<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2721 to 2735.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/hacking-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/understanding-right-to-information"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/igf-remote-participation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/netizen-guide-to-igf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ibsa-seminar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/social-media-masks-forgotten-protests"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/digital-divide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/revolutions-viral"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/net-gain"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/workshop-rsa-encryption"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2011-bulletin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid">
    <title>SCOSTA and UID Comparison not Valid, says Finance Committee</title>
    <link>https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid</link>
    <description>
        &lt;b&gt;The Standing Committee on Finance Branch, Lok Sabha Secretariat has responded to the suggestions offered by CIS on the National Identification Authority of India, Bill 2010 and has requested it to mail its views by 14 October 2011.&lt;/b&gt;
        
&lt;p&gt;On January 6, 2011, CIS had sent an &lt;a href="https://cis-india.org/internet-governance/blog/blog/privacy/letter-to-finance-committee" class="external-link"&gt;open letter to the Parliamentary Finance Committee&lt;/a&gt; demonstrating how the Aadhaar biometric standard is weaker than the SCOSTA standard. The text of the reply is reproduced below.&lt;/p&gt;
&lt;p&gt;Sir,&lt;/p&gt;
&lt;p&gt;This is in response to one of the views/suggestions offered by CIS on the National Identification Authority of India Bill, 2010.&lt;/p&gt;
&lt;h3&gt;CIS View /Suggestion:&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;"Though the Aadhaar biometrics are useful for the de-duplication and identification of individuals, the Smart Card Operating System for Transport Application [(SCOSTA), developed by the National Informatics Centre in India)] standard is a more secure, structurally sound, and cost-effective approach to authentication of identity for India. Therefore, the Aadhaar biometric based authentication process should be replaced with a SCOSTA standard based authentication process."&lt;/p&gt;
&lt;p&gt;In this regard, do you agree with the following view? If not, please justify.&lt;/p&gt;
&lt;p&gt;"Comparison between SCOSTA and the UID project are not valid since SCOSTA is fundamentally a standard for smart card based authentication and does not work for the objectives of the unique id project.&lt;/p&gt;
&lt;p&gt;The UID project follows a different approach and has multiple objectives — providing identity to residents of India, ensuring inclusion of poor and marginalized residents in order to enable access to benefits and services, eliminating the fakes, duplicates and ghost identities prevalent in other databases and provide a platform for authentication in a cost effective and accessible manner.&lt;/p&gt;
&lt;p&gt;UIDAI is not issuing cards or smart cards. Cards can be issued by agencies that are providing services. UID authentication does not exclude smart cards — service providers can still choose to issue smart&amp;nbsp;cards to their beneficiaries or customers if they want to."&lt;/p&gt;
&lt;p&gt;You are requested to email your view by 14 October, 2011 positively.&lt;/p&gt;
&lt;p&gt;Standing Committee on Finance Branch&lt;br /&gt;Lok Sabha Secretariat&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid'&gt;https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-22T16:37:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers">
    <title>Seventh Open Letter to the Finance Committee: A Note on the Deduplication of Unique Identifiers </title>
    <link>https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers</link>
    <description>
        &lt;b&gt;Sahana Sarkar on behalf of the Centre for Internet and Society (CIS) had sent in a Right to Information application on 30 June 2011 to Ashish Kumar, Central Public Information Officer, UIDAI. The UIDAI sent in its reply. Through the seventh open letter, Hans attempts to characterize in an abstract way the replies that CIS managed to elicit and makes some elementary observations.&lt;/b&gt;
        The UIDAI records one or more biometric &lt;em&gt;signatures&lt;/em&gt; of those individuals to whom it assigns its &lt;em&gt;unique identity&lt;/em&gt; or &lt;em&gt;identifier&lt;/em&gt; ; and for convenience let us call this the process of &lt;em&gt;registering an applicant&lt;/em&gt;. In the normal course of registration the signatures of an applicant will be compared to those already recorded; and the outcomes of this exercise of comparing suites of biometric signatures — fingerprints and iris-scans, say — may be regarded as the values of a binary variable:
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h1.jpg/image_preview" alt="h1" class="image-inline image-inline" title="h1" /&gt;&lt;/p&gt;
&lt;p&gt;With more than one signature, we have Y = 1 only when those of the applicant match the signatures in some other suite of such item by item; and Y = 0 then if at least one of his or her signatures fails to match any already recorded one.&lt;/p&gt;
&lt;p&gt;Though the circumstance should be unlikely, a person who has already been registered may apply again to be registered: with fraudulent intent maybe: or simply because he or she has lost the document – some identity card, perhaps – which bears the identifier assigned to him or her by the UIDAI. And the possibilities here may be regarded as the values of a binary variable:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h2.jpg/image_preview" alt="h2" class="image-inline image-inline" title="h2" /&gt;&lt;/p&gt;
&lt;p&gt;Though we are regarding X and Y as variables equally, and taking them for&lt;em&gt; jointly distributed&lt;/em&gt; ones, there is an evident asymmetry between them. The exercise of trying to match a given suite of signatures to some set of other suites can be performed so long as the signatures remain available; but for a given applicant the values of X refer to events already past. Faced with an applicant of whom they may suppose no more than what he or she may disclose, the personnel of the UIDAI &lt;em&gt;cannot directly estimate&lt;/em&gt; either of the two quantities:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h3.jpg/image_preview" alt="h3" class="image-inline image-inline" title="h3" /&gt;&lt;/p&gt;
&lt;p&gt;We have &lt;em&gt;p[X = 0] + p[X = 1] = 1&lt;/em&gt; here, needless to say, so there is only one quantity that needs estimating. But it is worth emphasizing that even when an applicant declares himself to have been registered already— and has come, say, to have a lost card newly issued — the personnel of the UIDAI are obliged to remain agnostic about &lt;em&gt;p[X = 1]&lt;/em&gt; : no matter how ready they are to believe him.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;That no individual should be assigned more than one identifier is an entirely evident desideratum: so the process of comparing the signatures of a fresh applicant to those already recorded must be a strict one. But the process of comparison should also make it very likely that, when a match of signatures does occur, the applicant is someone who has in fact been registered already. The chance that a genuinely new applicant’s signatures will match some already recorded suite should be very small: the proportion of such mistaken matches, among all matches, should be as low as possible. This proportion is usually denoted by &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; : the &lt;em&gt;conditional probability&lt;/em&gt; that &lt;em&gt;X = 0&lt;/em&gt; given that &lt;em&gt;Y = 1&lt;/em&gt; : the chance that, despite a match of signatures, the applicant has not in fact been registered already. The defining formula:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h4.jpg/image_preview" alt="h4" class="image-inline image-inline" title="h4" /&gt;&lt;/p&gt;
&lt;p&gt;relates this conditional probability to the ‘absolute’ or ‘raw’ probabilities of the events &lt;em&gt;[Y = 1]&lt;/em&gt; and&lt;em&gt; [X = 0 and Y = 1]&lt;/em&gt; ; the second of which is sometimes said to be &lt;em&gt;contained&lt;/em&gt; in the first.&lt;/p&gt;
&lt;p&gt;Suppose that there have been N applicants thus far. It is usual to say N trials of X and Y have occurred; but only the outcomes for Y are known. Suppose that matches have been found some m times out of these N ; then N − m applicants will have been registered. With regard to these trials, set&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h5.jpg/image_preview" alt="h5" class="image-inline image-inline" title="h5" /&gt;&lt;/p&gt;
&lt;p&gt;Note that these numbers are not individually known; but as the specified events exhaust the possibilities, we have &lt;em&gt;c 00 +c 01 +c 10 +c 11 = N&lt;/em&gt; ; and we do know that&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h6.jpg/image_preview" alt="h6" class="image-inline image-inline" title="h6" /&gt;&lt;/p&gt;
&lt;p&gt;The ratio &lt;em&gt;m/N&lt;/em&gt; would be a reasonable estimate of &lt;em&gt;p[Y = 1]&lt;/em&gt; ; and &lt;em&gt;(N − m)/N&lt;/em&gt; a reasonable estimate of &lt;em&gt;p[Y = 0] = 1 − p[Y = 1]&lt;/em&gt; likewise. The quantity we are seeking is &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; however: of which the ratio &lt;em&gt;c 01/m&lt;/em&gt; would be a natural estimate. But unless we have some sense of the relative magnitudes of&lt;em&gt; c 01&lt;/em&gt; and &lt;em&gt;c 11&lt;/em&gt; the quantity&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h7.jpg/image_preview" alt="h7" class="image-inline image-inline" title="h7" /&gt;&lt;/p&gt;
&lt;p&gt;could be anything between 0 and 1 now. To estimate the relative magnitudes of &lt;em&gt;c 01&lt;/em&gt; and &lt;em&gt;c 11&lt;/em&gt; in any direct way would be difficult, because one has no purchase on how likely the events &lt;em&gt;[X = 0 &amp;amp; Y = 1]&lt;/em&gt; or &lt;em&gt;[X = 1 &amp;amp; Y = 1]&lt;/em&gt; are. So &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; must be estimated directly, it would seem; and we shall come back to the question.&lt;/p&gt;
&lt;p&gt;The reply we have received from the UIDAI indicates that 2.59 × 107 registrations — or successful ‘enrolments’, as they have put it — had been effected by 17.08.2011;while the ‘enrolments rejected’ came to 2.005 × 103 they say. Enrolments were rejected when ‘residents were duplicates’: if we take this to mean that an applicant was refused registry on account of his signatures matching some suite of signatures already recorded, then we may suppose that&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h8.jpg/image_preview" alt="h8" class="image-inline image-inline" title="h8" /&gt;&lt;/p&gt;
&lt;p&gt;The False Positive Identification Rate, or FPIR, is defined in that reply as the ratio of the number of the number of false positive identification decisions to the total number of enrolment transactions by unenrolled individuals : if by “unenrolled individual” we understand an applicant of whom [X = 0] actually obtains, then in our notation we have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h9.jpg/image_preview" alt="h9" class="image-inline image-inline" title="h9" /&gt;&lt;/p&gt;
&lt;p&gt;rather: which would be a natural estimate of p[X = 0 &amp;amp; Y = 1] now, and since&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h10.jpg/image_preview" alt="h10" class="image-inline image-inline" title="h10" /&gt;&lt;/p&gt;
&lt;p&gt;the ‘false postive identification rate’ thus construed could be bound, at least, if &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; itself could be. At any rate, this latter proportion seems to be the most pertinent one here: &lt;em&gt;p[X = 0 | Y = 1] &lt;/em&gt;is the conditional probability, of mistaken matches, that the UIDAI must strive to keep as low as possible.&lt;/p&gt;
&lt;p&gt;The reply from the UIDAI defines a false negative identification as an incorrect decision of a biometric system that an applicant for a UID, making no attempt to avoid recognition, has not been previously enrolled in the system, when in fact they have. One is at a loss to understand how the personnel of the UIDAI are to determine when an applicant is making no attempt to avoid recognition. Putting that aside, the False Negative Identification Rate or FNIR would now appear to be p[X = 1 | Y = 0] : the probability that, despite his or her signatures not matching any already recorded suite, an applicant has in fact already been registered: and with our notation&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h11.jpg/image_preview" alt="h11" class="image-inline image-inline" title="h11" /&gt;&lt;/p&gt;
&lt;p&gt;now. But &lt;em&gt;c 10&lt;/em&gt; cannot be reliably estimated, again, because one has no purchase on how likely &lt;em&gt;[X = 1 &amp;amp; Y = 0]&lt;/em&gt; is; and the conditional probability &lt;em&gt;p[X = 1 | Y = 0]&lt;/em&gt; will have to be estimated or bound in some direct way as well.&lt;/p&gt;
&lt;p&gt;The preceding paragraphs have asserted that, in order to estimate or effectively bound the identification rates being sought by the UIDAI, the conditional probabilities p[X = 0 | Y = 1] and p[X = 1 | Y = 0] will have to be addressed in some direct way: without any attempt to estimate the likelihoods of &lt;em&gt;[X = 0 &amp;amp; Y = 1]&lt;/em&gt; and &lt;em&gt;[X = 1 &amp;amp; Y = 0]&lt;/em&gt; by themselves, that is to say. There might be ways of reliably estimating these conditional probabilities; and the manufacturers of the devices that produce the signatures may have provided tight bounds on what they would be — when the devices are working properly, at least. But let us now consider how the UIDAI has elaborated on these rates.&lt;/p&gt;
&lt;p&gt;Their reply to our second question states that &lt;em&gt;the biometric service providers have to meet the following accuracy&lt;/em&gt; SLA’s for FPIR and FNIR:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h12.jpg/image_preview" alt="h 12" class="image-inline image-inline" title="h 12" /&gt;&lt;/p&gt;
&lt;p&gt;The condition of ‘non-duplication’ in the requirement (P) implies that the FPIR is being understood now as the formula in (†) above computes it: as an estimate of the conditional probability &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt;: since one already knows that &lt;em&gt;[X = 0]&lt;/em&gt; for each enrolment here. Such an estimate could be made if one had obtained a sample of suites of signatures from distinct individuals — where no two suites in the sample could have come from the same individual — and compared each suite to every other: the proportion of matches found would be an estimate of &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt; now.[&lt;a href="#2"&gt;2&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The ‘biometric service providers’ the UIDAI has contracted with are presumably able to perform such experiments accurately. But an estimate of &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt; will not, as we shall momentarily see, by itself readily yield a usable bound on &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; : on the crucial likelihood that, despite his or her suite of signatures matching a suite already recorded, an applicant has not in fact been registered.&lt;/p&gt;
&lt;p&gt;The condition “ONLY duplicate enrolments” in the requirement (N) implies that the FNIR is being understood as an estimate of the conditional probability &lt;em&gt;p[Y = 0 |X = 1]&lt;/em&gt; now: as one already knows that [X = 1] for each enrolment here. The biometric service providers should be able to estimate this probability as well. The FNIR as (‡) construes it is an estimate of &lt;em&gt;p[X = 1 | Y = 0]&lt;/em&gt; rather; but a usable bound for this likelihood is readily got from &lt;em&gt;p[Y = 0 |X = 1] &lt;/em&gt;now, for we may surely expect &lt;em&gt;p[X = 1] &amp;lt; p[Y = 0]&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Let us see if the requirement (P) will yield any usable upper bound on the crucial likelihood &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt;: which, to note it again, is what the UIDAI must seek to minimise. Consider the consequences when the FPIR is understood as (P) envisages. Taken together with formula (1) above we have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h13.jpg/image_preview" alt="h13" class="image-inline image-inline" title="h13" /&gt;&lt;/p&gt;
&lt;p&gt;If we are not willing to wager on any upper limit appreciably less than 1 for p[X = 0] , we obtain&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_h12.jpg/image_preview" alt="h 12" class="image-inline" title="h 12" /&gt;&lt;/p&gt;
&lt;p&gt;now.[&lt;a href="#3"&gt;3&lt;/a&gt;] Unless one can reasonably suppose that the event&lt;em&gt; [Y = 1]&lt;/em&gt; never occurs, one must grant that &lt;em&gt;p[Y = 1] &amp;gt; 0&lt;/em&gt; . We have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h15.jpg/image_preview" alt="h15" class="image-inline image-inline" title="h15" /&gt;&lt;/p&gt;
&lt;p&gt;But this inequality yields a usable upper bound only when K &amp;lt; 3: only when K is 1 or 2 that is. In either case, only by supposing that p[Y = 1] &amp;gt; 10−2 will the accuracy mandated for the FPIR by the UIDAI yield a usable upper bound on p[X = 0 | Y = 1] . Since the UIDAI expects that p[Y = 1] &amp;lt; 10−2 surely, we must conclude now that the requirements it has imposed on its ‘biometric service providers’ will not help its personnel estimate an upper limit for the crucial likelihood that, despite his or her suite signatures matching some already recorded suite, an applicant for a UID has not in fact been registered already: which likelihood, to insist again, is what the UIDAI must seek to minimise.&lt;/p&gt;
&lt;p&gt;The argument just made will seem perverse: but the calculation is perfectly general. Suppose an FPIR limit of 10−J is mandated; then, unless one is willing to wager an upper limit on p[X = 0] , one cannot get a usable upper bound on p[X = 0 | Y = 1] from this limit on the FPIR, used all by itself, unless one supposes that p[Y = 1] &amp;gt; 10−J+1.&lt;/p&gt;
&lt;p&gt;To save writing, denote by L01 the crucial likelihood p[X = 0 | Y = 1] ; and suppose that&amp;nbsp;&amp;nbsp; is some desired upper bound on L01 now. Assume that the FPIR achieved by a service provider is an accurate estimate of p[Y = 1 |X = 0] ; then from (1) we get&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h16.jpg/image_preview" alt="h16" class="image-inline image-inline" title="h16" /&gt;&lt;/p&gt;
&lt;p&gt;Now [X = 0] should not be a rare event at all, and, conversely, [Y = 1] should be a rare event.[&lt;a href="#4"&gt;4&lt;/a&gt;] So one should be able to set some reasonable upper limit to the ratio p[Y = 1]/ p[X = 0] : but without attempting any precise estimate, at all, of either individual probability. One may reasonably expect, for instance, that no more than one in a thousand applicants for a uid will already have been registered; and when p[X = 1] &amp;lt; 10−3 we will have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h17.jpg/image_preview" alt="h17" class="image-inline image-inline" title="h17" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h18.jpg/image_preview" alt="h18" class="image-inline image-inline" title="h18" /&gt;&lt;/p&gt;
&lt;p align="center" class="discreet"&gt;&lt;img src="https://cis-india.org/home-images/h19.jpg/image_preview" alt="h19" class="image-inline image-inline" title="h19" /&gt;&lt;/p&gt;
&lt;p&gt;from (3) above. This calculation can be repeated with any number m in place of 3 here, of course, provided p[X = 1] &amp;lt; 10−m and p[Y = 1] &amp;lt; 10−m are both likely; and it seems entirely reasonable, now, for the UIDAI to insist that its biometric service providers meet the requirement.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h20.jpg/image_preview" alt="h20" class="image-inline image-inline" title="h20" /&gt;&lt;/p&gt;
&lt;p&gt;for some appropriate upper bound X on L01 . The considerations leading to (4) make it reasonable to insist on m _ 3 now; and recalling what L01 is — the crucial likelihood that, despite his or her signatures matching some already recorded suite of signatures, an applicant has not in fact been registered — the UIDAI will have to insist on some quite small bound X: for it would not want, too often, to refuse anyone a UID on account of a mistaken match of biometric signatures.[&lt;a href="#6"&gt;6&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;It would be foolish to speculate on what the authorities regard as acceptable error here; but if the UIDAI is of a mind that such mistakes should happen less than one in a thousand times say, then, taking the minimal value of 3 for m in the suggested requirement (R), it should demand an FPIR less than 10−6 : a ‘false positive identification rate’ a thousand-fold less than the limit currently imposed.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]Should it seem entirely odd to talk of probability when one of the events in question — either&lt;em&gt; [X = 0]&lt;/em&gt; or&lt;em&gt; [X = 1]&lt;/em&gt; — will already have occurred, we may regard the probabilities we assign them as measures of our uncertainty only: but no practical question hinges on probabilities being understood ‘subjectively’ rather than ‘objectively’.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]It might be well to note, however, that the size of the sample must be manageable: for a sample of size K a total of K • (K − 1)/2 comparisons will have to be performed.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]Wagering an upper limit on p[X = 0] would require one to reasonably estimate the probability of finding already-registered individuals among applicants.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]The event [Y = 1] must be just as rare, one supposes, as [X = 0] is frequent.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;[5]We are supposing, that is to say, that matches of biometic signatures are very rarely mistaken matches.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;[6]A small _ is consistent with supposing that p[X = 1] and p[Y = 1] are commensurate probabilites. If p[X = 0 | Y = 1] &amp;lt; 10−3 for instance, then p[X = 1 | Y = 1] _ (103 − 1)/103 ; one may suppose, that is, that [X = 1] will be the case 999 out of a 1000 times that [Y = 1] obtains; and, of course, to suppose that [X = 1] will be appreciably more frquent than [Y = 1] is to grant that biometric signatures will fail appreciably often to distinguish individuals.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;strong&gt;&lt;a href="https://cis-india.org/internet-governance/blog/rti-application-june-2011.pdf" class="internal-link" title="RTI Application, 30 June 2011"&gt;See the RTI application of 30/06/2011&lt;/a&gt;&amp;nbsp;[PDF, 15 kb].&lt;/strong&gt;&lt;a name="6"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the Seventh Open Letter &lt;a href="https://cis-india.org/internet-governance/blog/seventh-open-letter.pdf" class="internal-link" title="Seventh Open Letter to the Finance Committee"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers'&gt;https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-22T07:28:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/hacking-cis">
    <title>Hack Night in CIS ― A Meeting of Java Script Hackers</title>
    <link>https://cis-india.org/internet-governance/hacking-cis</link>
    <description>
        &lt;b&gt;CIS hosted a hack night in conjunction with the tech-event organizers HasGeek at its office on 24 September 2011. The event brought together local java script hackers on a common platform. Tom Dane and Kiran Jonnalagadda participated in the event. &lt;/b&gt;
        
&lt;p&gt;The idea behind hosting the event was to have fun building cool stuff. The participants met in the afternoon to decide on projects and group into teams, and then&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/sudarmuthu"&gt;Sudar Muthu&lt;/a&gt;&amp;nbsp;gave an&amp;nbsp;&lt;a href="http://www.youtube.com/watch?v=t8BVYn6vS5g&amp;amp;feature=related" target="_blank"&gt;explanation of node.js&lt;/a&gt;&amp;nbsp;and its usage for the hack. There were also some very cool free t-shirts.&amp;nbsp;Much code was written and caffeine shared until the morning when the projects were uploaded online.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;One project was a game allowing players to pass a ball between computers. The source code is available&amp;nbsp;&lt;a href="https://github.com/sudar/pass-the-ball" target="_blank"&gt;here&lt;/a&gt;&amp;nbsp;on GitHub.&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/netroy"&gt;Aditya Yadav&lt;/a&gt;&amp;nbsp;also worked on the beautiful&amp;nbsp;&lt;a href="http://jsfoo.hasgeek.com/" target="_blank"&gt;jsFoo website&lt;/a&gt;&amp;nbsp;during the night.&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Our friends from&amp;nbsp;HasGeek made a short video showing a snippet of the event:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;iframe src="http://www.youtube.com/embed/D6p3K8XgTzQ" frameborder="0" scrolling="auto" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;
&lt;div&gt;Below is the full list of participants:&lt;br /&gt;&amp;nbsp;&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/jace"&gt;Kiran&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/jackerhack"&gt;Jonnalagadda&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/netroy"&gt;Aditya&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/netroy"&gt;Yadav&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/ritehs85"&gt;Ritesh Kadmawala&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/prakash122"&gt;MS Prakas Kumar Chakka&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Amarjit Singh&lt;/li&gt;&lt;li&gt;Arun Kumar&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/sudar"&gt;Sudar&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="https://twitter.com/#!/sudarmuthu"&gt;Muthu&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/aravindavk"&gt;Aravinda&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/aravindvk"&gt;VK&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/ciju"&gt;Ciju&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/ciju"&gt;Cherian&lt;/a&gt;&amp;nbsp;and&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/caulagi"&gt;Pradip&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/caulagi"&gt;Caulagi&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;If you feel sad missing an event like this, be excited because HasGeek is hosting&amp;nbsp;&lt;a class="external-link" href="http://droidcon.in/"&gt;Droidcon&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://funnel.hasgeek.com/droidcon/"&gt;India&lt;/a&gt;&lt;a href="http://droidcon.in/" target="_blank"&gt;&amp;nbsp;&lt;/a&gt;next month.&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;pre&gt;About Hasgeek&lt;/pre&gt;
&lt;div&gt;HasGeek is a developer-led initiative, and has been un-organising the unconference scene since 2010. HasGeek is an attempt to solve the problem of insipid conferences organised around buzzwords by uninterested, soulless corporate entities who pitch them as company training events or as places for companies to pick up hot developers.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;For more info on Hasgeek, &lt;a class="external-link" href="http://jsfoo.hasgeek.com/2011-pune/#about-hasgeek"&gt;click here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;For info on jsFoo, &lt;a class="external-link" href="http://jsfoo.hasgeek.com/2011-pune/#about-event"&gt;click here&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a class="external-link" href="http://jsfoo.hasgeek.com/2011-pune/#about-event"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/hacking-cis'&gt;https://cis-india.org/internet-governance/hacking-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tom Dane</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-27T11:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers">
    <title>UID: Questions without Answers – A Talk by Usha Ramanathan </title>
    <link>https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers</link>
    <description>
        &lt;b&gt;UID enrolment is in full swing, providing an official identification to millions of Indians, yet there are numerous unanswered questions. A public talk on UID was held at the Institute of Science, Bangalore on September 6, 2011. Usha Ramanathan, an independent law researcher on jurisprudence, poverty and rights, discussed the questions that plague the UID project and the veil of silence enveloping the answers.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Ms. Ramanathan
began her presentation by describing the progress and evolution of the UID
project. She stated three adjectives that reflect the target goal of the Unique
Identification Authority of India (UIDAI): unique, ubiquitous and universal.
She demonstrated how their initial objectives and claims have been drastically
altered in three major ways.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;First and
foremost, the UIDAI claimed that enrolment is voluntary, not mandatory, and
hence, inclusive. Yet, Nandan Nilekani has
consistently maintained that other agencies may make it compulsory.
UID is becoming ubiquitous and is a prerequisite for access to a wide variety
of welfare schemes and services such as PDS, MGNREGS, banks, public health,
etc. It is thus clear that this could
actually exclude those who do not have a number or whose biometrics&amp;nbsp;doesn't&amp;nbsp;work. Therefore, this undermines the inclusive nature of the project.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Second, the
UIDAI claimed that the UID would enable inclusive growth. Ms. Ramanathan expressed a
serious concern surrounding the risk of exclusion. Instead of facilitating
inclusion, around two to five per cent of the Indian population would be
excluded from the current process of authentication and potentially from having
a UID number, as they do not have viable biometric data.&lt;a name="_ftnref" href="#_ftn1"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/a&gt;&amp;nbsp; Physical or visual impairments such as corneal blindness, corneal scars, and
malnourishment induced cataracts or ‘low-quality’ fingerprints from a lifetime
of hard labour inhibit those from providing valid fingerprints or iris scans.&lt;a name="_ftnref" href="#_ftn2"&gt;&lt;span class="MsoFootnoteReference"&gt;[2]&lt;/span&gt;&lt;/a&gt;
&lt;u&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Third, Ms. Ramanathan reiterated that
the &lt;a class="external-link" href="http://www.prsindia.org/uploads/media/NIA%20Draft%20Bill.pdf"&gt;National Identification Authority India Bill &lt;/a&gt;prohibited sharing data, except by the consent of the resident, by
a court order or for national security. However, UID information is being directly fed into the National Intelligence Grid
(NATGRID) who will then provide information about people that is in 21
databases, to eleven security agencies, including the RAW and IB over which
there is no superintendence or oversight.&lt;a name="_ftnref" href="#_ftn3"&gt;&lt;span class="MsoFootnoteReference"&gt;[3]&lt;/span&gt;&lt;/a&gt; She
discussed the high likelihood of a breach of privacy as there are insufficient
standards protecting an individual from unlawful invasion. Additionally, the
UIDAI does not have mechanisms in place for an individual to be notified if there
is a data breach.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;u&gt;Who owns this project?&lt;/u&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A very important question asked is, “Who owns this project?” Ms.
Ramanathan stated that the convergence of information especially during the
‘de-duplication process clearly reflects the corporatization of the project.
She also questioned the background of some of the technological companies
involved. For instance, L-1 Identity
Solutions is well known for its links with the CIA. Additionally, Accenture is
on a Smart Borders project with US Homeland Security. She explained that ownership also plays into the
feasibility and financial cost of the project. Furthermore, the UIDAI has not
conducted a
feasibility study on the technology or the financial cost of the project.&lt;/p&gt;
&lt;h3&gt;&lt;u&gt;International Experience&lt;/u&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Lastly, Ms. Ramanathan discussed the international experience of a
universal identity system. In the United Kingdom, their universal system of
identification was labelled as ‘intrusive bullying’ as well as ‘an assault on personal
liberties’.&amp;nbsp; The United States and the United Kingdom both abandoned a
universal identity system, as it was impractical, unjustified and dangerous.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Ms. Ramanathan raised many questions that evoked thought and discussion from the
audience. She provided numerous examples of ambiguity, misconceptions and confusion
surrounding the UID project.&amp;nbsp; She urged the audience to exercise their civil
liberties or risk losing them. Lastly, she believed that an informed debate
involving the UIDAI and the public is long overdue.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The UIDAI must clarify misconception and provide detailed answers to
crucial questions, as there is a lack of understanding within the general
population about the UID. Therefore, the UIDAI and the Government of India must
increase and ensure transparency of the UID project”, she added.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Ms. Usha Ramanathan was speaking at an event&amp;nbsp;organised by Concern, an IISc Student group. She was speaking in her personal capacity and the opinions reflected above are necessarily not those of CIS.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/a&gt; Biometrics Design Standards for UID
Applications (December 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[2]&lt;/span&gt;&lt;/a&gt; Biometrics Design Standards
for UID Applications (December 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn"&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[3]&lt;/span&gt;&lt;/a&gt;Usha Ramanathan, The Myth of the Technology Fix, http://www.india-seminar.com/2011/617/617_usha_ramanathan.htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;iframe src="http://blip.tv/play/AYLRySYA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLRySYA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers'&gt;https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-24T04:41:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/understanding-right-to-information">
    <title>Understanding the Right to Information</title>
    <link>https://cis-india.org/internet-governance/understanding-right-to-information</link>
    <description>
        &lt;b&gt;Elonnai Hickok summarises the Right to Information Act, 2005, how it works, how to file an RTI request, the information that an individual can request under the Act, the possible responses and the challenges to the citizen and the government. She concludes by saying that there are many structural changes that both citizens and governmental officers can make to improve the system.&lt;/b&gt;
        &lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://righttoinformation.gov.in/webactrti.htm"&gt;Right to Information Act, 2005&lt;/a&gt; (RTI) was created in 2005 and marked an important time in Indian legislative history. The Right to Information enables citizens to hold the government accountable and ensure that it is a transparent body. Questions that can be asked by the citizen to the government range from anything that may concern to some meeting notes to why a teacher is not present in a public school, etc. In the current RTI system there are many challenges that are inhibiting the government’s efficient delivery of the RTI as a service to the people. This has changed the concept of how the citizens view the RTI, as the government feels harassed and the citizens feel as though their rights are being unjustly denied. Additionally, individuals have turned the RTI into a redressal mechanism rather than a way to ensure transparency and learn/understand how their government is functioning. The use of the RTI as a redressal mechanism has created a relationship of animosity between the government and citizens. The below note outlines the ecosystem of the RTI and notes specific challenges that both citizens and the government face.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;h2&gt;The RTI Ecosystem&lt;/h2&gt;
&lt;h3&gt;RTI work flow&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;An individual files an RTI with the central/ state public information officer (PIO) or a specific PIO. PIOs are often not trained, and rarely apply for the position, but are instead designated.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Within five days the information is to be forwarded to the correct PIO.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The PIO must open a file and dispose of the request within 30 days. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If the PIO fails to reply to the applicant by either approving or denying a request, the PIO is liable to pay a fine of Rs. 250 for each day of delay. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If information is electronically uploaded, it is stored in any format the officer chooses (jpeg, pdf, html, etc).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Except for land records and staff records, files are retained for a maximum of one year. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If the PIO does not dispose of the request, there is scope for an appeal within 30-45 days to the appellate authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There is scope for a second appeal to the information commissioner if the authority does not respond within 90 days or the answer is found to be unsatisfactory. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The final decision of the information commissioner is binding. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Filing an RTI request&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;Though there is no specific format an individual must follow when submitting an RTI, when filing a request, individuals must include:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;His /her name and address.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The name and address of the public information officer (PIO).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The particulars of information/documents required (limited to 150 words and one subject matter).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The time period of the information required.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proof of payment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Signature.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proof if the individual is a BPL holder.[&lt;a href="#2"&gt;2&lt;/a&gt;] &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Information that an individual can request under the RTI Act&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Inspection of work, documents, and records&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Taking notes, extracts or certified copies of documents or records.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Taking certified samples of material.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obtaining of information in the form of diskettes, floppies, tapes, and video cassettes, or in any other electronic mode, or through printouts where such information is stored in a computer, or in any other device.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obtaining the status of an RTI request or complaint.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Note: If an individual is requesting third party information, the PIO must inform the third party and provide the individual the opportunity to state a reason for not disclosing the information.&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;Accepted format of requested materials and records&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Material requested can be in any format including: records, documents, memos, emails, opinions, advices, press releases, circulars, orders, logbooks, contracts, reports, papers, samples, models, and data material held in any electronic form.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Records requested can include: any document, manuscript and file, any microfilm, microfiche and facsimile copy of a document, and reproduction of image or images embodied in such microfilm (whether enlarged or not), and any other material produced by a computer or any other device.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Possible Responses to an RTI request&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;b&gt;An information officer can respond to an RTI in the following ways&lt;/b&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Transfer request to appropriate PIO within five days and notify the applicant about the transfer.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provide the requested information within 30 days.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reject the request information within 30 days stating the reasons for rejection, the period within which an appeal against such rejection may be preferred, and the details of the appellate authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Not respond to the applicant. If no response is received within 30 days the officer is liable for a penalty of Rs. 250 per day.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Appeal/Complaint Process&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;First appeal can be filed after 30 days or if the information given was unsatisfactory. The appeal must include: name and address of the appellant, name and address of the PIO involved, brief facts leading to appeal, relief sought, grounds for appeal, and copies of the application or documents involved, including copies of the reply, if received from the PIO.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Second appeal must contain: name and address of the applicant, and name and address of the PIO involved, particulars of the Order including the number if any against which the appeal is preferred, brief facts leading to the appeal, if appeal/complaint is preferred against deemed refusal then the particulars of the application, including number and date and name, address of the PIO to whom the  application was originally made, relief sought, grounds for the relief, verification by the applicant, any other information which the commission may deem necessary for deciding during the appeal, self attested copies of the application or documents involved, copies of the documents relied upon by the appellant and referred to in the appeal, and an index of the documents referred to in the appeal.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A complaint must include: name and address of the complainant, name and address of the state PIO against whom the complaint is being made, facts leading to the complaint, particulars of the application [number, date, name and address of the PIO (three copies)], relief sought, grounds and proof for relief, verification of the complainant (three copies), index of documents referred to in the complaint, and any other necessary information.[&lt;a href="#3"&gt;3&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h2&gt;Challenges to the Citizen&lt;/h2&gt;
&lt;h3&gt;Knowing the correct Public Information Officer&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Knowing which public information officer to mail in the RTI request is the first difficulty that an individual faces. As noted above in 2008 there were a total of 73,256 recorded public information commissioners in the State of Karnataka. New public information commissioners are created every day, because the RTI extends not only to any department of the government, but to any sub-contracted company, organization, school, or NGO that is receiving government funding and doing work on behalf of the government directly or indirectly. Lists of PIOs can be found on department bulletin boards and websites, but there is no clear method for an individual to know what information each PIO is the custodian over. Thus, they are left to determine on their own, and rely on the PIO to forward their application to the correct individual.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Filing in the correct format&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Though it is stated in the law what language an RTI request will be accepted in, and what information should be included – individuals are often unaware of the guidelines and unaware of how to correctly fill out an RTI request. An incorrectly formatted request is one of the major reasons for rejection of a request by the PIO.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Language&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In the State of Karnataka, RTIs can be filed only in two languages: Kannada and English. By law, RTI responses are given only in the language that the department works in on a daily basis, and in English. The information that is supplied through the request is given in its original language. For example, if you ask for a document that is originally in Marathi, the document will be photo copied and sent to you. No translation of documents takes place, because it is not the job function of the officer to translate documents.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Appeals&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;If an individual is denied information, or does not receive a reply within 30 days, they have the option of seeking an appeal through an appellate authority. In 2008 Karnataka had 5416 Appellate Authorities.  Currently, because of the backlog in appeal cases and the slow functioning of the system, an individual might have to wait for upto one year for his/her appeal to be heard. Often at this point the information is no longer relevant or needed.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In some cases individuals are denied a request for information based on the grounds that it would invade the privacy of the public officer. This is sometimes the case and sometimes not the case. Finding the right balance between the right to information and privacy is important, as protecting an individual’s privacy is crucial, but privacy should not be used as a reason for the government to be less transparent to the citizen and be used as a way to deny a citizen the information that they are entitled to.[&lt;a href="#4"&gt;4&lt;/a&gt;]&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;Challenges in the RTI System for the Government&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Too many RTI requests and no system to record duplicates&lt;/b&gt;: As the figure shows above, in 2008, the Karnataka Government received 42208 RTI requests. Currently, it is not possible to know how many of these requests were duplicates since departments handling RTIs do not make it a practice to upload and organize filed RTI requests in a format easily accessible to citizens. Thus, there is no present system in place to track, upload, and store past RTI's in a meaningful way.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Additional overhead in recording, organizing, accessing, and storing data&lt;/b&gt;: In the current system every time an RTI request is received by the government, they open a new file for that request. Though in some ways this system of storage simplifies the process of finding past RTIs, it adds an additional overhead cost as photocopies must be made, new files created, and correctly added to the organized system. Each state follows its own method of recording, organizing, accessing, and storing data – thus, currently it is not possible to easily access the information from another state or combine information from two separate states.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Lack of compliance with section 4(d) pro-active disclosure&lt;/b&gt;: Under section 4 (d), the government is required to pro-actively disclose a pre-determined data to the public via websites and other useful modes. Currently there is very little compliance with section 4(d) from governmental departments. There are many factors that contribute to the low rate of compliance that exist including lack of resources and lack of proper enforcement. If governmental departments were to comply with section 4(d) then the load of RTI requests and the time each request must take to answer could be lightened considerably as the government could respond by pointing citizens to the already disclosed information. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;div style="text-align: justify; "&gt;Though the Right to Information is an important right, the above entry looks at some of the weaknesses and challenges in the system. There are many structural changes that both citizens and governmental officers can make to improve the system such as pro-actively disclosing information, ensuring that an RTI is filed correctly, and creating a system for organizing previously asked questions. Alongside of these structural changes it is also critical that a positive culture of transparency and accountability is fostered throughout society, thus encouraging citizens to actively engage with the government and exercise their right to information.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].I am grateful to N. Vikram Simha, RTI activist, for his insight and feedback into the RTI system.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].N. Vikram Simha, Right to Information Act of 2005: Guide for Citizens.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].N. Vikram Simha, Right to Information: Trend Ahead. Karanataka State Chartered Accountants Association, Bangalore&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].N. Vikram Simha, RTI and Protection of Individual Privacy&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/understanding-right-to-information'&gt;https://cis-india.org/internet-governance/understanding-right-to-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-12T11:39:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/igf-remote-participation">
    <title>Internet Governance Forum: Participate Remotely</title>
    <link>https://cis-india.org/internet-governance/events/igf-remote-participation</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to attend the sixth annual meeting of the Internet Governance Forum (IGF) as a remote participant from Bangalore. The IGF is being held in Nairobi from 27-30 September 2011. CIS has been registered as a remote IGF hub. This will allow many of us who are unable to attend the IGF in person. You can follow the discussion, watch the web cast of the event, follow real-time closed captioning and participate live (via text or video) that will be answered by panelists in the IGF.  &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The IGF is a multi-stakeholder forum that
addresses public policy issues related to key elements of Internet governance. The overall
theme of the meeting will be ‘&lt;strong&gt;Internet as a Catalyst for Change: Access, Development,
Freedoms and Innovation&lt;/strong&gt;'. The various themes are as follows:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Internet Governance
for Development&lt;/li&gt;&lt;li&gt;Emerging Issues&lt;/li&gt;&lt;li&gt;Managing Critical
Internet Resources&lt;/li&gt;&lt;li&gt;Security, Openness
and Privacy&lt;/li&gt;&lt;li&gt;Access and Diversity&lt;/li&gt;&lt;li&gt;Taking Stock and the
Way Forward&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Sunil Abraham,
Executive Director of the Centre for Internet and Society, will be
participating in the following workshops:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/events/digital-technologies-for-civic-engagement" class="external-link"&gt;Use
of Digital Technologies for Civic Engagement and Political Change: Lessons Learned
and Way Forward&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=211"&gt;The
Impact of Regulation: FOSS and Enterprise&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=75"&gt;Putting
Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=219"&gt;Privacy,
Security, and Access to Rights: A Technical and Policy Analyses&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Shyam Ponappa,
Fellow at the Centre for Internet and Society, will be presenting remotely for
the following workshop:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=121"&gt;Open
Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Nishant
Shah, Director Research at Centre for Internet and
Society, has organized the following workshop:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a&gt;Use
of Digital Technologies for Civic Engagement and Political Change: Lessons
Learned and Way Forward&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;We are not limited to following specific workshops. Please follow
the link for more information on
workshops of your interest, program details and the schedule:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/schedule-a-programme-2011"&gt;http://www.intgovforum.org/cms/schedule-a-programme-2011&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Participation is free. However, we would be grateful if you could
confirm your attendance by emailing Natasha Vaz “n&lt;a href="mailto:atasha@cis-india.org"&gt;atasha@cis-india.org&lt;/a&gt; or Tom Dane at
“&lt;a class="external-link" href="mailto:tjdane@gmail.com"&gt;tjdane@gmail.com&lt;/a&gt;”. We hope you will join us to watch the web cast and
contribute your own insights on the various workshops.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Looking
forward to welcoming you at the workshops!&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/igf-remote-participation'&gt;https://cis-india.org/internet-governance/events/igf-remote-participation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-27T05:09:56Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/netizen-guide-to-igf">
    <title>Netizen's Guide to the Internet Governance Forum</title>
    <link>https://cis-india.org/news/netizen-guide-to-igf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;The&lt;a class="external-link" href="http://www.intgovforum.org/cms/"&gt; Internet Governance Forum&lt;/a&gt; is a multi-stakeholder forum where &lt;a class="external-link" href="http://www.intgovforum.org/cms/provisional-list-of-participants-2011"&gt;people from all over the world&lt;/a&gt; - from government, industry, the technical community and civil society - come together to discuss the Internet's future. The Sixth Annual meeting officially kicks off on Tuesday morning in Nairobi, Kenya. A number of pre-meetings will be held all day on Monday.&lt;/p&gt;
&lt;p&gt;The IGF is set up for &lt;a class="external-link" href="http://www.intgovforum.org/cms/remote-participation-2011"&gt;remote participation&lt;/a&gt;, so you do not need to be in Kenya physically to follow the discussions or to ask questions and make your views known. Before the start of each day, IGF staff will post &lt;a class="external-link" href="http://www.intgovforum.org/cms/remote-participation-2011/rp-links"&gt;remote participation links&lt;/a&gt; for each conference room so that you can participate remotely through the conference's WEBEX system. (&lt;a class="external-link" href="http://www.webex.com/lp/stest/index.php?t=ppuUS"&gt;Click here&lt;/a&gt; to see if your computer is compatible with their system.)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Monday pre-meetings&lt;/strong&gt;: &amp;nbsp;Several interesting and important meetings will be held on Monday and four of them are open to everybody on the Internet. Two of them have made their schedules publicly available and promoted them:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.apc.org/en/news/governance/internet-governance-forum-2011-preevent-access-rig"&gt;The Association for Progressive Communications&lt;/a&gt; meeting on access as a right. (10am-6pm Kenya time). Why attend? Click here for the invitation flyer and click here for the full run-down of the day's discussions. Also see APC's briefing paper on priorities for this year's IGF and other short papers on key IGF discussion themes. The final panel of the day, a &lt;strong&gt;Roundtable on the State of Internet Rights (17:15-18:15 local time)&lt;/strong&gt; will be held jointly with the next group. A guest blogger from APC will be reporting from the meeting here on GVA later this week.&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://giga-net.org/page/2011-annual-symposium"&gt;Global Internet Governance Academic Network (Giganet) annual symposium&lt;/a&gt;. (also approximately 10am-6pm) Many of the papers or abstracts are available for download. See for instance Arresting the decline of multi-stakeholderism in Internet governance by Jeremy Malcolm; The legality of internet blackouts in times of crisis. An assessment at the intersection of human rights law, humanitarian law and internet governance principles by Matthias Ketteman; and Upholding online anonymity in Internet governance. Affordances, ethical frameworks, and regulatory practices by Robert Bodle.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;The main conference: So many sessions, which ones to join? At any given time, several different meetings, workshops, and plenary sessions are held concurrently. The IGF organizers have posted the schedule as a rather unweildy Excel file here. Fortunately, other participants have taken the time to post the schedule in more digestible formats.&amp;nbsp;&amp;nbsp;The &lt;a class="external-link" href="http://www.diplomacy.edu/"&gt;Diplo Foundation's&lt;/a&gt; e-Diplomacy project has an online &lt;a class="external-link" href="http://igf2011.diplomacy.edu/sessions"&gt;list of sessions&lt;/a&gt; and&lt;a class="external-link" href="http://igf2011.diplomacy.edu/schedule/2011-W40"&gt; schedule&lt;/a&gt;. The indefatigable &lt;a class="external-link" href="http://www.timdavies.org.uk/"&gt;Tim Davies &lt;/a&gt;has also created a &lt;a class="external-link" href="http://igf2011.diplomacy.edu/home"&gt;social media page&lt;/a&gt; aggregating all tweets, blogs and photos posted by participants. The official hashtag, by the way, is #IGF11.&lt;/p&gt;
&lt;p&gt;If you want to get involved with a global community of people working for Internet users' rights whose work extends throughout the year, be sure to join one or more of the “&lt;a class="external-link" href="http://www.intgovforum.org/cms/dynamiccoalitions"&gt;dynamic coalitions&lt;/a&gt;.” Examples include the &lt;a class="external-link" href="http://internetrightsandprinciples.org/"&gt;Internet Rights and Principles Coalition&lt;/a&gt; (meeting on Tuesday from 11-12:30 Kenya time) and the &lt;a class="external-link" href="http://www.intgovforum.org/cms/dynamic-coalitions/75-foeonline"&gt;Freedom of Expression Coalition&lt;/a&gt; (Wednesday 4:30-6pm).&lt;/p&gt;
&lt;p&gt;Many participating organizations have posted lists of the workshops they are organizing or participating in on their websites. Those interested in sessions related to activism, human rights and free expression on the Internet may want to check out session listings by the APC (scroll down below the jump),&amp;nbsp;the &lt;a class="external-link" href="https://www.eff.org/calendar/2011/09/27/eff-united-nations-internet-governance-forum"&gt;Electronic Frontier Foundation&lt;/a&gt;, the &lt;a class="external-link" href="http://www.globalnetworkinitiative.org/newsandevents/GNI_announces_workshop_at_IGF_2011_in_Nairobi.php"&gt;Global Network Initiative&lt;/a&gt;, and the &lt;a class="external-link" href="http://www.cis-india.org/events/internet-as-a-tool-for-political-change"&gt;Centre for Internet and Society, Bangalore&lt;/a&gt;, among others.&lt;/p&gt;
&lt;p&gt;Kieren McCarthy of dot-nxt has also created a handy &lt;a class="external-link" href="http://news.dot-nxt.com/2011/09/25/igf-2011-practical-guide"&gt;practical guide &lt;/a&gt;to this year's IGF, with his top session picks. He observes that while the opening session on Tuesday afternoon has “far, far too many speakers,” it will nonetheless be interesting “given all that is happening in the Internet governance world.” No doubt, speeches from Hamadoun Toure (ITU), Neelie Kroes (EC), Janis Karklins (UNESCO), Larry Strickling (US), Rod Beckstrom (ICANN) and Vint Cerf (Google) not be uniform in their visions for the Internet's future.&lt;/p&gt;
&lt;p&gt;For those interested in truly doing their homework on the IGF and the current global impasse over Internet governance, see Jeremy Malcolm's post on IGF Watch: &lt;a class="external-link" href="http://igfwatch.org/discussion-board/where-to-develop-internet-policy-itu-g8-oecd-or-an-empowered-igf#Z9R7kctbwaRSKNjToF9Aog"&gt;Where to develop Internet policy: ITU, G8, OECD or an empowered IGF?&lt;/a&gt; Also see his previous posts on twists and turns of the IGF's five-year history.&lt;/p&gt;
&lt;p&gt;Written by Rebecca MacKinnon, the story was published in Global Voices Advocacy on 26 September 2011. The original can be read &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/09/26/igf11guide/"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/netizen-guide-to-igf'&gt;https://cis-india.org/news/netizen-guide-to-igf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-26T08:59:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2011-bulletin">
    <title>September 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage that happened in the month of September 2011.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research base, the RAW programme has been collaborating with different organizations and individuals in order to focus on its two year thematic of Histories of the Internets in India. Five monographs were recently launched at a workshop, &lt;a href="https://cis-india.org/research/conferences/conference-blogs/workshop"&gt;Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum&lt;/a&gt; held in Ahmedabad from 19 to 22 August 2011.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/rewiring-bodies"&gt;Re:Wiring Bodies&lt;/a&gt; by Asha Achuthan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/last-cultural-mile"&gt;The Last Cultural Mile&lt;/a&gt; by Ashish Rajadhyaksha&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/porn-law-video-technology"&gt;Porn: Law, Video, Technology&lt;/a&gt; by Namita A Malhotra &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/archives-and-access"&gt;Archives and Access&lt;/a&gt; by Aparna Balachandran and Rochelle Pinto &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/internet-society-space"&gt;Internet, Society and Space in Indian Cities&lt;/a&gt; by Pratyush Shankar&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS, India and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;Featured Publication&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/blog/dnbook"&gt;Digital AlterNatives with a Cause?&lt;/a&gt; - This collaboratively produced collective, edited by Nishant Shah and Fieke Jansen, asks critical and pertinent questions about theory and practice around ‘digital revolutions’ in a post MENA (Middle East - North Africa) world. It works with multiple vocabularies and frameworks and produces dialogues and conversations between digital natives, academic and research scholars, practitioners, development agencies and corporate structures to examine the nature and practice of digital natives in emerging contexts from the Global South.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/digital-alternatives-book-review"&gt;Digital (Alter)Natives with a Cause? — Book Review by Maarten van den Berg&lt;/a&gt; - The books come in a beautifully designed cassette and are accompanied by a funky yellow package in the shape of a floppy disk containing the booklet ‘D:coding Digital Natives’, a corresponding DVD, and a pack of postcards portraying the evolution of writing - in the sentence ‘I love you’, written with a goose feather in 1734, to the character set ‘i&amp;lt;3u’ entered on a mobile device in 2011, writes Maarten van den Berg. The review was published in "&lt;a href="http://www.thebrokeronline.eu/Articles/Digital-Alter-Natives"&gt;The Broker&lt;/a&gt;" on 19 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/book-launch"&gt;Digital AlterNatives book launch&lt;/a&gt; – CIS and Hivos launched this book at the Museum for  Communication, Hague on 16 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/usof-meeting"&gt;Stakeholders Meeting of the USOF on Facilitating ICT Access to Persons with Disabilities in Rural Areas&lt;/a&gt;, on 7 September 2011. Nirmita Narasimhan made a presentation.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Access to Knowledge is a campaign to promote the fundamental principles of justice, freedom, and economic development. It deals with issues like copyrights, patents, and trademarks, which are an important part of the digital landscape. CIS believes that access to knowledge and culture is essential, and such access promotes creativity and innovation, and helps bridge the differences between the developing and developed worlds in a positive manner. Towards this end, CIS is campaigning for an international treaty on copyright exceptions for print-challenged people, advocating against laws (such as the PUPFIP Bill) that privatize public-funded knowledge, call for the WIPO Broadcast Treaty to be restricted to broadcast, question the demonization of 'pirates', and support endeavours that explore and question the current copyright regime.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/copyright-bill-parliament"&gt;Copyright Amendment Bill in Parliament&lt;/a&gt; by Nirmita Narasimhan, 30 August 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/photocopying-the-past"&gt;Photocopying the past&lt;/a&gt; by Sunil Abraham in the Indian Express, 2 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/calling-out-the-bsa-on-bs"&gt;Calling Out the BSA on Its BS&lt;/a&gt; by Pranesh Prakash, 9 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Internet technologies have fundamentally questioned the notion of governance, not only at the level of administration but also at the level of mechanisms of control, regulation and shaping of the individual. e-Governance initiatives, in combination with other regimes of surveillance, control and censorship, are redefining what it means to be a citizen, a subject, and an individual. We look at questions of governance — at the micro level of the individual and the private (family, relationships, community structures, etc.) as well as the level of governmentality — at the macro level of nation state, citizenship, market economies, and the public (spaces of consumption, work, leisure, political engagement, etc.) under the umbrella of digital governance.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/understanding-right-to-information"&gt;Understanding the Right to Information&lt;/a&gt; by Elonnai Hickok, 28 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/internet-as-a-tool-for-political-change"&gt;Using the Internet as a Tool for Political Change: Lessons Learned and Way Forward&lt;/a&gt;, IGF, Nairobi, 27 September 2011. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers.&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/blog/reviving-growth"&gt;Reviving Growth&lt;/a&gt;, published in the Business Standard on 1 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/open-spectrum-for-development-in-the-context-of-the-digital-migration"&gt;Open Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;, IGF, Nairobi, 29 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;Film Screening&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/partners-in-crime"&gt;Screening of Partners in Crime&lt;/a&gt;, Vikalp@Smriti Nandan along with CIS screened the film and followed it with a discussion with the director of the film, Paromita Vohra, Smriti Nandan Cultural Centre, 9 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/workshop-rsa-encryption"&gt;Prime Security: The Mathematics of RSA Encryption&lt;/a&gt;, a one-day workshop with Rohit Gupta, a leading Mathematician.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-masks-forgotten-protests"&gt;India's social media "spring" masks forgotten protests&lt;/a&gt; [Alistair Scrutton in Reuters, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-key-to-hazare-success"&gt;Social media holds the key to Hazare's campaign success&lt;/a&gt; [Alistair Scrutton in NEWS.scotsman.com, 26 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/digital-divide"&gt;Digital divide: Why Irom Sharmila can’t do an Anna&lt;/a&gt; [FirstPost.Ideas, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/revolutions-viral?searchterm=When+revolutions+go+viral+"&gt;When revolutions go viral&lt;/a&gt; [Times of India (Crescent Edition), 27 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ibsa-seminar"&gt;IBSA Seminar on Global Internet Governance&lt;/a&gt;, organised by the Brazilian Ministry of External Relations, with support from the Brazilian Internet Steering Committee (CGI.br) and the Center for Technology &amp;amp; Society (CTS/FGV) and governmental and non- governmental actors from India, Brazil and South Africa, 1 to 2 September 2011, Fundacao Getulio Vargas (FGV) - Rio de Janeiro, Brazil. Pranesh Prakash participated in this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/copyright-amendment-bill-in-indian-parliament"&gt;Copyrights Amendment Bill to Be Tabled in Indian Parliament – Parallel Import provisions have Been Removed&lt;/a&gt; [Mike Palmedo in infojustice.org, 5 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/power-of-information"&gt;The Power of Information: New Technologies for Philanthropy and Development&lt;/a&gt; [Indigo Trust, 15 September 2011]. Sunil Abraham participated in this event. A video of his speech is now available on &lt;a href="http://www.youtube.com/watch?v=XhpLkEhn9AY"&gt;YouTube&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/using-social-media-to-understand-peoples-pulse"&gt;Planning Commission, Census 2011 and India Post using social media to understand people's pulse better&lt;/a&gt; [Vikas Kumar in the Economic Times, 20 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/foss-instrument-for-accessible-development"&gt;The Impact of Regulation: FOSS and Enterprise&lt;/a&gt;, organised by FOSSFA and ICFOSS, IGF, Nairobi, 28 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/privacy-security-access-to-rights"&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/a&gt;, organised by Expression Technologies, IGF, Nairobi, 29 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/how-can-privacy-be-protected"&gt;Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/a&gt;, organised by GSM Association, 29 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/truman-show-in-kerala"&gt;The Truman Show, in Kerala&lt;/a&gt; [Times of India, posted on CIS website on 23 September 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/making-difference-online-offline"&gt;Making a difference, online and offline&lt;/a&gt; [LiveMint, 27 September 2011].&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Follow CIS on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=457&amp;amp;qid=46981" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=458&amp;amp;qid=46981" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2011-bulletin'&gt;https://cis-india.org/about/newsletters/september-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-07-30T06:34:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ibsa-seminar">
    <title>IBSA Seminar on Global Internet Governance</title>
    <link>https://cis-india.org/news/ibsa-seminar</link>
    <description>
        &lt;b&gt;The seminar will take place at Fundacao Getulio Vargas (FGV) - Rio de Janeiro, Brazil, September 1-2, 2011.&lt;/b&gt;
        
&lt;h2&gt;Day 1: September, 1&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;08.30 - 09.00: Arrival and Accreditation of Participants&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;09.00 - 10.00: Opening Session&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Carlos Ivan Simonsen Leal - President of FGV&lt;/li&gt;&lt;li&gt;Ambassador Luiz Alberto Figueiredo Machado, Undersecretary-General of Environment, Energy, Science and Technology, MRE, Brazil&lt;/li&gt;&lt;li&gt;Ambassador Gilberto Fonseca Guimaraes de Moura, Director of the Department of Inter-regional Mechanisms, MRE, Brazil&lt;/li&gt;&lt;li&gt;Representative of the Government of India - Ministry of Foreign Affairs (MFA) or Department of Information Technology (DIT)&lt;/li&gt;&lt;li&gt;Mr. Moseamo Sebola - Director of Bilateral Relations - Department of Communications (DoC)&lt;/li&gt;&lt;li&gt;Prof. Hartmut Glaser - Brazilian Internet Steering Committee (CGI.br)&lt;/li&gt;&lt;li&gt;Viviana Munoz - South Centre&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;10.00 - 10.15: Coffee Break&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;10.15 - 11.15: Session 1: A Diagnosis of the Main Challenges for Developing Countries on the Global Internet Governance Regime (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;&lt;em&gt;Moderation: Ambassador Benedicto Fonseca Filho, MRE, Brazil&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;DIRCO South Africa&lt;/li&gt;&lt;li&gt;Secretary Romulo Neves, Head of the Division for the Information Society, MRE&lt;/li&gt;&lt;li&gt;Parminder Jeet Singh - IT for Change, India&lt;/li&gt;&lt;li&gt;Carlos Afonso - NUPEF, Brazil&lt;/li&gt;&lt;li&gt;Mark Weinberg - Alternative Information Development Centre, South Africa&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;11.15 - 12.30: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;12.30 - 14.00 Lunch&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;14.00 - 1530: Session 2: A Development Agenda for IG: Infrastructure and Critical Internet Resources (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Goal: reach a more round understanding about: a) which topics are priority for developing countries; b) what are the policy issues related to them; and c) what could be a future strategy for action.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Moderation: CGI.br&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;DIRCO South Africa&lt;/li&gt;&lt;li&gt;Jeferson Nacif, National Agency of Telecommunications - ANATEL&lt;/li&gt;&lt;li&gt;Pranesh Prakash, Centre for Internet and Society, India&lt;/li&gt;&lt;li&gt;Shaun Pather, Faculty Informatics &amp;amp; Design, Cape Peninsula University of Technology&lt;/li&gt;&lt;li&gt;Joao Brant, Intervozes, Brazil&lt;/li&gt;&lt;li&gt;Carlos Affonso - CTS/FGV, Brazil&lt;/li&gt;&lt;li&gt;Demi Getschko - CGI.br, Brazil&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;15.30 - 16.15: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;16.15 - 16.30: Coffee Break&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;16.30 - 17.30: Session 3: Global Online Trade and Services from Developing Countries' Perspective (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Moderation: Civil Society Representative (Brazil, India or South Africa)&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;DIRCO South Africa&lt;/li&gt;&lt;li&gt;Antenor Correa, MCTI - Brasil&lt;/li&gt;&lt;li&gt;Artur Coimbra - Ministry of Communications&lt;/li&gt;&lt;li&gt;Pranesh Prakash, Centre for Internet and Society, India&lt;/li&gt;&lt;li&gt;Mark Wienberg, Alternative Information Development, South Africa&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;17.30 - 18.30: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;18.30 - 20.00: Free Meetings&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Day 2: September 2&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;09.00 - 10.30: Session 4: A Development Agenda for IG: The New Global Information and Communications Systems - Its Rights and Principles (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Moderation: CTS/FGV Representative&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;DIRCO&lt;/li&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;Viviana Munoz - South Centre&lt;/li&gt;&lt;li&gt;Anriette Estherhuysen, APC&lt;/li&gt;&lt;li&gt;Graciela Selaimen - Nupef&lt;/li&gt;&lt;li&gt;Joana Varon (CTS/FGV) - (Approach: Intellectual Property and Access to Knowledge)&lt;/li&gt;&lt;li&gt;Pranesh Prakash, Centre for Internet and Society, India&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;10.30 - 11.20: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;11.30 - 12.30: Session 5: Institutional Arrangements for Internet Governance and Participation from Developing Countries (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Moderation: Ambassador Benedicto Fonseca Filho, MRE, Brazil&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;DIRCO South Africa&lt;/li&gt;&lt;li&gt;Parminder Jeet Singh, IT for Change, India&lt;/li&gt;&lt;li&gt;Marilia Maciel, CTS/FGV, Brazil&lt;/li&gt;&lt;li&gt;Anriette Estherrhuysen, APC, South Africa&lt;/li&gt;&lt;li&gt;Secretary Romulo Neves, Head of the Division for the Information Society, MRE, Brazil&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;12.30 - 13.20: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;13.20 - 14.30: Lunch&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;14.30 - 16.00: Taking Stocks and the Way Forward&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;16.00 - 18.00: Governmental Representatives Meeting - Separated&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ibsa-seminar'&gt;https://cis-india.org/news/ibsa-seminar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-13T09:53:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/social-media-masks-forgotten-protests">
    <title>India's social media "spring" masks forgotten protests</title>
    <link>https://cis-india.org/news/social-media-masks-forgotten-protests</link>
    <description>
        &lt;b&gt;Irom Sharmila has been on hunger strike for 10 years to protest against military abuses, force-fed by tubes through her nose. But the tragedy for the world's longest hunger strike is that she is on the wrong side of India's digital divide.&lt;/b&gt;
        
&lt;p&gt;Twitter, Facebook and aggressive private TV have helped rally India's biggest protests in decades to support civil activist Anna Hazare, a digital groundswell of a wired middle class that echoes the Arab Spring and has taken a Congress party-led government of elderly politicians by surprise.&lt;/p&gt;
&lt;p&gt;But Sharmila, who has been on a hunger strike in Manipur to demand an end to the army's sweeping emergency powers there, has only managed a small following, a footnote in media coverage.&lt;/p&gt;
&lt;p&gt;"We also once tried to take our fight to New Delhi ... but we did not get support from the rest of the nation," Sharmila told Tehelka magazine.&lt;/p&gt;
&lt;p&gt;She must be frustrated. The Hazare phenomenon has rallied Indians from the start with social media. Hazare's India Against Corruption website says it has had 13 million phone calls of support. Its Facebook page has nearly 500,000 "likes".&lt;/p&gt;
&lt;p&gt;Its leaders have tweeted each step of the whirlwind crisis, whether describing their arrests in real time or negotiations with the government, outmanoeuvring Prime Minister Manmohan Singh and his ministers at every step.&lt;/p&gt;
&lt;p&gt;"Protest at PM's residence: 35 people detained, taken to Tughlaq Rd. PS, hundreds still there, come if you can #Janlokpal," twitter user @janlokpal sent its followers in just one example of how the movement was rallying support.&lt;/p&gt;
&lt;p&gt;Cases like Sharmila expose the digital divide of Asia's third largest economy and underscore how a growing urban middle class may be getting its political voice heard while millions of poor remain off the digital protest map.&lt;/p&gt;
&lt;p&gt;"This is the first time digital social media has resonated with such a large number of people," said Nishant Shah, head of research at the Centre for Internet and Society think-tank.&lt;/p&gt;
&lt;p&gt;"But this is far more of a middle class, urban movement, than a national movement. Many people in India are excluded from it."&lt;/p&gt;
&lt;p&gt;Twitter and Facebook are barely used in many of India's social causes, including battles over land rights that are one of India's most pressing problems involving millions of farmers.&lt;/p&gt;
&lt;p&gt;Huge social issues in India, from caste discrimination to high food prices, from the building of dams to protests by farmers against nuclear power plants, have failed to create the kind of digital mobilisation that Hazare enjoys.&lt;/p&gt;
&lt;h3&gt;A Digital Divide&lt;/h3&gt;
&lt;p&gt;India's internet users have grown 1,400 percent between 2000 and 2010, behind only China and Vietnam among Asian countries, according to a report by Burson-Marsteller, a consulting firm.&lt;/p&gt;
&lt;p&gt;But that masks India's low base. Internet penetration is around 8 percent in India, the lowest among major Asian countries. That compares with nearly 40 percent in China.&lt;/p&gt;
&lt;p&gt;Out of a population of 1.2 billion, there are only 29 million people active in digital social networks. A report by Maplecroft consultancy warned that India was lagging other BRICs, Brazil, China and Russia in "digital inclusion".&lt;/p&gt;
&lt;p&gt;"India, for example, the wealthier, more affluent segment of the population, primarily based in urban areas, has embraced the use of modern communications technology," the report said.&lt;/p&gt;
&lt;p&gt;"The vast majority of the population has, however, been excluded from this process."&lt;/p&gt;
&lt;p&gt;Those statistics highlight that while the middle class has found a voice, electorally the centre-left Congress party will still need to pander to its traditional vote base of millions of farmers and poor Indians ahead of a 2014 general election.&lt;/p&gt;
&lt;p&gt;Congress, in power for most of the life of independent India, has failed to use social media tools. One minister lost his job for tweeting too frankly, in a sign of government unease over the web, and the party lags behind an opposition that has embraced Twitter.&lt;/p&gt;
&lt;h3&gt;Libya Overshadowed&lt;/h3&gt;
&lt;p&gt;So far, private TV channels have provided 24-hour coverage of the protests -- the news from Libya is hardly to be seen. Urban Indians with mobile phones in hand have dominated rallies in the open grounds where Hazare was on his second week of fasting.&lt;/p&gt;
&lt;p&gt;Small protests across the country, from demonstrations outside ministers' houses to rallies outside metro stations, have been organised through Twitter and Facebook.&lt;/p&gt;
&lt;p&gt;An app that can be downloaded on to smartphones running the Android operating system gives users the latest news on the campaign for a tough "Jan lokpal", or anti-corruption bill, and details of the latest meetings.&lt;/p&gt;
&lt;p&gt;"Social media has been huge for us, it has a life of its own," said Shazia Ilmi, in charge of Hazare media strategy.&lt;/p&gt;
&lt;p&gt;Even before Hazare was arrested last week, organisers had prepared a pre-recorded video from him that went on YouTube.&lt;/p&gt;
&lt;p&gt;The movement does have deep roots and social media has widened the protests, if not caused them. Many of Hazare's protests have also been through word of mouth. Corruption also affects the poor more than middle classes with endemic bribes, whether permission for street food stands or driving licences.&lt;/p&gt;
&lt;p&gt;"It's not an up and down, national movement. It is largely a middle class cause," said Sagarika Ghose, a novelist and journalist at the CNN-IBN news television channel.&lt;/p&gt;
&lt;p&gt;"But it's hugely important one. For a younger generation, corruption has become a catch-all phrase for the failure of development."&lt;/p&gt;
&lt;p&gt;Some activists are already criticising Hazare as a hype of an elitist social media.&lt;/p&gt;
&lt;p&gt;"Those thronging the Ramlila grounds or marching in support of Anna in the metros are not necessarily 'the people' of the country, and it is dangerous to take the two as identical," academic Prabhat Patnaik wrote in The Hindu newspaper.&lt;/p&gt;
&lt;p&gt;(Editing by Paul de Bendern and Alex Richardson)&lt;/p&gt;
&lt;p&gt;This article by Alistair Scrutton was &lt;a class="external-link" href="http://in.reuters.com/article/2011/08/25/idINIndia-58963020110825"&gt;published&lt;/a&gt; in Reuters on &amp;nbsp;25 August 2011.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/social-media-masks-forgotten-protests'&gt;https://cis-india.org/news/social-media-masks-forgotten-protests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-01T06:24:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/digital-divide">
    <title>Digital divide: Why Irom Sharmila can’t do an Anna</title>
    <link>https://cis-india.org/news/digital-divide</link>
    <description>
        &lt;b&gt;Irom Sharmila has been on hunger strike for 10 years to protest against military abuses, force-fed by tubes through her nose. But the tragedy for the world’s longest hunger strike is that she is on the wrong side of India’s digital divide.&lt;/b&gt;
        
&lt;p&gt;Twitter, Facebook and aggressive private TV have helped rally India’s biggest protests in decades to support civil activist Anna Hazare, a digital groundswell of a wired middle class that echoes the Arab Spring and has taken a Congress party-led government of elderly politicians by surprise.&lt;/p&gt;
&lt;p&gt;But Sharmila, who has been on a hunger strike in the northeastern Manipur state to demand an end to the army’s sweeping emergency powers there, has only managed a small following, a footnote in media coverage.&lt;/p&gt;
&lt;p&gt;“We also once tried to take our fight to New Delhi … but we did not get support from the rest of the nation,” Sharmila told Tehelka magazine.&lt;/p&gt;
&lt;p&gt;She must be frustrated. The Hazare phenomenon has rallied Indians from the start with social media. Hazare’s &lt;a class="external-link" href="http://www.indiaagainstcorruption.org/"&gt;India Against Corruption&lt;/a&gt; website says it has had 13 million phone calls of support. Its Facebook page has nearly 500,000 “likes”.&lt;/p&gt;
&lt;p&gt;Its leaders have tweeted each step of the whirlwind crisis, whether describing their arrests in real time or negotiations with the government, outmanoeuvring Prime Minister Manmohan Singh and his ministers at every step.&lt;/p&gt;
&lt;p&gt;“Protest at PM’s residence: 35 people detained, taken to Tughlaq Rd. PS, hundreds still there, come if you can #Janlokpal,” twitter user &lt;a class="external-link" href="http://twitter.com/#!/search/janlokpal"&gt;@janlokpal&lt;/a&gt; sent its followers in just one example of how the movement was rallying support.&lt;/p&gt;
&lt;p&gt;Cases like Sharmila expose the digital divide of Asia’s third-largest economy and underscore how a growing urban middle class may be getting its political voice heard while millions of poor remain off the digital protest map.&lt;/p&gt;
&lt;p&gt;In response to Anna’s invitiation to join the anti-corruption movement, Sharmila said "Please try to reach the concerned legislators (read authorities) to&amp;nbsp;let me get free, like yours, to join your amazing crusade to root out corruption."&lt;/p&gt;
&lt;p&gt;She added that ” I cannot get the advantage of exercising my non-violent protest for justice against my concerned authority as a democratic citizen of a democratic country, unlike your environment. This is the problem I cannot understand.”&lt;/p&gt;
&lt;p&gt;"This is the first time digital social media has resonated with such a large number of people," said Nishant Shah, head of research at the Centre for Internet and Society think-tank.&lt;/p&gt;
&lt;p&gt;"But this is far more of a middle class, urban movement, than a national movement. Many people in India are excluded from it."&lt;/p&gt;
&lt;p&gt;Twitter and Facebook are barely used in many of India’s social causes, including battles over land rights that are one of India’s most pressing problems involving millions of farmers.&lt;/p&gt;
&lt;p&gt;Huge social issues in India, from caste discrimination to high food prices, from the building of dams to protests by farmers against nuclear power plants, have failed to create the kind of digital mobilisation that Hazare enjoys.&lt;/p&gt;
&lt;h3&gt;Digital Divide&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Irom_Anna.jpg/image_preview" alt="Anna Hazare" class="image-inline image-inline" title="Anna Hazare" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;India’s internet users have grown 1,400 percent between 2000 and 2010, behind only China and Vietnam among Asian countries, according to a report by Burson-Marsteller, a consulting firm. But that masks India’s low base. Internet penetration is around 8 percent in India, the lowest among major Asian countries.&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;&lt;/span&gt;That compares with nearly 40 percent in China.&amp;nbsp;Out of a population of 1.2 billion, there are only 29 million people active in digital social networks. A report by Maplecroft consultancy warned that India was lagging other BRICs, Brazil, China and Russia in “digital inclusion”.&lt;/p&gt;
&lt;p&gt;"India, for example, the wealthier, more affluent segment of the population, primarily based in urban areas, has embraced the use of modern communications technology,” the report said. “The vast majority of the population has, however, been excluded from this process."&lt;/p&gt;
&lt;p&gt;Those statistics highlight that while the middle class has found a voice, electorally the centre-left Congress party will still need to pander to its traditional vote base of millions of farmers and poor Indians ahead of a 2014 general election.&lt;/p&gt;
&lt;p&gt;Congress, in power for most of the life of independent India, has failed to use social media tools. One minister lost his job for tweeting too frankly, in a sign of government unease over the web, and the party lags behind an opposition that has embraced Twitter.&lt;/p&gt;
&lt;h3&gt;Libya overshadowed&lt;/h3&gt;
&lt;p&gt;So far, private TV channels have provided 24-hour coverage of the protests— the news from Libya is hardly to be seen. Urban Indians with mobile phones in hand have dominated rallies in the open grounds where Hazare was on his second week of fasting.&lt;/p&gt;
&lt;p&gt;Small protests across the country, from demonstrations outside ministers’ houses to rallies outside metro stations, have been organised through Twitter and Facebook.&lt;/p&gt;
&lt;p&gt;An app that can be downloaded on to smartphones running the Android operating system gives users the latest news on the campaign for a tough “Jan lokpal”, or anti-corruption bill, and details of the latest meetings.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/politics/digital-divide-why-irom-sharmila-cant-do-an-anna-69141.html"&gt;Watch video: A group of people who came together on facebook reached the Ramlila Maidan to show solidarity with Anna Hazare&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;"Social media has been huge for us, it has a life of its own," said Shazia Ilmi, in charge of Hazare media strategy.&lt;/p&gt;
&lt;p&gt;Even before Hazare was arrested last week, organisers had prepared a pre-recorded video from him that went on YouTube.&lt;/p&gt;
&lt;p&gt;The movement does have deep roots and social media has widened the protests, if not caused them. Many of Hazare’s protests have also been through word of mouth. Corruption also affects the poor more than middle classes with endemic bribes, whether permission for street food stands or driving licences.&lt;/p&gt;
&lt;p&gt;"It’s not an up and down, national movement. It is largely a middle class cause," said Sagarika Ghose, a novelist and journalist at the CNN-IBN news television channel. &amp;nbsp;"But it’s hugely important one. For a younger generation, corruption has become a catch-all phrase for the failure of development."&lt;/p&gt;
&lt;p&gt;Some activists are already criticising Hazare as a hype of an elitist social media.&lt;/p&gt;
&lt;p&gt;"Those thronging the Ramlila grounds or marching in support of Anna in the metros are not necessarily 'the people' of the country, and it is dangerous to take the two as identical," academic &lt;a class="external-link" href="http://www.thehindu.com/opinion/lead/article2389694.ece?homepage=true"&gt;Prabhat Patnaik&lt;/a&gt; wrote in The Hindu newspaper.&lt;/p&gt;
&lt;p&gt;You can view Irom Sharmila’s reply to Anna’s invitation below&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.scribd.com/doc/63078024/Irom-Sharmila-Letter-to-Anna-Hazare"&gt;Irom Sharmila Letter to Anna Hazare&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This article was published in FirstPost.Ideas on 25 August 2011. The original story can be read &lt;a class="external-link" href="http://www.firstpost.com/politics/digital-divide-why-irom-sharmila-cant-do-an-anna-69141.html"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/digital-divide'&gt;https://cis-india.org/news/digital-divide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-01T05:55:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/revolutions-viral">
    <title>When revolutions go viral</title>
    <link>https://cis-india.org/news/revolutions-viral</link>
    <description>
        &lt;b&gt;Thanks to Facebook and Twitter, the urban Indian youth, famously detached from the goings-on in the country, came out on the streets to support the anti-corruption movement - not only here but abroad as well. TOI-Crest looks at the anatomy of a modern protest movement.&lt;/b&gt;
        
&lt;p&gt;I try to change my display picture, update my BBM status and send out a tweet as often as possible. I feel like I really need to do my bit for the country, " a college student was overheard saying outside Mumbai's Azad Maidan where protests against the anti-corruption movement are still under way. Once used to reconnect with long-lost school friends or to post vacation pictures, social networking sites have surfaced as the new forum for political activism. The world's attention is now on the potential of the digital sphere in historical revolutions as witnessed in Egypt and Tunisia.&amp;nbsp;Though set in a vastly different political context, and used to different ends, the power of social media to drive citizen action in India has become apparent as Team Anna's call to action resonates through the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;From earlier this year at Jantar Mantar to the culmination of the protests when Anna Hazare became a household name, the anti-corruption movement has harnessed technology and social media tools to engineer large-scale protests. Not only has the movement deviated from traditional methods of mass mobilisation, but it has also brought young urban India into the fold of political activism. Ritesh Singh, a third-year computer science student at IIT Khargapur, created the 'India Against Corruption' Facebook page in December last year. Since then, the page has gathered more than four lakh supporters. There are also several regional chapters and over 150 unofficial Facebook pages devoted to Anna Hazare and India Against Corruption.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The 'Students Against Corruption' group has been encouraging students to use social media for the cause by sending out messages such as "Students should share and promote this page for the goodness (sic) of the nation . . . This is the thing dat we can do for our nation. . . This is wat India needs. . . Promote it, share it, blog it, discuss it . . . then feel the change. " Petitions, calls to action and encouragement to join Hazare's fast also became commonplace in the last three months. The blog post '10 Ways to Support Anna Hazare on Social Media' by social media manager Sorav Jain has been shared 256 times on Facebook.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Relying on symbolism such as Gandhian photographs and references to the freedom struggle, Team Anna has created a media phenomenon. Text messages such as 'Behri sarkar ko janta ki aawaz sunai nahi de rahi hain! Lets show ppls anger!' and 'ANNA ki aag shuru ho gayi hai, Inquilab Zindabad' have helped in creating mass support. Meanwhile twitter has been abuzz with dialogue, support and reactions to the protests, as Anna Hazare's campaign became the top trending topic in India over the past few weeks. While the image of Hazare meditating at Raj Ghat became iconic on August 15, 2011, Team Anna's voice was heard on the TV, on mobile phones, YouTube and even on T-shirts. Developers are in the process of launching an India Against Corruption game, India Against Corruption mobile applications, India Against Corruption browser toolbars and more.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Though digital activism is often criticised as passive armchair activism or slacktivism, the use of technology in organising social protests has brought a different kind of activist on the street: young, urban India. "It's not as if what is happening is new, but it is happening on an unprecedented scale, " says Nishant Shah, research director for the Centre for Internet and Society, Bangalore. "Traditional media has also done this in different ways, but in the past the protesters have been the disenfranchised. The use of social media has mobilised a new constituency - it has brought the urban middle class to the street. However, the use of such tools is producing a different kind of exclusion. There is a noticeable lack of poor urban people in the protests. This is not the representation of 1. 2 billion Indians as it is being made out to be. "&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The use of social media has garnered support for Team Anna from the unlikeliest parts, catapulting 'India Against Corruption' (IAC) into a global phenomenon. Young Indians living in places like New York, Singapore, London and Hong Kong are tweeting, facebooking, organising and gathering to talk about Hazare and his cause. Some young professionals have even taken time off from their careers to fly down to India and physically support the cause.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Sunil Khaitan, an investment banker working with Deutsche Bank in Hong Kong flew down last Friday to attend the protests at the Ramlila ground and address the crowd at Mumbai's Azad Maidan. Khaitan, 28, is originally from Kolkata and graduated from IIM Bangalore in 2006. "I was involved in the Right to Information movement in 2005, have been in touch with Professor Trilochan Sastry at IIM Bangalore, and have been tracking this movement from the days of Jantar Mantar, " he says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Khaitan is also active in the Hong Kong chapter of IAC, which organised a meeting on August 21, 2011, attended by over 300 people. "There is a clearly outlined process on the IAC website which tells you how to conduct a meeting, " says Khaitan. "As the news channels are not available in HK, so many people are not aware of the real cause. So we talked about the points of contention and showed videos with Arvind Kejriwal, Kiran Bedi and Hazare addressing the crowd. " He argues that harnessing social media has helped get people from different walks of life involved with the Hazare movement.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Social networking sites have also helped create a close-knit Indian community in Hong Kong. "Anna has also made a big point about the youth being present in the protests, and it is easier to connect with the youth through social media, " says Khaitan.&lt;/p&gt;
&lt;p&gt;"Peer pressure also comes into the picture in that age group - people want to get involved to appear impressive to their friends. " But though technology has brought a new demographic of Indians into the realm of protest, it manifests its power through the oldest form of networking - word of mouth.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article was published in the Times of India (Crescent Edition) on 27 August 2011, read the original story &lt;a class="external-link" href="http://www.timescrest.com/life/when-revolutions-go-viral-6155"&gt;here&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/revolutions-viral'&gt;https://cis-india.org/news/revolutions-viral&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-01T04:46:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/net-gain">
    <title>Net Gain</title>
    <link>https://cis-india.org/news/net-gain</link>
    <description>
        &lt;b&gt;The draft Electronic Service Delivery Bill, 2011, is aimed at making government services available online. But there are many hurdles to bringing in effective e-governance, says Hemchhaya De&lt;/b&gt;
        
&lt;p&gt;At a time when India is hotly debating the Lokpal Bill, another significant piece of legislation is about to make its way to Parliament this monsoon session. The government has mooted the draft Electronic Service Delivery Bill, 2011, to ensure that all ministries and government departments provide their services to citizens online.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The bill, drafted by the department of information technology (DIT) under the ministry of communication and information technology, could have far-reaching benefits for citizens. If implemented, one would no longer have to stand in long queues, make frequent trips to government offices and deal with red tape in order to procure even such basic documents as driving licences or land record copies.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Of course, the key question is whether the necessary infrastructure will be in place to allow citizens to access these services via the electronic mode. In a country where active Internet user penetration in rural areas is as low as 2.13 per cent, the feasibility of e-governance depends on the state providing enough number of access centres.&lt;/p&gt;
&lt;p&gt;E-governance is not a completely new concept in India. The Centre laid down an ambitious National e-Governance Plan (NeGP) in 2006 and roped in industry bodies like Nasscom to facilitate the delivery of e-services. According to a Nasscom report, there has been substantial progress in NeGP. Of the 1,100 services targeted under the plan, over 600 services in both government-to-citizen (G2C) and government-to-business (G2B) domains across central ministries and state departments can now be accessed electronically.&lt;/p&gt;
&lt;p&gt;However, many experts feel that the NeGP has not lived up to its promise. "Progress in NeGP has been slow," says Subhash Bhatnagar, honorary adjunct professor at IIM, Ahmedabad, and member of the steering committee of the 12th Five Year Plan (2012-17) for the communication and IT and information sector.&lt;/p&gt;
&lt;p&gt;That said, some states have been running successful e-government projects. “Take Karnataka’s online delivery and management of land records,” says Bhatnagar. “The online system offers services to ordinary people on a first-come, first-served basis without subjecting them to the whims and fancies of babus.”&lt;/p&gt;
&lt;p&gt;However, Karnataka is an exception rather than the rule and many states are lagging behind when it comes to extending e-governance. “IIM, Ahmedabad, carried out an e-governance impact assessment study in 12 states. West Bengal is one state which hasn’t fared well and it figures in the bottom half of the list,” reveals Bhatnagar.&lt;/p&gt;
&lt;p&gt;The draft Electronic Service Delivery Bill aims to exert pressure on states and government departments to fully automate or computerise their services to citizens. Crucially, it sets a clear time limit for delivering online services. The bill says, “every competent authority of the appropriate Government” is required to publish or specify the services that will be digitised within six months from the commencement of the law. “If there’s any delay, departments have to explain it in writing,” says a senior official of the DIT who does not wish to be named.&lt;/p&gt;
&lt;p&gt;The bill further mandates that all public services should be delivered in electronic modes within five years from the commencement of the law. This period may be extended by not more than three years.&lt;/p&gt;
&lt;p&gt;In addition to a grievance redressal mechanism, the bill proposes setting up a Central Electronic Service Delivery Commission to enforce the provisions of the law. The commission should comprise a central chief commissioner and not more than two central commissioners — all of whom shall have “worked as secretary or equivalent level… either in the central government or in the state government”.&lt;/p&gt;
&lt;p&gt;Many experts feel that the proposed legislation is a step in the right direction. “The bill will reduce red tape and promote efficient services in various government departments,” says Payal Chawla, partner, Hemant Sahai Associates, a Delhi-based law firm. “The time limit of five years with an extension of a maximum of three years to bring all the services in the purview of the legislation is well-intended.”&lt;/p&gt;
&lt;p&gt;Agrees Sunil Abraham, executive director, Centre for Internet and Society (CIS), a Bangalore-based organisation which carries out research in IT. “The bill ensures that government departments publicly commit to Service Level Agreements (SLAs) and demonstrate compliance to these SLAs,” he says. “Like the RTI Act, there is an office of the central chief commissioner which can penalise officials who don’t provide electronic services or comply with their own SLAs.”&lt;/p&gt;
&lt;p&gt;But others argue that the bill is too open-ended. “I’d have liked to see the services specified clearly,” says Neel Ratan, executive director, PricewaterhouseCoopers. “Just starting an e-service isn’t enough — the quality or level of performance of the service needs to be ascertained as well. The bill seems to be silent on how quality can be ensured.”&lt;/p&gt;
&lt;p&gt;Bhatnagar too feels that the draft bill should have first clearly defined what “electronic service delivery” is all about. All it says is “electronic service delivery means the delivery of services through electronic mode including, inter alia, the receipt of forms and applications, issue or grant of any licence, permit, certificate, sanction or approval and the receipt or payment of money”.&lt;/p&gt;
&lt;p&gt;However, electronic delivery of services should encompass all end-to-end steps necessary for delivering the service, points out Bhatnagar. “Receiving an application, receiving supporting documents, receiving payment of various fees, issue of licence/receipts/certificates/ documents such as ration cards and passports and payment of dues to citizens should be web enabled. Citizens who wish to carry out the transaction through a portal without having to visit a government office should be able to do so,” he says.&lt;/p&gt;
&lt;p&gt;Furthermore, says Bhatnagar, government agencies should ensure that every citizen has access to a public service delivery centre (government owned or private) from where he or she can access such services. And a person shouldn’t have to travel more than 10km to access these services.&lt;/p&gt;
&lt;p&gt;Experts say there are several hurdles to e-governance in India. “The domestic IT industry has not focussed on this important market and services have been decentralised without ensuring common standards. So different states may be using different software, which can make the whole system messy and lead to uneven and poor quality projects,” says Abraham of CIS. “We are still very far away from the sophistication of G2C and G2B systems currently deployed in many Western countries.”&lt;/p&gt;
&lt;p&gt;In sum, enacting a law to bring in complete e-governance may not be enough. Without the necessary investment in the country’s technology infrastructure, the initiative, however well-intended, may never truly get off the ground.&lt;/p&gt;
&lt;p&gt;Graphic by Mantashir Iqbal Shaikh&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article by Hemchhaya De was published in the Telegraph on 24 August 2011. The original can be read&lt;a class="external-link" href="http://www.telegraphindia.com/1110824/jsp/opinion/story_14416831.jsp"&gt; here&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/net-gain'&gt;https://cis-india.org/news/net-gain&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-29T11:52:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/workshop-rsa-encryption">
    <title>Prime Security: The Mathematics of RSA Encryption </title>
    <link>https://cis-india.org/internet-governance/events/workshop-rsa-encryption</link>
    <description>
        &lt;b&gt;Based on simple properties of prime numbers, RSA encryption protects our money and digital identity. But how does it actually work? The Centre for Internet and Society invites you to a one-day workshop by Rohit Gupta on 9 September 2011. &lt;/b&gt;
        
&lt;h3&gt;&amp;nbsp;Workshop&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt; As remarked by one of its inventors, RSA is the scheme that "protects 95 per cent of the electronic commerce in the world".&amp;nbsp; The recent breach of 40 million RSA Secure ID tokens ( widely used in Bangalore ) makes this an urgent issue. Apart from the proposed use of 2048-bit RSA keys in the UIDAI project by the government of India, we unknowingly use this algorithm every time we use a credit card, ATM or provide any kind of digital authentication.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Surprisingly enough, to understand the basic mechanism one need not have any more mathematical background than high school - the concept of prime numbers. From that basic knowledge this hands-on workshop will show the way RSA works in reality, under the hood in most networks, computers and smart devices. We will focus on the core mathematical idea rather than any specific software implementations.&lt;/p&gt;
&lt;p&gt;For more information, please &lt;a class="external-link" href="http://en.wikipedia.org/wiki/RSA"&gt;click here&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Convener:&lt;/h3&gt;
&lt;p&gt;Rohit Gupta is a mathematician working in the area of 'group theory' which is a fundamental part of physics, puzzles and cryptography. He is also a columnist for the Sunday Guardian and tweets as @fadesingh.&lt;/p&gt;
&lt;h3&gt;Registration:&lt;/h3&gt;
&lt;p&gt; The fees for the workshop ( Rs. 1500/- per person, cash only) is to be paid on arrival at the venue. No prior registration is required but the seats are limited to 15-20 people. Everyone who is interested is welcome.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Workshop Schedule:&amp;nbsp;&lt;/h3&gt;
&lt;strong&gt;Session I:&lt;/strong&gt;
&lt;p&gt; 11.30 a.m. to 1:00 p.m.&lt;/p&gt;
&lt;strong&gt;Lunch:&lt;/strong&gt;
&lt;p&gt; 1:00 p.m. to 2.30 p.m.&lt;/p&gt;
&lt;strong&gt;Session II:&lt;/strong&gt;
&lt;p&gt; 2.30 p.m. to 4.00 p.m.&lt;/p&gt;
&lt;p&gt;VIDEO&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLTkyIA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLTkyIA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/workshop-rsa-encryption'&gt;https://cis-india.org/internet-governance/events/workshop-rsa-encryption&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-22T07:13:19Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2011-bulletin">
    <title>August 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/august-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Five monographs: &lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/rewiring-bodies/rewiring-call-for-review" target="_blank"&gt;Re: Wiring Bodies&lt;/a&gt; by Asha Achuthan, &lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/archives-and-access/archive-and-access" target="_blank"&gt;Archive and Access&lt;/a&gt; by Aparna Balachandran and Rochelle Pinto, &lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/pleasure-and-pornography/pornography-and-law" target="_blank"&gt;Porn: Law, Video, Technology&lt;/a&gt; by Namita Malhotra, &lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/rethinking-the-last-mile-problem/last-mile-problem" target="_blank"&gt;The Last Cultural Mile&lt;/a&gt; by Ashish Rajadhyaksha and &lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/city-and-space" target="_blank"&gt;Internet, Society and Space in Indian Cities&lt;/a&gt; by Pratyush Shankar were officially launched at the Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum Workshop in Ahmedabad.&lt;/p&gt;
&lt;h3&gt;Workshop organised in CEPT, Ahmedabad&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/conferences/conference-blogs/workshop" target="_blank"&gt;Locating Internets: Histories of the Internet(s) in India      — Research Training and Curriculum Workshop: Call for Participation&lt;/a&gt; [19 to 22 August 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/stirrup-and-the-ground" target="_blank"&gt;Between the Stirrup and the Ground: Relocating Digital      Activism&lt;/a&gt; (This paper by Nishant Shah and Fieke Jansen was published in      Democracy &amp;amp; Society, a publication of the Center for Democracy and      Civil Society, Volume 8, Issue 2, Summer 2011).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Interview&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/interview-mada"&gt;An Interview with      David Baines&lt;/a&gt; (Maureen Agena interviewed David Baines of Mada Centre      for Assistive Technology in Khattar).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/govt-legalising-parallel-import-of-copyright-work" class="external-link"&gt;Govt for Legalising Parallel Import of Copyright Works; Publishers Oppose&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software.&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/ogd-draft-v2-call-for-comments" target="_blank"&gt;Call for Comments on Draft Report on Open Government Data      in India (v2)&lt;/a&gt; (Nisha Thompson has updated the Open Government Data      Report prepared by CIS last year including additional case studies and the      National Data Sharing and Accessibility Policy).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/open-access-to-scholarly-literature" target="_blank"&gt;Open Access to Scholarly Literature in India: A Status      Report: Call for Comments&lt;/a&gt; (The report has been prepared by Prof.      Subbiah Arunachalam and Madhan Muthu. It surveys the field of scholarly      and scientific publication in India and provides a detailed history of the      open access movement in India).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralized authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cyber crime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.” Its latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Blog Post&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/bye-bye-email" target="_blank"&gt;Bye Bye email?&lt;/a&gt; (Email might be the default method of      communication for most of us, but could it be going the telegram way,      writes Nishant Shah. The article was published in the Indian Express on      August 21, 2011).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Public Lecture&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/mirror-in-the-enigma" target="_blank"&gt;The Mirror in the Enigma: How Germany lost World War II to      a Mathematical Theorem&lt;/a&gt; (Rohit Gupta gave a lecture at CIS on August      12, 2011).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a project, ‘Privacy in Asia’. &lt;i&gt;It is funded by Privacy International (PI), UK and the International Development Research Centre, Canada and is being administered in collaboration with the Society and Action Group, Gurgaon&lt;/i&gt;. The two-year project commenced on 24 March 2010 and will be completed as agreed to by the stakeholders. It was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around challenges and violations of privacy in India. In furtherance of these goals it aims to draft and promote over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/ip-addresses-and-identity-disclosures" target="_blank"&gt;IP Addresses and Expeditious Disclosure of Identity in      India&lt;/a&gt; (Prashant Iyengar reviews the statutory mechanism regulating the      retention and disclosure of IP addresses by Internet companies in India      and provides a compilation of anecdotes on how law enforcement authorities      in India have used IP address information to trace individuals responsible      for particular crimes).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy_wholebodyimagingcomparison" target="_blank"&gt;Whole Body Imaging and Privacy Concerns that Follow&lt;/a&gt; (by Elonnai Hickok)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion" target="_blank"&gt;Financial Inclusion and the UID&lt;/a&gt; (by Elonnai Hickok) &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities" target="_blank"&gt;CCTV in Universities&lt;/a&gt; (by Merlin Oommen)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/key-escrow" target="_blank"&gt;Re-thinking Key Escrow&lt;/a&gt; (by Natasha Vaz) &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-chennai-report.pdf/view?searchterm=Privacy%20Matters%20Chennai" target="_blank"&gt;Privacy Matters, Chennai&lt;/a&gt; – the event was organised by      IDRC, Society in Action Group, Madras Institute of Development Studies,      Consumer and Civic Action Group, Privacy India and CIS on August 6, 2011. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/net-gain" target="_blank"&gt;Net Gain&lt;/a&gt; [The Telegraph, 24 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/iisc-students-boycott-uid" target="_blank"&gt;IISc students boycott UID, don’t want Big Brother to keep watch&lt;/a&gt; [Bangalore Mirror, 23 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/right-circle" target="_blank"&gt;In the Right Circle&lt;/a&gt; [Indian Express, 24 July 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/siege-of-android/?searchterm=%EF%82%A7The%20Siege%20of%20Android" target="_blank"&gt;The Siege of Android: How Google Lost The OS War&lt;/a&gt; [Business.in, 17 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/unsocial-network" target="_blank"&gt;The Unsocial Network&lt;/a&gt; [Mail Today, 14 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/hazare-clicks" target="_blank"&gt;Hazare 'clicks' with city techies&lt;/a&gt; [India, 18 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/govt-to-monitor-facebook-twitter" target="_blank"&gt;Govt wants to monitor Facebook, Twitter&lt;/a&gt; [Times of India, 8 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/nothing-unique-about-identity" target="_blank"&gt;Nothing unique about this identity&lt;/a&gt; [Deccan Chronicle, 5 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/tired-of-tele-marketing-calls" target="_blank"&gt;Tired of tele-marketing calls? Act on privacy right: Experts&lt;/a&gt; [Times of India, 7 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/knowledge-isnt-written" target="_blank"&gt;When Knowledge Isn’t Written, Does It Still Count?&lt;/a&gt; [New York Times, 7 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/indian-super-cops-patrol-www-highway" target="_blank"&gt;Indian super-cops now patrol the www highway&lt;/a&gt; [Hindustan Times, 6 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/better-understanding-of-privacy" target="_blank"&gt;Better Understanding of the Idea of Privacy Sought&lt;/a&gt; [Hindu, 7 August 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/converting-indian-slacktivists" target="_blank"&gt;Converting Indian Slacktivists Takes (Offline) Time&lt;/a&gt; [Wall Street Journal, 2 August 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://www.cis-india.org/" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2011-bulletin'&gt;https://cis-india.org/about/newsletters/august-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-13T05:13:23Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
