href="#_ftn2"&gt;&lt;span class="MsoFootnoteReference"&gt;[2]&lt;/span&gt;&lt;/a&gt;
&lt;u&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Third, Ms. Ramanathan reiterated that
the &lt;a class="external-link" href="http://www.prsindia.org/uploads/media/NIA%20Draft%20Bill.pdf"&gt;National Identification Authority India Bill &lt;/a&gt;prohibited sharing data, except by the consent of the resident, by
a court order or for national security. However, UID information is being directly fed into the National Intelligence Grid
(NATGRID) who will then provide information about people that is in 21
databases, to eleven security agencies, including the RAW and IB over which
there is no superintendence or oversight.&lt;a name="_ftnref" href="#_ftn3"&gt;&lt;span class="MsoFootnoteReference"&gt;[3]&lt;/span&gt;&lt;/a&gt; She
discussed the high likelihood of a breach of privacy as there are insufficient
standards protecting an individual from unlawful invasion. Additionally, the
UIDAI does not have mechanisms in place for an individual to be notified if there
is a data breach.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;u&gt;Who owns this project?&lt;/u&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A very important question asked is, “Who owns this project?” Ms.
Ramanathan stated that the convergence of information especially during the
‘de-duplication process clearly reflects the corporatization of the project.
She also questioned the background of some of the technological companies
involved. For instance, L-1 Identity
Solutions is well known for its links with the CIA. Additionally, Accenture is
on a Smart Borders project with US Homeland Security. She explained that ownership also plays into the
feasibility and financial cost of the project. Furthermore, the UIDAI has not
conducted a
feasibility study on the technology or the financial cost of the project.&lt;/p&gt;
&lt;h3&gt;&lt;u&gt;International Experience&lt;/u&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Lastly, Ms. Ramanathan discussed the international experience of a
universal identity system. In the United Kingdom, their universal system of
identification was labelled as ‘intrusive bullying’ as well as ‘an assault on personal
liberties’.&amp;nbsp; The United States and the United Kingdom both abandoned a
universal identity system, as it was impractical, unjustified and dangerous.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Ms. Ramanathan raised many questions that evoked thought and discussion from the
audience. She provided numerous examples of ambiguity, misconceptions and confusion
surrounding the UID project.&amp;nbsp; She urged the audience to exercise their civil
liberties or risk losing them. Lastly, she believed that an informed debate
involving the UIDAI and the public is long overdue.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The UIDAI must clarify misconception and provide detailed answers to
crucial questions, as there is a lack of understanding within the general
population about the UID. Therefore, the UIDAI and the Government of India must
increase and ensure transparency of the UID project”, she added.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Ms. Usha Ramanathan was speaking at an event&amp;nbsp;organised by Concern, an IISc Student group. She was speaking in her personal capacity and the opinions reflected above are necessarily not those of CIS.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/a&gt; Biometrics Design Standards for UID
Applications (December 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[2]&lt;/span&gt;&lt;/a&gt; Biometrics Design Standards
for UID Applications (December 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn"&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[3]&lt;/span&gt;&lt;/a&gt;Usha Ramanathan, The Myth of the Technology Fix, http://www.india-seminar.com/2011/617/617_usha_ramanathan.htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;iframe src="http://blip.tv/play/AYLRySYA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLRySYA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers'&gt;https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-24T04:41:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/understanding-right-to-information">
    <title>Understanding the Right to Information</title>
    <link>https://cis-india.org/internet-governance/understanding-right-to-information</link>
    <description>
        &lt;b&gt;Elonnai Hickok summarises the Right to Information Act, 2005, how it works, how to file an RTI request, the information that an individual can request under the Act, the possible responses and the challenges to the citizen and the government. She concludes by saying that there are many structural changes that both citizens and governmental officers can make to improve the system.&lt;/b&gt;
        &lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://righttoinformation.gov.in/webactrti.htm"&gt;Right to Information Act, 2005&lt;/a&gt; (RTI) was created in 2005 and marked an important time in Indian legislative history. The Right to Information enables citizens to hold the government accountable and ensure that it is a transparent body. Questions that can be asked by the citizen to the government range from anything that may concern to some meeting notes to why a teacher is not present in a public school, etc. In the current RTI system there are many challenges that are inhibiting the government’s efficient delivery of the RTI as a service to the people. This has changed the concept of how the citizens view the RTI, as the government feels harassed and the citizens feel as though their rights are being unjustly denied. Additionally, individuals have turned the RTI into a redressal mechanism rather than a way to ensure transparency and learn/understand how their government is functioning. The use of the RTI as a redressal mechanism has created a relationship of animosity between the government and citizens. The below note outlines the ecosystem of the RTI and notes specific challenges that both citizens and the government face.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;h2&gt;The RTI Ecosystem&lt;/h2&gt;
&lt;h3&gt;RTI work flow&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;An individual files an RTI with the central/ state public information officer (PIO) or a specific PIO. PIOs are often not trained, and rarely apply for the position, but are instead designated.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Within five days the information is to be forwarded to the correct PIO.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The PIO must open a file and dispose of the request within 30 days. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If the PIO fails to reply to the applicant by either approving or denying a request, the PIO is liable to pay a fine of Rs. 250 for each day of delay. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If information is electronically uploaded, it is stored in any format the officer chooses (jpeg, pdf, html, etc).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Except for land records and staff records, files are retained for a maximum of one year. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If the PIO does not dispose of the request, there is scope for an appeal within 30-45 days to the appellate authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There is scope for a second appeal to the information commissioner if the authority does not respond within 90 days or the answer is found to be unsatisfactory. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The final decision of the information commissioner is binding. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Filing an RTI request&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;Though there is no specific format an individual must follow when submitting an RTI, when filing a request, individuals must include:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;His /her name and address.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The name and address of the public information officer (PIO).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The particulars of information/documents required (limited to 150 words and one subject matter).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The time period of the information required.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proof of payment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Signature.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proof if the individual is a BPL holder.[&lt;a href="#2"&gt;2&lt;/a&gt;] &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Information that an individual can request under the RTI Act&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Inspection of work, documents, and records&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Taking notes, extracts or certified copies of documents or records.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Taking certified samples of material.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obtaining of information in the form of diskettes, floppies, tapes, and video cassettes, or in any other electronic mode, or through printouts where such information is stored in a computer, or in any other device.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obtaining the status of an RTI request or complaint.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Note: If an individual is requesting third party information, the PIO must inform the third party and provide the individual the opportunity to state a reason for not disclosing the information.&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;Accepted format of requested materials and records&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Material requested can be in any format including: records, documents, memos, emails, opinions, advices, press releases, circulars, orders, logbooks, contracts, reports, papers, samples, models, and data material held in any electronic form.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Records requested can include: any document, manuscript and file, any microfilm, microfiche and facsimile copy of a document, and reproduction of image or images embodied in such microfilm (whether enlarged or not), and any other material produced by a computer or any other device.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Possible Responses to an RTI request&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;b&gt;An information officer can respond to an RTI in the following ways&lt;/b&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Transfer request to appropriate PIO within five days and notify the applicant about the transfer.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provide the requested information within 30 days.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reject the request information within 30 days stating the reasons for rejection, the period within which an appeal against such rejection may be preferred, and the details of the appellate authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Not respond to the applicant. If no response is received within 30 days the officer is liable for a penalty of Rs. 250 per day.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Appeal/Complaint Process&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;First appeal can be filed after 30 days or if the information given was unsatisfactory. The appeal must include: name and address of the appellant, name and address of the PIO involved, brief facts leading to appeal, relief sought, grounds for appeal, and copies of the application or documents involved, including copies of the reply, if received from the PIO.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Second appeal must contain: name and address of the applicant, and name and address of the PIO involved, particulars of the Order including the number if any against which the appeal is preferred, brief facts leading to the appeal, if appeal/complaint is preferred against deemed refusal then the particulars of the application, including number and date and name, address of the PIO to whom the  application was originally made, relief sought, grounds for the relief, verification by the applicant, any other information which the commission may deem necessary for deciding during the appeal, self attested copies of the application or documents involved, copies of the documents relied upon by the appellant and referred to in the appeal, and an index of the documents referred to in the appeal.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A complaint must include: name and address of the complainant, name and address of the state PIO against whom the complaint is being made, facts leading to the complaint, particulars of the application [number, date, name and address of the PIO (three copies)], relief sought, grounds and proof for relief, verification of the complainant (three copies), index of documents referred to in the complaint, and any other necessary information.[&lt;a href="#3"&gt;3&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h2&gt;Challenges to the Citizen&lt;/h2&gt;
&lt;h3&gt;Knowing the correct Public Information Officer&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Knowing which public information officer to mail in the RTI request is the first difficulty that an individual faces. As noted above in 2008 there were a total of 73,256 recorded public information commissioners in the State of Karnataka. New public information commissioners are created every day, because the RTI extends not only to any department of the government, but to any sub-contracted company, organization, school, or NGO that is receiving government funding and doing work on behalf of the government directly or indirectly. Lists of PIOs can be found on department bulletin boards and websites, but there is no clear method for an individual to know what information each PIO is the custodian over. Thus, they are left to determine on their own, and rely on the PIO to forward their application to the correct individual.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Filing in the correct format&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Though it is stated in the law what language an RTI request will be accepted in, and what information should be included – individuals are often unaware of the guidelines and unaware of how to correctly fill out an RTI request. An incorrectly formatted request is one of the major reasons for rejection of a request by the PIO.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Language&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In the State of Karnataka, RTIs can be filed only in two languages: Kannada and English. By law, RTI responses are given only in the language that the department works in on a daily basis, and in English. The information that is supplied through the request is given in its original language. For example, if you ask for a document that is originally in Marathi, the document will be photo copied and sent to you. No translation of documents takes place, because it is not the job function of the officer to translate documents.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Appeals&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;If an individual is denied information, or does not receive a reply within 30 days, they have the option of seeking an appeal through an appellate authority. In 2008 Karnataka had 5416 Appellate Authorities.  Currently, because of the backlog in appeal cases and the slow functioning of the system, an individual might have to wait for upto one year for his/her appeal to be heard. Often at this point the information is no longer relevant or needed.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In some cases individuals are denied a request for information based on the grounds that it would invade the privacy of the public officer. This is sometimes the case and sometimes not the case. Finding the right balance between the right to information and privacy is important, as protecting an individual’s privacy is crucial, but privacy should not be used as a reason for the government to be less transparent to the citizen and be used as a way to deny a citizen the information that they are entitled to.[&lt;a href="#4"&gt;4&lt;/a&gt;]&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;Challenges in the RTI System for the Government&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Too many RTI requests and no system to record duplicates&lt;/b&gt;: As the figure shows above, in 2008, the Karnataka Government received 42208 RTI requests. Currently, it is not possible to know how many of these requests were duplicates since departments handling RTIs do not make it a practice to upload and organize filed RTI requests in a format easily accessible to citizens. Thus, there is no present system in place to track, upload, and store past RTI's in a meaningful way.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Additional overhead in recording, organizing, accessing, and storing data&lt;/b&gt;: In the current system every time an RTI request is received by the government, they open a new file for that request. Though in some ways this system of storage simplifies the process of finding past RTIs, it adds an additional overhead cost as photocopies must be made, new files created, and correctly added to the organized system. Each state follows its own method of recording, organizing, accessing, and storing data – thus, currently it is not possible to easily access the information from another state or combine information from two separate states.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Lack of compliance with section 4(d) pro-active disclosure&lt;/b&gt;: Under section 4 (d), the government is required to pro-actively disclose a pre-determined data to the public via websites and other useful modes. Currently there is very little compliance with section 4(d) from governmental departments. There are many factors that contribute to the low rate of compliance that exist including lack of resources and lack of proper enforcement. If governmental departments were to comply with section 4(d) then the load of RTI requests and the time each request must take to answer could be lightened considerably as the government could respond by pointing citizens to the already disclosed information. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;div style="text-align: justify; "&gt;Though the Right to Information is an important right, the above entry looks at some of the weaknesses and challenges in the system. There are many structural changes that both citizens and governmental officers can make to improve the system such as pro-actively disclosing information, ensuring that an RTI is filed correctly, and creating a system for organizing previously asked questions. Alongside of these structural changes it is also critical that a positive culture of transparency and accountability is fostered throughout society, thus encouraging citizens to actively engage with the government and exercise their right to information.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].I am grateful to N. Vikram Simha, RTI activist, for his insight and feedback into the RTI system.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].N. Vikram Simha, Right to Information Act of 2005: Guide for Citizens.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].N. Vikram Simha, Right to Information: Trend Ahead. Karanataka State Chartered Accountants Association, Bangalore&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].N. Vikram Simha, RTI and Protection of Individual Privacy&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/understanding-right-to-information'&gt;https://cis-india.org/internet-governance/understanding-right-to-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-12T11:39:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
