<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2851 to 2865.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/events/CIS-tacticaltechONO"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/february-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/social-network-suicide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cyber-cafe-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-practices-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/electronication"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/google-policy-fellowship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/global-freedom-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/fostering-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-kids"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mouse-a-tool-of-revolution"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/what-are-you-accused"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/january-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/privacy-conferencefeb5"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/popular-myths-about-uid"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/events/CIS-tacticaltechONO">
    <title>Tactical Tech's ONO Party! </title>
    <link>https://cis-india.org/events/CIS-tacticaltechONO</link>
    <description>
        &lt;b&gt;Tactical Tech has made friends with  ONO Robot , a friendly Robot Guide and the star of four animated shorts of a series called Survival in the Digital Age, and we'd like to invite you to watch the series with us at our ONO Party.    &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;Activists and independent journalists don't often realise that the
    information and communications technologies they use can compromise
    their security and have implications for privacy, freedom of
    expression and access to information. As an organisation working at
    the meeting point of advocacy and technology, Tactical Tech finds
    these issues essential to anyone using technologies to facilitate
    and strengthen their advocacy work.&amp;nbsp; To raise awareness about the
    digital traces we leave behind &lt;em&gt;Survival in the Digital Age&lt;/em&gt;
    aims to engage activists to better understand the information and
    communications technologies they use, so that they can make more
    informed decisions about the risks they may face.&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;We're going to be showing the four shorts over party games, snacks
    and drinks at our ONO Party so do join us on Thursday, March 3rd&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/CIS-tacticaltechONO'&gt;https://cis-india.org/events/CIS-tacticaltechONO&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:19:47Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/february-2011-bulletin">
    <title>February 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/february-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Monographs finalised from these projects have been published online for public review:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/cis-raw/histories/Internetcities/city-and-space"&gt;Internet, Society &amp;amp; Space in Indian Cities&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS has interest in developing Digital Identities as a core research area and looks at practices, policies and scholarships in the field to explore relationships between Internet, technology and identity. The Digital Natives project is funded by Hivos, Netherlands. CIS involvement has resulted into these:&lt;/p&gt;
&lt;h3&gt;Columns on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following articles were published in the Indian Express recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/pull-plug"&gt;Pull the Plug&lt;/a&gt; [published in the Indian Express on February 20, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/flash-of-change"&gt;A FLASH of Change&lt;/a&gt; [published in the Indian Express on February 6, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/wiki-world"&gt;Wiki changes the world&lt;/a&gt; [published in the Indian Express on January 23, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshop&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The third and final workshop in the Digital Natives with a Cause? research project took place in Santiago, Chile, from 8 to 10 February 2011. Samuel Tettner wrote a report about the workshop:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/santiago-workshop-an-after-thought"&gt;Digital Natives with a Cause? —Workshop in Santiago — an Afterthought&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entries by Maesey Angelina&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Maesy Angelina is doing Masters on International Development, specializing in Children and Youth Studies at the International Institute of Social Studies, Erasmus University of Rotterdam. She is working on her research on the activism of digital natives under the Hivos-CIS Digital Natives Knowledge Programme. She spent a month at CIS, working on her dissertation, exploring the Blank Noise Project under the Digital Natives with a Cause? framework. She writes a series of blog entries. The new ones are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/the-class-question"&gt;The Class Question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/diving-into-the-digital"&gt;Diving Into the Digital&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry by Samuel Tettner&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Samuel Tettner is a Coordinator in the Digital Natives project. He has written one blog entry:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/computers-in-society"&gt;Computer Science &amp;amp; Society – The Roles Defined&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/accessibility/blog/working-draft"&gt;The Working Draft of the Rights of Persons with Disabilities Act, 2010: Does it exceed its Mandate in Including Provisions Relating to Other Disability Legislations&lt;/a&gt;?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime. Our latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/exhaustion/weblogentry_view"&gt;Exhaustion: Imports, Exports and the Doctrine of First Sale in Indian Copyright Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/parallel-importation-rebuttal"&gt;Thomas Abraham's Rebuttal on Parallel Importation&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/indian-law-and-parallel-exports"&gt;Indian Law and "Parallel Exports"&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/parallel-importation-of-books"&gt;Why Parallel Importation of Books Should Be Allowed&lt;/a&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software, its latest involvement have yielded these results:&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/openness/blog/digital-commons"&gt;Engaging on the Digital Commons&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/openness/blog/comments-ifeg-phase-1"&gt;CIS Comments on the Interoperability Framework for e-Governance&lt;/a&gt; (Phase I)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/openness/blog/withdrawal-of-journal-access"&gt;Withdrawal of Journal Access is a Wake-up Call for Researchers in the Developing World&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt; Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralised authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cyber crime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.”  CIS involvement in the field of Internet governance has taken the following shape:&lt;/p&gt;
&lt;h3&gt;Announcement&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/google-policy-fellowship"&gt;Google Policy Fellowship Program: Asia Chapter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/intermediary-due-diligence"&gt;Comments on Intermediary Due Diligence Rules, 2011&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/cyber-cafe-rules"&gt;Comments on Cyber Café Rules, 2011&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/security-practices-rules"&gt;Comments on Draft Reasonable Security Practices Rules, 2011&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a project, ‘Privacy in Asia’. It is funded by Privacy International (PI), UK and the International Development Research Centre, Canada and is being administered in collaboration with the Society and Action Group, Gurgaon. The two-year project commenced on 24&lt;sup&gt;th&lt;/sup&gt; March 2010 and will be completed as agreed to by the stakeholders. It was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around challenges and violations of privacy in India. In furtherance of these goals it aims to draft and promote over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;h3&gt;Blog Entries by Elonnai Hickok&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok is a Programme Associate in the Privacy in Asia project. She has published a series of Open Letters to the Finance Committee regarding the UID:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/biometrics"&gt;Biometrics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/finance-and-security"&gt;Finance and Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/uid-and-transactions"&gt;UID  and Transactions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/operational-design"&gt;Operational Design&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/uid-budget"&gt;UID Budget&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Other New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/privacy-conferencebanglaore"&gt;Conference Report: 'Privacy Matters' Bangalore&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/privacy-uiddevaprasad"&gt;Analysing the Right to Privacy and Dignity with Respect to the UID&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this:&lt;/p&gt;
&lt;h3&gt;Column&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/jhatka-or-halal"&gt;Spectrum auctions - 'Jhatka' or 'Halal'?&lt;/a&gt; [published in the Business Standard on February 3, 2011]&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Forthcoming Events&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is holding some conferences/workshops in the month of March in Delhi and Bangalore:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/fostering-freedom-of-expression"&gt;Role of the Internet in Fostering Freedom of Expression and Strengthening Activism in India - A Workshop in Delhi&lt;/a&gt; (March 4, 2011, Constitutional Club, Rafi Marg, New Delhi)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/global-freedom-expression"&gt;Global Challenges to Freedom of Expression&lt;/a&gt; (March 4, 2011, Constitutional Club, Rafi Marg, New Delhi)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/electronication"&gt;Electronication: Ragas and the Future&lt;/a&gt; (March 6, 2011 Jaaga, Bangalore)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/design-public"&gt;Design!publiC&lt;/a&gt; (March 18, 2011, Taj Vivanta, New Delhi)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Staff Update&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Deepti Bharthur&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deepti Bhartur is a Research Intern at CIS. She did her BA (Hons) in Journalism from Lady Sriram College, University of Delhi and completed her Masters in Communication from Sarojini Naidu School of Arts and Communication, University of Hyderabad. Deepti joined the Accessibility team of CIS and is working on accessibility in telecom policy in India.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/growing-cyberspace-controls"&gt;Growing cyberspace controls, Internet filtering&lt;/a&gt; (Hindu, February 20, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/copyright-amendment"&gt;2(m) or not 2(m)&lt;/a&gt; (Business Standard, February 19, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/twitterati-change-world"&gt;Can the twitterati change the world?&lt;/a&gt; (The Times of India, February 12, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/mouse-a-tool-of-revolution"&gt;Can the mouse be a tool of revolution in India?&lt;/a&gt; (DNA, February 12, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-network-suicide"&gt;Social Network Suicide&lt;/a&gt; (Bangalore Mirror, February 6, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/new-kids"&gt;New Kids on the Blog&lt;/a&gt; (Indian Express, February 6, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/procuring-books"&gt;Procuring books in Indian libraries&lt;/a&gt; (Hri Institute for Southasian Research and Exchange, February 4, 2011) &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/what-are-you-accused"&gt;What Are You Accused of? Find Out Online&lt;/a&gt; (Wall Street Journal, February 1, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/one-wikipedian"&gt;One among the clan of Wikipedians&lt;/a&gt; (Hindu, January 27, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/digital-wrongs"&gt;Digital Wrongs&lt;/a&gt; (Forbes India, January 24, 2011)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit us at &lt;a href="http://www.cis-india.org/"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Looking forward to hearing from you. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;i&gt;&lt;br /&gt; CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/february-2011-bulletin'&gt;https://cis-india.org/about/newsletters/february-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-30T11:16:29Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/social-network-suicide">
    <title>Social Network Suicide</title>
    <link>https://cis-india.org/news/social-network-suicide</link>
    <description>
        &lt;b&gt;Those disillusioned with their virtual friends circle are saying goodbye through web applications that wipe out your net identity. What’s more, you can even have your own memorial page, says Sahana Charan in this article published in the Bangalore Mirror on Sunday, February 6, 2011.&lt;/b&gt;
        
&lt;p&gt;It is funny that even though some young people claim to have a thousand friends on social networking sites, they may actually never socialise with any of their virtual buddies. So when the “net” benefits don’t translate to reality, there is disillusionment. And then they may stop being active on networking sites. That’s the beauty and tragedy of virtual friendships.&lt;/p&gt;
&lt;p&gt;And this is just one of the many reasons why your friend — who was otherwise tweeting her every mundane activity or would update her status message on Facebook every nano-second — might have suddenly become incommunicado.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As pressures to keep up virtual appearances become taxing and unpleasant experiences make social networking sites “not-so-safe” to share intimate details, many young people are opting out of these networks, deactivating their accounts and taking web sanyaas.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore says that in India this is a relatively new phenomenon and only a small group of people have actually committed web suicide using applications that wipe out your virtual identity. But a bigger&amp;nbsp; number of netizens may be killing their networking accounts, because of a variety of resons — ranging from internet stalking to “no guaranteed benefits.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;“Many people may get onto a social networking site to use it for meeting rituals, to look for partners and to get information on jobs. When these are fulfilled they may decide to move out.&amp;nbsp; Some people realise that a lot of their time and energy goes into updating accounts on Facebook, Twitter or Myspace, but it has not helped them get ‘real world’ benefits, so they just stop being active,” says Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Virtual disappearance&lt;/h3&gt;
&lt;p&gt;With the deactivation came some applications which help you go peacefully into a social network death — Web 2.0 Suicide Machine and Sepukkoo.com promise to remove your virtual identity completely so that you can make real friends. While Suicide Machine irreversibly removes all your friends, groups, photos and vidoes one by one and joins you to its “Social Network Suiciders,” Sepukkoo goes one step ahead and creates a memorial page for you.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;What’s ironical is that you are actually going to another network and this one’s&amp;nbsp; called ‘suicide networking’, where you encourage friends to leave their social circles. Both applications have been banned by Facebook but work on other sites.&lt;/p&gt;
&lt;p&gt;So why would a popular guy deactivate his account ? Joe V J, a 28-year-old IT professional, who was regularly uploading pictures of his new bike or parties with friends on Facebook, took himself off the site recently. He realised that people who were not meant to see his profile and candid shots, had access and were posting comments.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;“I got into the site because it was a great place to bond with friends. But then I realised that relatives and acquaintances who I had no clue about, were on the social network, had started pinging. They would look at pictures and express shock and then&amp;nbsp; tell other people. It became a little too much, so I just decided to click the deactivate option,” he says.&lt;/p&gt;
&lt;h3&gt;Privacy concerns&lt;/h3&gt;
&lt;p&gt;It can get really ugly and those being harassed online may just disappear to save their privacy. Tinu Cherian, a techie and Wikipedia administrator speaks of an incident where another administrator was harassed by a cyber troll because he had blocked this guy from making wrong updates on Wiki’s pages.&lt;/p&gt;
&lt;p&gt;“He had no option but to wipe out his Twitter account, which was hacked into&amp;nbsp; and&amp;nbsp;&amp;nbsp; damning information was uploaded.”&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Privacy concerns rise as&amp;nbsp; Facebook decides to share account information with marketeers. “When Facebook first started, only 10 per cent of your information on the site could be seen by an outsider, but in 2011, 90 per cent of your information can be accessed by people other than your friends,” says Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There is another reason why people go off online networks. “When it first came, Facebook was considered the Ivy league and everyone wanted to be there. Youngsters suddenly thought Orkut was infradig and ceased to be on that site. So sometimes, people may just move out because they want to be somewhere else.”&amp;nbsp; And that’s why the networking tamasha continues.&lt;/p&gt;
&lt;p&gt;Read the article in the &lt;a class="external-link" href="http://www.bangaloremirror.com/index.aspx?page=article&amp;amp;sectid=81&amp;amp;contentid=201102062011020607474371421797a6c"&gt;Bangalore Mirror&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/social-network-suicide'&gt;https://cis-india.org/news/social-network-suicide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:54:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cyber-cafe-rules">
    <title>CIS Para-wise Comments on Cyber Café Rules, 2011 </title>
    <link>https://cis-india.org/internet-governance/blog/cyber-cafe-rules</link>
    <description>
        &lt;b&gt;On February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website  (The Information Technology (Guidelines for Cyber Cafe) Rules, 2011) in exercise of the powers conferred by Section 87(2) (zg), read with Section 79(2) of the Information Technology Act, 2000.  Comments were invited from the public before February 25th 2011.  Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para wise comments for the Ministry’s consideration.&lt;/b&gt;
        &lt;h2&gt;A. General Objections&lt;/h2&gt;
&lt;p&gt;These rules have no nexus with their parent provision, namely s.79(2).  Section 79(1) provides for exemption from liability for intermediaries.  Section 79(2) thereupon states:&lt;/p&gt;
&lt;blockquote&gt;79. Intermediaries not to be liable in certain cases—&lt;br /&gt;
&lt;blockquote&gt;(2) The provisions of sub-section (1) shall apply if— &lt;br /&gt;
&lt;blockquote&gt;(a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hasted; or &lt;br /&gt;(b) the intermediary does not— &lt;br /&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;(i) initiate the transmission, &lt;br /&gt;(ii) select the receiver of the transmission, and &lt;br /&gt;(iii) select or modify the information contained in the transmission; &lt;br /&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;(c) the intermediary observes due diligence while discharging his duties under this Act and also observes such other guidelines as the Central Government may prescribe in this behalf. &lt;br /&gt;&lt;br /&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;Therefore, by not observing any of the provisions of the Rules, the intermediary opens itself up for liability for actions of its users.  However, the provisions contained in these rules have no rational nexus with due diligence to be observed by the intermediary to absolve itself from liability for third-party actions.&lt;/p&gt;
&lt;p&gt;While the government may have authority to regulate cybercafes, that regulation should not be promulgated as rules under s.79(2).  Doing so would be ultra vires s.79(2) itself.&lt;/p&gt;
&lt;h3&gt;Recommendation&lt;/h3&gt;
&lt;p&gt;These rules should be deleted in toto.&lt;/p&gt;
&lt;h2&gt;B. Specific Objections&lt;/h2&gt;
&lt;p&gt;These specific objections are in addition to the above-stated general objection, and do not detract from out recommendation that these rules should be deleted in their entirety.&lt;/p&gt;
&lt;h3&gt;Rule 2(c)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;(c) “Cyber Cafe” means cyber café as defined in clause (na) of sub-section (1) of section 2 of the Act&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;The Act defines a cyber cafe as meaning “any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public”.  This would include internet access provided in airports, in restaurants, and in many other places where the provisions of these rules (such as those about height of partitions, etc.) just will not be practicable.  Thus, this provision will have unintended consequences.&lt;/p&gt;
&lt;h3&gt;Rule 3&lt;/h3&gt;
&lt;blockquote&gt;Agency for issuance of license: Appropriate government will notify an agency to issue license to cyber cafes.&lt;br /&gt;&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Rule 3 requires the issuing of a license for the establishment of a cyber café. We believe this is unwarranted since cybercafes, like most commercial establishments are already subject to registration and licensing under the “Shops and Establishments Acts” which have been enacted in all states. These Acts already specify an elaborate procedure for the application, registration and monitoring of all establishments and there is no need to multiply the levels of permission a cyber café must obtain. The current rules do not specify an application procedure, fee, and a maximum or minimum time frame within which such a license must be granted or denied nor does it specify the criterion on which such license applications will be evaluated. We think that in the absence of such legislative guidance, this provision is likely to be abused.&lt;/p&gt;
&lt;p&gt;Cyber cafes in India contribute greatly to India’s increasing internet penetration and inserting a licensing regime would greatly impede access to the internet.&lt;/p&gt;
&lt;p&gt;We believe that cyber cafes should be allowed to be established in the same manner as other shops and establishments, without the requirement of a special license.&lt;/p&gt;
&lt;h3&gt;Rule 4(2)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;...When an user cannot establish his/her identify to the satisfaction of the Cyber Café as per sub-rule (1), he/she may be photographed by the Cyber Café using a web camera installed on one of the computers in the Cyber Café for establishing the identity of the user.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Sub-Rule 4 (2) Requires that if an individual is unable to establish identity, their photograph must be taken if they wish to use cyber café facilities. We believe that an individual’s photograph should be taken only as a last resort, where identity has been established.&lt;/p&gt;
&lt;h3&gt;Rule 4(3)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Children without photo identity card shall be accompanied by an adult with any of the documents as prescribed in sub-rule (1).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that children below 18 years should be specifically exempt from proving their identities to cyber café owners. Children are usually the quickest to adopt technology, and the requirement of possessing a valid identity might prove to be a deterrent to their developing computer skills. Likewise, being accompanied by an adult is also an onerous obligation since children’s access to the internet would depend on the availability of an adult/parent who may be too busy to accompany the child on every occasion the child wishes to access the internet or use a computer.&lt;/p&gt;
&lt;p&gt;To reiterate, we feel that the current provision specially and adversely targets children from poorer classes (since they are most likely to routinely access internet through cyber cafes) and denies them the opportunity of developing their computer skills which are crucial for the growth of the “knowledge economy” that India is trying to head towards.&lt;/p&gt;
&lt;p&gt;In addition, we believe that children are more susceptible to exploitation and consequently have a heightened privacy expectation which must be honoured. We recommend that the current sub-rule be deleted and replaced with a clause which specifically exempts children from proving their identity and forbids taking photographs of them under any circumstance.&lt;/p&gt;
&lt;h3&gt;Rule 5(1)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;... Log Register: After the identity of the user has been established as per sub-rule (1) of rule 4 above, the Cyber Café shall record and maintain the required information of each user in the log register for a minimum period of one year. Also, Cyber Café may maintain an online version of the log register.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Rule 5(1) Provides a minimum period of one year that Cyber Cafes must retain their log registers. The rule does not specify the details which the log register must provide. In the interests of minimising threats to privacy, we recommend that these details recorded be confined only to the name and duration of use.&lt;/p&gt;
&lt;p&gt;In addition, we believe that there should also be a coinciding mandatory deletion clause for the log register requiring details to be purged after the minimum retention period.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3&gt;Rules 5(3)and 6(2)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;5(3): “The cyber café owner shall be responsible for storing and maintaining following backups of logs and computer resource records for at least six months for each access or login by any user :&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;·    History of websites accessed using computer resource at cyber cafe&lt;/p&gt;
&lt;p&gt;·    Logs of proxy server installed at cyber café&lt;/p&gt;
&lt;p&gt;·    Mail server logs&lt;/p&gt;
&lt;p&gt;·    Logs of network devices such as router, switches, systems etc. installed at cyber café&lt;/p&gt;
&lt;p&gt;·    Logs of firewall or Intrusion Prevention/Detection systems, if installed.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;6(2): “The screen of all computers, installed other than in Partitions or Cubicles, shall face ‘outward’, i.e. they shall face the common open space of the Cyber Café.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend deletion of this rule since it is an unreasonable intrusion into a person’s privacy and an indirect attempt to censor content which users may wish to access. There are many uses of the internet for which a user may legitimately require privacy: For instance, patients, including HIV patients and those with mental illness, may wish to obtain information about their condition. Similarly sexuality minorities may wish to seek support or reach out to a larger community. Enforcing the architecture stipulated in this rule would discourage their access to such vital information. In addition, this architecture would make it easier for cyber crimes such as identity theft to take place since it would be easier to observe the login details of other users at the cyber café.&lt;/p&gt;
&lt;h3&gt;Rule 7(1)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Inspection of Cyber Café : “An officer, not below the rank of Police Inspector as authorised by the licensing agency, is authorized to check or inspect cyber café and the computer resource or network established therein at any time for the compliance of these rules. The cyber café owner shall provide every related document, registers and any necessary information to the inspecting officer on demand.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend this clause be omitted since it confers unfettered and unsupervised powers on any Police Inspector to examine any cyber café premises he may choose without any restriction on time.&lt;/p&gt;
&lt;p&gt;Additionally, the provisions of Shops and Establishments Acts of most states already prescribe a procedure for inspection of establishments and examination of records. The current rules merely add another layer of supervision to the existing laws without adequate safeguards.&lt;/p&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
 
&lt;p&gt;Sub-Rule 5(3) holds cyber café owners responsible for the storage and maintenance of back up logs concerning the following information: history of websites, logs of proxy servers, mail server logs, logs of network devices, logs of firewalls installed. We believe that the maximum length for retention of this data should be defined and a mandatory deletion clause should be inserted requiring cyber café owners to delete these logs periodically. We further believe that access to the history of websites and mail server logs is a serious invasion of a person’s privacy, and should be omitted from the back up logs.&lt;/p&gt;
&lt;p&gt;This is especially so when currently there is no requirement that cyber café owners maintain their logs under conditions of utmost secrecy and confidence.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
 
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cyber-cafe-rules'&gt;https://cis-india.org/internet-governance/blog/cyber-cafe-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-14T10:32:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-practices-rules">
    <title>CIS Para-wise Comments on Draft Reasonable Security Practices Rules, 2011 </title>
    <link>https://cis-india.org/internet-governance/blog/security-practices-rules</link>
    <description>
        &lt;b&gt;On February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website  (The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011) in exercise of the powers conferred by Section 87(2)(ob), read with Section 43A of the Information Technology Act, 2000.  Comments were invited from the public before February 25th 2011.  Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para-wise comments for the Ministry’s consideration.&lt;/b&gt;
        &lt;h2&gt;A. Specific Objections&lt;/h2&gt;
&lt;h3&gt;Rule 3&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Sensitive personal data or information.— Sensitive personal data or information of a person shall include information collected, received, stored, transmitted or processed by body corporate or intermediary or any person, consisting of :&lt;/p&gt;
&lt;p&gt;Password;&lt;/p&gt;
&lt;p&gt;...&lt;/p&gt;
&lt;p&gt;Call data records;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We suggest that this list be expanded to include information such as sexual orientation, religion and caste. In addition, “electronic communication records” including emails, chat logs and other communications using a computer should be designated sensitive personal information.&lt;/p&gt;
&lt;h3&gt;Rule 4&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Body Corporate to provide policy for privacy and disclosure of information.— (1) The body corporate or any person who on behalf of body corporate collects, receives, possess, stores, deals or handle shall provide a privacy policy for handling of or dealing in user information including sensitive personal information and ensure that the same are available for view by such providers of information who has provided such information under lawful contract. Such policy shall provide for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Type of personal or sensitive information collected under sub-rule (ii) of rule 3;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Purpose, means and modes of usage of such information;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Disclosure of information as provided in rule 6&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that the privacy policy be made available for view to all individuals to whom the information held by the body corporate pertains. Currently the privacy policy will only be disclosed to the “providers of information” who may not be the individual concerned directly.&lt;/p&gt;
&lt;h3&gt;Rule 5&lt;/h3&gt;
&lt;p&gt;Collection of information.—&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(1) Body corporate or any person on its behalf shall obtain consent of the provider of the information regarding purpose, means and modes of uses before collection of such information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend the substitution of the term “individual to whom the data pertains” instead of the phrase “provider of the information”.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(2) Body corporate or any person on its behalf shall not collect sensitive personal information unless—&lt;/p&gt;
&lt;p&gt;the information is collected for a lawful purpose connected with a function or activity of the agency; and&lt;/p&gt;
&lt;p&gt;the collection of the information is necessary for that purpose.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend a blanket prohibition of collection of biometric data unless a heightened security interest is demonstrated.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(3) While collecting information directly from the individual concerned, the body corporate or any person on its behalf shall take such steps as are, in the circumstances, reasonable to ensure that the individual concerned is aware of.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend a simpler phrase like “The body corporate.. shall take reasonable steps to inform the individual concerned” instead of the current complex phrasing. Reasonableness has generally been interpreted by courts contextually. For instance, the Supreme Court has remarked, “`Reasonable’ means prima facie in law reasonable in regard to those circumstances of which the actor, called upon to act reasonably, knows or ought to know. See Gujarat Water Supply and Sewage Board v. Unique Erectors (Guj) AIR 1989 SC 973.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(4) Body corporate or any person on its behalf holding sensitive personal information shall not keep that information for longer than is required for the purposes for which the information may lawfully be used.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that this be converted into a mandatory obligation to delete or anonymise the information collected within a stipulated period (say 6 months) after the expiry of use for which it was collected.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(6) Body corporate or any person on its behalf shall permit the users to review the information they had provided and modify the same, wherever necessary.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Individuals should have the right to review and modify information pertaining to them whether or not they themselves had provided the information to the body corporate. This right should be provided to them wherever the information that pertains to them is incorrect.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(7) Body corporate or any person on its behalf shall provide an option to the provider of the information to opt-in or opt-out.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that the wording be changed to “individual to whom the data pertains” instead of “provider of information”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-practices-rules'&gt;https://cis-india.org/internet-governance/blog/security-practices-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-14T10:32:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/electronication">
    <title>Electronication: Ragas and the Future</title>
    <link>https://cis-india.org/events/electronication</link>
    <description>
        &lt;b&gt;What more is better than listening to music and later on getting into a discursive conversation with its composers to better understand the transformative power of high-energy music. CIS is pleased to invite you to an evening conference followed by a concert by Charanjit Singh, Samrat B. and Imaad Shah playing improvised versions of Charanjit Singh's “Ten Ragas to a Disco Beat”.&lt;/b&gt;
        
&lt;h3&gt;&lt;img src="https://cis-india.org/home-images/left.jpg/image_preview" alt="Charanjit " class="image-inline image-inline" title="Charanjit " /&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;About the Music&lt;/h3&gt;
&lt;p&gt;In 1982, seasoned Bollywood composer and arranger Charanjit Singh visited Singapore and got his hands on the now holy trinity of a Roland 303, 808, and Jupiter 8 - the core of acid house and the gear that forged the genesis of electronic dance music as we know it today.&lt;/p&gt;
&lt;p&gt;Later that year, EMI India releases an album limited to a few thousand copies: "Synthesizing: Ten Ragas to A Disco Beat". It presents Charanjit's effort at using what was then an entirely new technology to bridge the gap between programmed beats, synth lines, and classical Indian music motifs.&lt;/p&gt;
&lt;p&gt;It essentially sinks without a trace.&lt;/p&gt;
&lt;p&gt;In 2008, Dutch label Bollywood Connection re-released this LP to an unsuspecting and wholly ignorant public, convinced that these beats were established in the clubs of Chicago and Detroit in 1986, except they never were.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Since the re-release, this album has been raising eyebrows worldwide.&lt;/p&gt;
&lt;h3&gt;About the Musicians&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Charanjit Singh&lt;/strong&gt; is a seasoned Bollywood composer and arranger who lives in Bombay. We recently met him, and we are now working with him to bring his work back into the twenty-first century and into the public eye, where it belongs. &amp;nbsp;On March 6, he will give a performance from this landmark album for the first time in nearly 30 years. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Samrat B.&lt;/strong&gt; &amp;nbsp;performs under the name Teddy Boy Kill along with another musician. Streaming from continuous transmutation of music &amp;amp; audio-emotive desires, the sound of Teddy Boy Kill stems out of Psychedelic, Dub, Electro, Rock &amp;amp; Funk. The music is an attempt to revive the dance &amp;amp; groove mentality.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Imaad Shah&lt;/strong&gt; is a musician, writer, and actor based in Mumbai. An avid enthusiast of music and pop history, he has dug deep into the Bollywood sound culture and is part of Pulp Society, a funk jazz act from Mumbai.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/electronication'&gt;https://cis-india.org/events/electronication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:18:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/google-policy-fellowship">
    <title>Google Policy Fellowship Program: Asia Chapter</title>
    <link>https://cis-india.org/internet-governance/blog/google-policy-fellowship</link>
    <description>
        &lt;b&gt;For the ardent followers of free and open Internet and for those who love to debate on technology, media law and Internet-related policy issues, there is some good news. The Centre for Internet and Society, India is conducting a Google Policy Fellowship program this summer!&lt;/b&gt;
        
&lt;p&gt;Offered for the first time in Asia Pacific, the &lt;a class="external-link" href="http://www.google.com/policyfellowship/"&gt;Google Policy Fellowship&lt;/a&gt; offers&amp;nbsp;successful applicants the opportunity to develop research and debate on issues relating to freedom of expression for a minimum of ten weeks from June to August 2011. The applicants will be selected in Australia, India and Hong Kong respectively.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society will select the India Fellow, and is accepting applications for the position before March 27, 2011.&amp;nbsp;Google is providing a USD 7,500 stipend to the India Fellow, who will be selected by April 18, 2011.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To apply, please send to &lt;a href="mailto:google.fellowship@cis-india.org"&gt;google.fellowship@cis-india.org&lt;/a&gt; &amp;nbsp;the following materials:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Statement of Purpose: A brief write-up outlining about your interest and qualifications for the programme including the relevant academic, professional and extracurricular experiences. As part of the write-up, also explain on what you hope to gain from participation in the programme and what research work concerning free expression online you would like to further through this programme. (About 1200 words max).&lt;/li&gt;&lt;li&gt;Resume&lt;/li&gt;&lt;li&gt;Three references&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;More information about the focus of the work that the Google Policy Fellow will take on is&amp;nbsp;described below&lt;a href="#1"&gt;1&lt;/a&gt;.&amp;nbsp;More information about the Google Policy Fellowship program is available in the FAQ&lt;a href="#2"&gt;2&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name="1"&gt;Research Agenda &amp;nbsp;Outline&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The research proposals, and the fellowship itself, are to be anchored in the reality of the growing threat to civil liberties in cyberspace, with the consequent curbs on free expression that arise. The aim of the research is to chart out a comprehensive map of the legal and policy frameworks relating to free expression within the Asia-Pacific region and also examine people’s attitudes and ground-level movements relating to the same. This second component will necessarily involve some amount of empirical research: the fellows across different regions (for 2011, there will be fellows from India, Australia and Hong Kong) will be expected to use a survey on similar lines, so that the results could be adequately contrasted.&lt;/p&gt;
&lt;p&gt;The research would involve but not necessarily be limited to the following areas:&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Understanding Dissent&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;This component would involve looking at how dissent is negotiated in the region by the legal system and the ways in which governments seek to stifle and control online dissent. Specific points of interrogation would include:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The extent to which the constitution and other laws in the region protect freedom of expression and the extent to which they are enforced.&lt;/li&gt;&lt;li&gt;Judicial decisions relating to free expression, censorship and dissent. Have they examined how speech and other activities on the Internet should be afforded free speech protection?&lt;/li&gt;&lt;li&gt;The kind of material deemed objectionable and subject to censorship and/or penalization.&lt;/li&gt;&lt;li&gt;The kind of penalties placed on writers, commentators and bloggers for posting objectionable materials on the Internet.&lt;/li&gt;&lt;li&gt;Understanding the economic environment in which free expression operates: chains of media ownership, state restrictions on the means of journalistic production and distribution, and the levels of state control through allocation of advertising or subsidies would be part of this question.&lt;/li&gt;&lt;li&gt;Further, what are the laws relating to encryption and telecom security, as well as to intermediary liability, and how do they affect free expression?&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Understanding Free Expression&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;To be examined here is the question of how freedom of expression is perceived by people. What is the extent to which people believe the right is available to them — as balanced by conceivably conflicting rights such as privacy?&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;One part of proceeding on this would be to track a set of activist bloggers, gauging their take on various issues.&lt;/li&gt;&lt;li&gt;Another part would include tracking public opinion through comments pages on articles relating to free speech issues; taking a survey or coordinating focus group research. However, this is by no means the most reliable way to gauge the same and is, in particular, one area that will require an appropriate methodology to be developed by the fellows in consultation with the partner organizations.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Both these components are essential in being able to proceed with the third aspect, mentioned below.&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Understanding and Facilitating Movements&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;This final aspect will involve looking at how free expression advocates come together, or fail to do so.&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Is there a defined activist community in the region?&lt;/li&gt;&lt;li&gt;If not, what are the possible reasons behind failure of collaboration or organization? Have there been attempts towards the same?&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;&lt;a name="2"&gt;Frequently Asked Questions&lt;/a&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;What is the Google Policy Fellowship program?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Google Policy Fellowship program offers students interested in Internet and technology related policy issues with an opportunity to spend their summer working on these issues at the Centre for Internet and Society at Bangalore. Students will work for a period of ten weeks starting from June 2011. The research agenda for the program is based on legal and policy frameworks in the region connected to the ground-level perception of free expression.&lt;br /&gt;&lt;strong&gt;Applications for the Fellowship should carry these:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Statement of Purpose: A brief write-up outlining about your interest and qualifications for the programme including the relevant academic, professional and extracurricular experiences. As part of the write-up, also explain on what you hope to gain from participation in the programme and what research work concerning free expression online you would like to further through this programme. (About 1200 words max).&lt;/li&gt;&lt;li&gt;Resume&lt;/li&gt;&lt;li&gt;Three &amp;nbsp;references&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Important Dates&lt;br /&gt;&lt;/strong&gt;What is the program timeline?&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;March 27, 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Student application deadline; applications must be received by midnight 00:00 GMT.&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;April 18, 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;Student applicants are notified of the status of their applications.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;June 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;Students begin their fellowship with the host organization (start date to be determined by students and the host organization); Google issues initial student stipends.&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;July 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;Mid-term evaluations; Google issues mid-term stipends.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;August 2011:&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;Final evaluations; Google issues final stipends.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Eligibility&lt;span class="Apple-style-span"&gt;I am an International student can I apply and participate in the program?&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Are there any age restrictions on participating?&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Yes. You must be 18 years of age or older by 1 January 2011 to be eligible to participate in Google Policy Fellowship program in 2011.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Are there citizenship requirements for the Fellowship?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;For the time being, we are only accepting students eligible to work in India (e.g. Indian citizens, permanent residents of India, and individuals presently holding an Indian student visa. Google cannot provide guidance or assistance on obtaining the necessary documentation to meet the criteria.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Who is eligible to participate as a student in Google Policy Fellowship program?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In order to participate in the program, you must be a student. Google defines a student as an individual enrolled in or accepted into an accredited institution including (but not necessarily limited to) colleges, universities, masters programs, PhD programs and undergraduate programs. Eligibility is based on enrollment in an accredited university by 1 January 2011.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;I am an International student can I apply and participate in the program?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In order to participate in the program, you must be a student (see Google's definition of a student above). You must also be eligible to work in India (see section on citizen requirements for fellowship above). Google cannot provide guidance or assistance on obtaining the necessary documentation to meet this criterion.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;I have been accepted into an accredited post-secondary school program, but have not yet begun attending. Can I still take part in the program?&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;As long as you are enrolled in a college or university program as of 1 January 2011, you are eligible to participate in the program.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;I graduate in the middle of the program. Can I still participate?&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;As long as you are enrolled in a college or university program as of 1 January 2011, you are eligible to participate in the program.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;h3&gt;Payments, Forms, and Other Administrative Stuff&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;How do payments work*?&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Google will provide a stipend of USD 7,500 equivalent to each Fellow for the summer.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Accepted students in good standing with their host organization will receive a USD 2,500 stipend payable shortly after they begin the Fellowship in June 2011.&lt;/li&gt;&lt;li&gt;Students who receive passing mid-term evaluations by their host organization will receive a USD 1,500 stipend shortly after the mid-term evaluation in July 2011.&lt;/li&gt;&lt;li&gt;Students who receive passing final evaluations by their host organization and who have submitted their final program evaluations will receive a USD 3,500 stipend shortly after final evaluations in August 2011.&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;&lt;em&gt;Please note: Payments will be made by electronic bank transfer, and are contingent upon satisfactory evaluations by the host organization, completion of all required enrollment and other forms. Fellows are responsible for payment of any taxes associated with their receipt of the Fellowship stipend.&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;*&lt;em&gt;While the three step payment structure given here corresponds to the one in the United States, disbursement of the amount may be altered as felt necessary.&amp;nbsp;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;What documentation is required from students?&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Students should be prepared, upon request, to provide Google or the host organization with transcripts from their accredited institution as proof of enrollment or admission status. Transcripts do not need to be official (photo copy of original will be sufficient).&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;I would like to use the work I did for my Google Policy Fellowship to obtain course credit from my university. Is this acceptable?&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Yes. If you need documentation from Google to provide to your school for course credit, you can contact Google. We will not provide documentation until we have received a final evaluation from your mentoring organization.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Host Organizations&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;What is Google's relationship with the Centre for Internet and Society?&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Google provides the funding and administrative support for individual fellows directly. Google and the Centre for Internet and Society are not partners or affiliates. The Centre for Internet and Society does not represent the views or opinions of Google and cannot bind Google legally.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/google-policy-fellowship'&gt;https://cis-india.org/internet-governance/blog/google-policy-fellowship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-02T07:34:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/global-freedom-expression">
    <title>Global Challenges to Freedom of Expression</title>
    <link>https://cis-india.org/events/global-freedom-expression</link>
    <description>
        &lt;b&gt;The Centre for Culture, Media &amp; Governance, Jamia Millia Islamia, Delhi, Human Rights Law Network, Delhi and the Centre  for Internet &amp; Society, Bangalore are pleased to invite you to a public lecture by Mr. Frank La Rue, President of the Central American Institute for Studies of Social Democracy  and UN Special Rapporteur on Freedom of Expression on March 4, 2011, 6 pm at the Constitutional Club in New Delhi.
&lt;/b&gt;
        
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/frank_la_rue_121.jpg/image_preview" alt="Frank La Rue" class="image-inline" title="Frank La Rue" /&gt;&lt;/p&gt;
&lt;h3&gt;Frank La Rue&lt;/h3&gt;
&lt;p&gt;Mr. La Rue is the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression for the Office of the United Nations High Commissioner for Human Rights. &amp;nbsp;He has worked on human rights for the past 25 years. &amp;nbsp;He is the founder of the Centre for Legal Action for Human Rights (CALDH), both in Washington DC and Guatemala, which became the first Guatemalan NGO to bring cases of human rights violations to the Inter-American System. &amp;nbsp;CALDH was also the first Guatemalan NGO to promote economic, social and cultural rights. &amp;nbsp;Mr. La Rue also brought the first genocide case against the military dictatorship in Guatemala. &amp;nbsp;As a human rights activist, his name was presented to the Nobel Peace Prize committee in 2004.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;La Rue has previously served as a Presidential Commissioner for Human Rights in Guatemala, as a Human Rights Adviser to the Minister of Foreign Affairs of Guatemala and as a consultant to the Office of the High Commissioner for Human Rights. &amp;nbsp;He is President of Instituto Demos in Guatemala City. La Rue holds a BA in Legal and Social Sciences from the University of San Carlos, Guatemala and a postgraduate degree in U.S. foreign policy from Johns Hopkins University.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The entrance is free. Refreshments will be served from 5.30 pm onwards.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/global-freedom-expression'&gt;https://cis-india.org/events/global-freedom-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:17:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/fostering-freedom-of-expression">
    <title>Role of the Internet in Fostering Freedom of Expression and Strengthening Activism in India - A Workshop in Delhi</title>
    <link>https://cis-india.org/events/fostering-freedom-of-expression</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (India) and the Central American Institute for Studies of Social Democracy DEMOS (Guatemala) have the pleasure to invite you to a day-long workshop on the role of the Internet in fostering freedom of expression and strengthening activism in India. The workshop will take place in the Constitution Club in Delhi on 4 March 2011.&lt;/b&gt;
        
&lt;p&gt;With the significant role reported for new technologies in recent revolutions in Tunesia, Egypt, and elsewhere, activists in India, too, have taken a renewed interest in the potential of the Internet to support their struggles for social change and social justice. But what are some of the potential stumble blocks activists in India might run into in their exploration of the Internet's potential? What are the legal restrictions and frameworks activists should be aware of when they use new technologies in their work? And what can we do to create an environment in which the online world unequivocally supports efforts for greater democratisation and social justice offline, rather than thwart them?&lt;/p&gt;
&lt;p&gt;It is questions such as these that this workshop seeks to answer, through a mix of panel discussions, unconference sessions, a film screening, and technical and legal clinics in its day-long&amp;nbsp;program.&lt;/p&gt;
&lt;p&gt;Our hope is that the workshop will help participants as well as organisers to get a stronger sense of the potential and challenges of online activism in the particular context of India, as&amp;nbsp;well as to start building stronger networks among the activists interested in these issues in the country.&lt;/p&gt;
&lt;p&gt;Participation in the workshop is free. However, we would be grateful if you could confirm your attendance by emailing Anja Kovacs at "anja at cisindia dot org", ideally by 2 March.&lt;/p&gt;
&lt;p&gt;We hope you will join us to contribute your own insights and experiences as well as to learn from others about this important new arena of activists' work.&lt;/p&gt;
&lt;p&gt;Looking forward to welcoming you at the workshop!&lt;/p&gt;
&lt;h2&gt;The Agenda&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;9.30-9.45: &amp;nbsp; &amp;nbsp;Welcome and introductions&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;9.45-10.15: &amp;nbsp;&amp;nbsp;Introduction to the Internet and freedom of expression&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;By Frank La Rue, President of the Central American Institute for Studies of Social Democracy &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and UN Special Rapporteur for Freedom of Expression and Opinion&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10.15-10.45: Film screening: “Brave New Medium”&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;By Delhi-based docu film maker Subasri Krishnan&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The film addresses Internet and censorship in South-East Asia &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;while raising &amp;nbsp;pertinent questions about the implications of this lessons for Indian activists, &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and will be screened in the presence of the filmmaker.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10.45-11.30:&amp;nbsp;Unconference: Online challenges and ways forward for Indian activists: &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;where are we today and what to do next?&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Small group discussion sessions, as per the priorities of the participants&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;11.30-11.50: Tea/Coffee Break&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;11.50-12.40:&amp;nbsp;Reporting back and plenary discussion: Challenges for freedom of expression on &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;the Internet in&amp;nbsp;India and abroad: legal framework, ground realities, alternative visions&amp;nbsp;&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;With national and international activists, lawyers and researchers as additional resource persons&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;12.40-13.00:&amp;nbsp;Consultation: Can a global “Internet Bill of Rights” help?&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;With Lisa Horner, Dynamic Coalition on Internet Rights and Principles of the UN Internet&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Governance Forum&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;13.00 - 14.00:&amp;nbsp;Lunch Break (lunch will be provided)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;14.00 - 15.30:&amp;nbsp;Parallel sessions:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;legal clinic with a representative from Google and human rights lawyers – to answer any&amp;nbsp;legal question regarding freedom of expression online you may have&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;technical clinic with a representative from Tactical Tech – to explore the significance of terms like&lt;br /&gt;“Tor” and “proxy” and ways in which you can stay safe and secure online at all times.&amp;nbsp;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;If you have a laptop, bring it if you intend to attend this session!&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;15.30 - 16.15: Strategies for the way forward&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Moderated by Mr Frank La Rue&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;16.15-16.30 &amp;nbsp;:&amp;nbsp;Closing remarks&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;16.30 - 17.00: Tea/Coffee&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Followed by a public lecture by &lt;strong&gt;Mr. Frank La Rue&lt;/strong&gt; at 6 pm, at the same venue, on &lt;strong&gt;Global Challenges to Freedom of Expression&lt;/strong&gt;. Entrance free. All welcome.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h2&gt;Information about the Organisers&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;The Centre for Internet and Society&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society is located in Bangalore, India. It critically engages with concerns of digital pluralism and public accountability in the field of Internet and Society,&amp;nbsp;with particular emphasis on South-South dialogues and exchange. Through multidisciplinary research, intervention, and collaboration, it seeks to explore, understand, and affect the shape&amp;nbsp;and form of the internet, and its relationship with the political, cultural, and social milieu of our times.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DEMOS Institute&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Demos Institute, based in Guatemala, is a research centre that promotes democratic alternatives for Guatemala, under the human rights framework. Within DEMOS, there is a&amp;nbsp;research team which supports the mandate of Frank La Rue, United Nations Special Rapporteur on Freedom of Opinion and Expression, in the making of his annual reports before&amp;nbsp;the United Nations Human Rights Council.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/fostering-freedom-of-expression'&gt;https://cis-india.org/events/fostering-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:18:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-kids">
    <title>New Kids on the Blog</title>
    <link>https://cis-india.org/news/new-kids</link>
    <description>
        &lt;b&gt;Across the world, the blogosphere is shrinking. But that might not be a bad thing. Look closer, self-indulgence has found newer platforms, and only the fittest and the smartest blogs have survived. This article was published by the Indian Express on February 6, 2011. Indian Express reporter spoke with Nishant Shah.&lt;/b&gt;
        
&lt;p&gt;Meet aneesha, a personable 20-something in a red jacket, with a coffee “without cream” cupped in her hands. Seven years ago, this Delhi-based professional was an avid user of LiveJournal. Most of her friends are from the online world; she met their blogs before she knew them personally. “My family’s perception of me and what I am are very different,” she says, “I hide myself in the layers of the internet.” Aneesha found herself and her friends through blogs; today, however, she has no time or inclination for the blogging world. “We used to write about the sunshine, a cute dog, a nice day. Who has the time for that any more?”&lt;/p&gt;
&lt;p&gt;“I quit”. “We are moving out”. “This blog is Dead”.&lt;/p&gt;
&lt;p&gt;An aerial view of the blogosphere resembles an abandoned city, with silence blowing through boarded-up windows. Recent Pew Internet Project surveys of teens and adults in the US reveal a decline in blogging among teens and young adults and a modest rise among adults 30 and older. According to the 2010 report, “In 2006, 28 per cent of teens in the 12-17 age group, and adults between 18 and 29 were bloggers, but by 2009, the numbers had dropped to 14 per cent of teens and 15 per cent of adults. During the same period, the percentage of online adults over 30 who were bloggers rose from 7 per cent to 11 per cent.” These numbers reflect American reality, but the blogosphere has not been similarly mapped and analysed in India, says Nishant Shah, director, research, Centre for Internet and Society, Bangalore. When contacted, WordPress, a blog tool and publishing platform, said that they don’t publish country-specific statistics either.&lt;/p&gt;
&lt;p&gt;While blogging in itself seems to have peaked and plateaued, blog-like activities have moved to other online spaces. Blogs were at the social media forefront around five years ago. According to Technorati, an internet search engine for blogs, the blogosphere in 2004 was eight times as large as it was in June 2003. Since then, Blogger and WordPress have been stagnating, says Nielsen, a media-research firm. A 2010 article in The Economist pointed out, that according to Blogads, which sells ads, “media buyers’ inquiries increased tenfold between 2004 and 2008, but have grown by only 17 per cent since then.”&lt;/p&gt;
&lt;p&gt;But the numbers only tell a part of the story. The immensity of the blogging world means that it will always remain terra incognita. Its vastness allows poorly-written, lazily-reasoned dribbles to exist, but it also provides an unparalleled democratic platform (if you have access to the internet). The blogosphere, which had become an endless echo chamber, has evolved into a more interesting space, with startling diversity. Teenagers have found new fads, and moved out; instead, adults are setting up their couches here. Over the last four-five years, the fittest and smartest blogs have survived, whereas those with a readership of one have sunk to Google’s ocean floor. Few bloggers actually bother to delete their accounts, most starve away because of the author’s neglect and the audiences’ disinterest. The ones that have thrived have created communities of kindred souls, with an eye for beauty or a knack for the kooky. The Indian blogosphere is rich ground for posts on cinema, economics, sports, design and politics. Blogs can be conclaves of critics against the mainstream, they can be crucial support systems for the grieving. But how did we get here?&lt;/p&gt;
&lt;p&gt;Peter Merholz, a lover of words and etymologies, and founding partner of consultancy Adaptive Path, created the word “blog” in 1999.&lt;/p&gt;
&lt;p&gt;Playing with syllables, he decided to change “weblog” into “blog” for short. This San Francisco-based designer writes in his blog, “I like that it’s roughly onomatopoeic of vomiting. These sites (mine included!) tend to be a kind of information upchucking.”&lt;/p&gt;
&lt;p&gt;For something that started as verbal upchucking, blogging has evolved over the decade. Anupam Mukerji, aka the Fake IPL Player, whose blog was the sensational sideshow that overshadowed the second edition of the Indian Premier League in 2009, says, “Self-indulgence is out. People want to be entertained and nobody really cares what you had for breakfast.”&lt;/p&gt;
&lt;p&gt;In the early part of this decade, blogging was about self-expression, within a small community (like LiveJournal), says Aneesha. Kiran Jonnalagadda, a Bangalore-based social technologist, and founder of HasGeek, which organises technical discussions, recalls, “Your blog was not secret, but was private by virtue of not many people being online. It was a safe assumption for young people that their parents and siblings would never read their blog. The medium of the blog was the most advanced technology of the day. It was crude by modern standards, but fantastic compared to anything earlier.” Aneesha and Jonnalagadda abandoned LiveJournal after their initial euphoria. Today, it is said, only the Russians use it, since it was bought over by a Russian company in 2007.&lt;/p&gt;
&lt;p&gt;Blogging has come of age in India where we now see the growth of the “modern blogger”, says Jonnalagadda, one of the early Indian bloggers. “It’s important to distinguish between these two — the blogger as someone who indulged in self-expression in the early 2000s, who’s now moved to Facebook and other tools, versus the modern blogger who uses the same technology but is actually a small media publisher serving a niche segment.”&lt;/p&gt;
&lt;p&gt;Facebook and Twitter are dummy-friendly and easily satisfy the exhibitionist, the voyeur, the curious or the intellectual. In 2010, there were 152 million blogs on the internet; it doesn’t seem much in comparison to 600 million Facebook users. On Facebook, it takes just a few seconds to upload a picture. A “thumbs up” is all it takes to “like” a photo or a comment. A personal update becomes part of the newsflash on friends’ homepages. Facebook’s “Notes” can satisfy the desire to write long, random and personal outpourings. “Tagging” friends in these notes assures one of a readership. Sharing so little with so many has never been this effortless. Blogs, defined as a format of writing, where pieces are arranged in a reverse chronological order, are no longer the preferred tool for the personal.&lt;/p&gt;
&lt;p&gt;Technorati reports that the significant growth of mobile blogging is a key trend in 2010. Though the smartphone may still be relatively new in India, bloggers have reported that mobile blogging has lead to shorter posts and to a growing preference for Facebook and Twitter. Kiruba Shankar, CEO of Business Blogging Pvt Ltd, a social media consultancy in Chennai, and a once-prolific blogger, says, “Five years back, I was averaging two posts a day. In 2010, which was my worst year in blogging, I did one post every two months! It’s not that I stopped writing. I just moved my updates to Twitter and Facebook.” Shankar has even written an entire book in 140-character capsules on the merits of collaborative work: Crowdsourcing Tweet. He explains, “I love reading smaller books. I love tweeting my thoughts. I wanted to eat the elephant in smaller bites and so I jotted down points in tweets.”&lt;/p&gt;
&lt;p&gt;On the Web, none of these social mediums work in isolation, each is connected with the other. Facebook and Twitter have also become ways to promote blogs, with people often posting their links and thereby increasing their readership and the scope of the conversation.&lt;/p&gt;
&lt;p&gt;With blogs moving beyond the personal, the rise of the modern blogger writing for a niche audience is of particular interest. Mumbai-based Chandrahas Choudhury, author of The Middle Stage, a blog of essays on Indian and world literature, says, “Blogs have matured over the years in India. People who are serious have kept it. Lots of the press indulge in the criticism that blogs are not edited. But I’ve seen many great blogs. It’s a very good way of learning how to write good prose.” The Middle Stage provides an important space for literary criticism at a time when newspapers are squeezing out literary columns. Blogs give “maximum freedom”, says Choudhury, as one can increase the content through links; they also allow one to quote freely from other texts, which newspapers do not allow.&lt;/p&gt;
&lt;p&gt;Shankar emphasises that search engines give more importance to any site with fresh content, and that blogs have high “archival value”, compared with “Facebook or Twitter where old updates seem to fall off the face of the earth”. The Google requisite for new content has made the group blog a better option than the personal as it makes it easier to generate content regularly. Successful group blogs are making an impact.&lt;/p&gt;
&lt;p&gt;Little Design Book, “an online journal of design, visual culture and material culture”, is run by Ruchita Madhok, Aditya Palsule, Avinash Rajagopal and Shreyas Krishnan. The editors, who are based in London, New York, and Bangalore respectively, work collaboratively and communicate through Skype. Through smart and pithy posts, they describe designs that are too good to be true and those which are too awful to seem probable. On this team blog, art and design interact in meaningful ways, producing discussions and insights. Speaking from New York on the behalf of his team, Rajagopal feels that design blogs have taken off recently in India. “The Web is a great place to discuss design because it is an inherently democratic medium. Anyone can have their say.”&lt;/p&gt;
&lt;p&gt;Others, who have made use of the democratic and immediate nature of the internet, include Pavitra Mohan, who runs the successful blog Masala Chai, a “creative collective that features south Asian art and design”. These blogs about Indian art and design are few but they are playing an important role in the promotion and criticism of the arts. Mohan says, “There’s high art and low art. They are both provided a uniform platform on the Web.” Started three years ago, the blog recently became a physical reality, with Masala Chai opening its first outlet in Chennai.&lt;/p&gt;
&lt;p&gt;Rajagopal feels, however, that there’s still scope for editorialising content. “Many blogs post images of design objects, and say a few obligatory words. This has its necessary place in the blogging world. But we also need many strident, opinionated voices.”&lt;/p&gt;
&lt;p&gt;Strident voices with trenchant opinions ring in collective blogs like Kafila, run by no single CEO but by 22 members. Speaking only for himself and not on behalf of Kafila, Shivam Vij, writer and member, says, “Blogging is ‘self-publishing’. To read blogs (and today, together with social media) is to get an uncut view of what a society thinks, without the frame of the organised media. This allows people to use blogging and social media to influence opinion, and thus cause change, good or bad.”&lt;/p&gt;
&lt;p&gt;While blogs can be viewed as enjoyable entertainment or a platform for serious discussion and debate, blogs can also change lives. It can make famous the anonymous man stooped over a keyboard, with a prank in his head and spunk in his prose. Anupam Mukerji, the Fake IPL Player whose anonymous blog fooled thousands of cricket fans and administrators, and who revealed his identity in August last year, says, “I am still the same guy, but people respond to me differently. The blog changed my life.”&lt;/p&gt;
&lt;p&gt;Blogging was also the “perfect tonic” for actor Lisa Ray, who started writing The Yellow Diaries once she’d been diagnosed with multiple myeloma, a cancer of the white blood cells, in June 2009. Her blog posts, written with heart and without fuss, chronicled her battle with the disease, from being a “cancer intern” to a “cancer survivor”. In what ways did the blog help her? “In every way,” she says. “It helped me process what I was going through. It helped me be honest with myself and face my fears head on. It also helped me connect with others by sharing a very human experience. It helped dilute my fear.” Her blog also helped others, obvious in the hundreds of comments left by readers. Talking about readers’ responses, she says, “I do remember thinking that we suffer from the ‘pathology of perfection’ in contemporary society and the only antidote is to celebrate our ‘humanness’ in all forms. To embrace the hurt and pain as much as the joys and success.”&lt;/p&gt;
&lt;p&gt;Blogging was also a tonic for Indian Homemaker or Seema Rao, blogger and mother of Tejaswee Rao, a 19-year-old journalism student who passed away last year. Seema has been a frequent blogger for the last three years and now maintains her daughter’s blog In My Arrogant Opinion. She feels her daughter lives on through her presence on the Web. Sitting in a Gurgaon living room, surrounded by photos of her daughter, Rao says, “The family wanted a memorial gathering. But I know people will talk about her illness, they’ll say you should have gone to another hospital. I feel the blogosphere is more mature. A memorial would have been traumatic. I get support from bloggers, from people who don’t even know my name. On Tejaswee’s birthday, a mother in Hyderabad sent me a cake, with TJ written on it. I don’t know how I would have coped without the blogs.”&lt;/p&gt;
&lt;p&gt;The original article was published in the &lt;a class="external-link" href="http://www.indianexpress.com/news/new-kids-on-the-blog/746520/0"&gt;Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-kids'&gt;https://cis-india.org/news/new-kids&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T16:10:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mouse-a-tool-of-revolution">
    <title>Can the mouse be a tool of revolution in India?</title>
    <link>https://cis-india.org/news/mouse-a-tool-of-revolution</link>
    <description>
        &lt;b&gt;Do you consider yourself a ‘slacktivist’?” Vikram Sengupta considers the question for a couple of seconds, and then excuses himself. “I’ll call you back. I’m in the middle of something right now,” he says, and hangs up. Being called a ‘slacktivist’ is probably not very flattering, first thing in the morning or at any other time of the day. But this writer has been at the receiving end of endless mails from him, mails which sought to impose a burning moral imperative to sign up instantly and save the grand Canadian Musk Ox or the Mexican Dumpy Frog. The question, therefore, is not unjustified. &lt;/b&gt;
        
&lt;h3&gt;Activists vs slacktivists&lt;/h3&gt;
&lt;p&gt;The slick application of the word ‘slacktivist’ is the work of eminent scholar and author of The Net Delusion, Evgeny Morozov. Rather stinging in its import, it refers to people who, while campaigning for social causes, limit their action to the click of a mouse. In an earlier interview with DNA Sunday, Morozov was quick to clarify that he had nothing against online activism (activism through social-networking sites, websites, blogs and online petitions), “but I’d rather see the people signing (petitions) also join some offline political movements and campaign for change in the real world as much as they do in the virtual world,” he had said.&lt;/p&gt;
&lt;p&gt;Sengupta does call back. And when the question is put to him again, he says, “People can call me a ‘slacktivist’ if they want. Look, I don’t have a lot of time to devote to activism and I don’t even know if signing petitions actually works. But when I see that a simple click of mine might possibly help save a rainforest or rid the world of its nuclear arsenal, I can’t just cynically turn away. I don’t know… I feel uncomfortable doing it.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The phenomenon of ‘slacktivism’ elicits quite strong responses from the Indian activist community. People who grapple with the hard-knock realities of activism are not amused by the casual, momentary concern of the ‘slacktivist’.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Ashley Tellis is a freelance journalist, academic and gay rights activist. “The central limitation here is that one-click activism [slacktivism] becomes a substitute for sustained campaigns and engagement with persistent inequalities. The Indian middle-class, notorious for its apolitical and consumerist selfishness, can now feel smug and assuage its rotten conscience by thinking it has taken action on the net,” says Tellis, with some emotion.&lt;/p&gt;
&lt;p&gt;While Tellis castigates, in no uncertain terms, the seeming apathy of the middle-class, he also acknowledges its prodigious influence on the Indian socio-political mind space. “The middle-class is an important segment. It has power, it has English, and it has the ability to be heard,” he admits.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Middle class audience&lt;/h3&gt;
&lt;p&gt;While this helps when it is mobilised for a good cause, many find it problematic that so much influence is concentrated in the hands of a single segment of society. In fact, if you take online activism, the number of people who can be reached through the internet is staggeringly low.&lt;/p&gt;
&lt;p&gt;In a country of approximately 120 crore people, only about 5 crore [as per Indiastats.com] have access to the internet. Compare this to Tunisia, where the figure is an impressive 27%, or Egypt, where internet penetration is 16% [World Bank figures]. Given this lack of net access, more than 95% of Indians are taken out of consideration, in one fell swoop, when it comes to internet-specific activism strategies.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Anja Kovacs, a fellow at the Centre for Internet and Society says, “Most of these online campaigns are aligned to the profile of its audience.” She argues, in her essay ‘Inquilab 2.0?’ that if the audience is mostly urban and middle-class, it stands to reason that a majority of online campaigns would deal with issues that are relevant to this particular segment.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Kamayani Bali Mahabal, a lawyer and human rights activist, disagrees with this assessment. “Okay, the audience may be middle class, but the issues aren’t all middle class at all,” she counters indignantly. “Look at the ‘Say No to UID’ campaign — there is no debate or dialogue that has been initiated by Nandan Nilekani, the chairperson of UIDAI [Unique ID Authority of India], and this online campaign has created a platform where people’s issues and concerns can be clarified. Many believe that the UID will have a negative impact on the poor and the migrants; this campaign has gotten people to come together to discuss, debate and strategise as well,” she says.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;But Kovacs insists, “The fact remains that it is people from the middle-class who represent the voices of a largely silent majority. I find this model of activism questionable.” The accuracy of how the voiceless are being represented is a cause of concern for her, as is the very idea of a platform that denies a large section of a vibrant social democracy the chance to express themselves directly.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;The whole situation, Kovacs seems to indicate, is like Chinese whispers, where information might get altered in the retelling. “There are some innovative enterprises like CGNet Swara that tackle this problem. It’s a citizen journalism service, where ordinary citizens can both call in to record news as well as listen to the recorded messages. And they do put some selected messages online, but such enterprises are few and far between.” she says ruefully.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;An aid to offline activism&lt;/h3&gt;
&lt;p&gt;So as things stand, the internet is an indispensable tool to reach out to the influential Indian middle-class. Yet, given India’s socio-economic reality, it’s also a problematic and, in some cases, ineffective medium. Bali Mahabal, when asked how she reconciles these contradictions, says, “I am an offline as well as an online activist. These are not mutually exclusive roles. I straddle both worlds and I can multi-task!”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In fact, this is a strategy that a lot of offline activists are warming up to now. In 2010, Himanshu Kumar put up a video in which he said,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“To the people in the cities, I want to say that… you write something on the internet, it doesn’t make any difference to the government. Neither do people read the internet, nor does the government.” Coming from one of the leading advocates of tribal rights in the Chhattisgarh area, this video was a scathing indictment of online activists.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kumar, however, seems to have softened his stance on the issue since then. He still maintains that online activism by itself is not sufficient to bring about substantial change, but he speaks of how the internet helped him in his campaign in Dantewada.&lt;/p&gt;
&lt;p&gt;“When we were in Dantewada, it was almost like a different planet. We had no connection to the outside world except through the internet. It annoyed the police quite a bit because they knew that if they tried anything untoward, we could get the word out. So the internet is definitely a value addition to on-the-ground activism, but by itself, it has its limitations.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is clear that the internet as a platform for social activism is here to stay. As access to the net increases among Indians, so will its effectiveness. Kovacs, in her essay writes of a person who says, rather movingly, “I believe that… ordinary people can use this medium [internet] to actually make a difference, you know…to change the world.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But if activists want to live up to this unnamed person’s lofty expectations, they also need to be fully conscious of the limitations of the internet as a medium for social change.&lt;/p&gt;
&lt;p&gt;Read the original in DNA &lt;a class="external-link" href="http://www.dnaindia.com/india/report_can-the-mouse-be-a-tool-of-revolution-in-india_1507015"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mouse-a-tool-of-revolution'&gt;https://cis-india.org/news/mouse-a-tool-of-revolution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T16:26:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/what-are-you-accused">
    <title>What Are You Accused of? Find Out Online </title>
    <link>https://cis-india.org/news/what-are-you-accused</link>
    <description>
        &lt;b&gt;Starting Tuesday, police authorities in the Indian capital will make many crime reports, also known as First Information Reports, publicly accessible from its Web site. The report can be attained by entering details such as the name of the accused or victim and also the area where the crime took place. So far, no crime reports have been posted on the Web site.&lt;/b&gt;
        
&lt;p&gt;The step is meant to help people who have been accused of a crime, and who aren’t able to find out from police—or who are perhaps reluctant to approach a police station—find out what exactly they’re supposed to have done.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“In case a police officer refuses to reveal the First Information Report, the accused can get a copy online and defend himself,” Rajan Bhagat, Delhi police spokesman told India Real Time Tuesday.&lt;/p&gt;
&lt;p&gt;After police register a crime report, they’re supposed to carry out an investigation and then decide whether or not to bring charges.&lt;/p&gt;
&lt;p&gt;Mr. Bhagat said the crime reports were being put online to comply with a 35-page Delhi High Court &lt;a class="external-link" href="http://lobis.nic.in/dhc/DMA/judgement/06-12-2010/DMA06122010CRLW4682010.pdf"&gt;order&lt;/a&gt;&amp;nbsp;on December 6.&lt;/p&gt;
&lt;p&gt;“The liberty of an individual is inextricably linked with his right to be aware how he has been booked under law and on what allegations,” the court said at the time in an order that quotes Cuban revolutionary &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Jose_Marti"&gt;José Martí &lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Mr. Bhagat said the software for uploading the FIRs has been installed at all police stations across the capital. The crime report is supposed to be made available online within 24 hours after a crime is registered.&lt;/p&gt;
&lt;p&gt;Depending on whether the crime reports are searchable or not, and if people other than those named in the reports can access them, they could also prove useful for analyzing crime patterns in the city.&lt;/p&gt;
&lt;p&gt;Of course, there exists some ambiguity in the new process, including how many crime reports will actually end up being uploaded online.&lt;/p&gt;
&lt;p&gt;Crime reports for offences categorized as “sensitive” need not be uploaded. These include issues of terrorist acts, crimes relating to national security, rape, murder, kidnapping for ransom and “cases in which desperate gangsters are involved and there is the danger of witnesses or the complainant being intimidated,” the court order said.&lt;/p&gt;
&lt;p&gt;“We cannot reveal the identity of serious criminals; this can hamper the investigation process,” said Mr. Bhagat, adding that the decision for a crime report not to be uploaded must be made by a senior police officer together with a local magistrate from the area where the crime was committed.&lt;/p&gt;
&lt;p&gt;Some legal experts aren’t happy about the “selective” airing of information by the Delhi police.&lt;/p&gt;
&lt;p&gt;“The service would be a complete failure,” said Pinaki Misra, senior counsel at the Delhi High Court.&lt;/p&gt;
&lt;p&gt;Mr. Misra said the First Information Report is a public document–the first step towards registering criminal activity–and it should be freely accessible.&lt;/p&gt;
&lt;p&gt;“There’s no reason why such information should be deemed confidential and selectively uploaded,” he said.&lt;/p&gt;
&lt;p&gt;But others said there was good reason to avoid making a crime report public in some cases, such as to protect the identity of victims of sexual crimes, or even to protect suspects in cases where crimes could instigate violence against them.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Sunil Abraham, executive director at the Center for Internet and Society, a think-tank based in Bangalore, said the Delhi police’s new initiative was “a positive step with necessary safeguards.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;He added that the disclosure of too much information by police or other investigating agencies can sometimes lead to incidents of “mob justice,” pointing to recent occasions where bystanders have &lt;a class="external-link" href="http://www.hindustantimes.com/Serial-slasher-strikes-Talwar-outside-court/Article1-654743.aspx"&gt;attacked people&lt;/a&gt;&amp;nbsp;involved in highly publicized cases at their court appearances.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;“The onus now is on the Delhi police as to how and what they put it in actual practice,” Mr. Abraham said.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2011/02/01/what-are-you-accused-of-find-out-online/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/what-are-you-accused'&gt;https://cis-india.org/news/what-are-you-accused&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T16:48:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/january-2011-bulletin">
    <title>January 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/january-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! It gives us immense pleasure to present regular updates on the progress of our research on the mainstream Internet media. In this issue of we bring our latest project updates, news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Monographs finalised from these projects have been published on the CIS website for public review:&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;CIS has interest in developing Digital Identities as a core research area and looks at practices, policies and scholarships in the field to explore relationships between Internet, technology and identity.&lt;/p&gt;
&lt;h3&gt;Column on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following article was published in the Indian Express recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/h2E3Jd"&gt;Is That a Friend on Your Wall?&lt;/a&gt; [published in the Indian Express on 9 January 2010]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshop&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The third and final workshop in the Digital Natives with a Cause? research project will take place in Santiago, Chile, from the 8 to 10 February. Open Call and FAQs for the workshop are online:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/emKslL"&gt;Digital Natives with a Cause? Workshop in Santiago – An Open Call&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eCu2it"&gt;Digital Natives with a Cause? Workshop in Santiago – Some FAQs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry by Maesey Angelina&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Maesy Angelina is a MA candidate on International Development, specializing in Children and Youth Studies at the International Institute of Social Studies, Erasmus University of Rotterdam. She is working on her research on the activism of digital natives under the Hivos-CIS Digital Natives Knowledge Programme. She spent a month at CIS, working on her dissertation, exploring the Blank Noise Project under the Digital Natives with a Cause framework. She writes a series of blog entries. The latest is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hjbzB0"&gt;The Digital Tipping Point&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Announcement&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h92qtI"&gt;Rising Voices Seeks Micro-Grant Proposals for Citizen Media Outreach&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fgOaHa"&gt;Accessibility in Telecommunications&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Copyright, patents and trademarks are the most important components on the Internet. CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime. Our latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/igNQMW"&gt;New Release of IPR Chapter of India-EU Free Trade Agreement&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralised authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cybercrime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.” Within the larger field of Internet governance, the Internet Governance Forum (IGF), a multi-stakeholder policy dialogue forum that was instituted by the WSIS processes and that is their only formal outcome, has fast emerged as one of the key institutions.  As the definition quoted above indicates, a unique feature of the field of Internet governance is that, unlike many other governance spheres, it does not only involve governments.  Historically, not only governments but also the technical community and private players have played a crucial role in the development of the Internet.  In the context of the IGF, that role is not only explicitly acknowledged but also institutionalised as the IGF formally brings together governments, private players and civil society actors from all areas of and organisations involved in Internet governance. Moreover, now that the open and egalitarian potential of the Internet is increasingly under attack, this unique nature of the IGF, in addition to its WSIS roots, has made it a prime venue to remind stakeholders in all areas of Internet governance of the commitment they have made earlier to building a “people-centred, inclusive and development-oriented Information Society” (WSIS Geneva Principles, Para 1).  CIS involvement in the field of Internet governance has the following shape:&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fOB4sL"&gt;Jurisdictional Issues in Cyberspace&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS has undertaken many new and exciting projects. One of these, "Privacy in Asia", is funded by Privacy International (PI), UK and is being completed in collaboration with Society and Action Group. "Privacy in Asia" is a two-year project that commenced on 24 March 2010 and will complete within two years from the commencement date, unless otherwise agreed to by the parties. The project was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India.  In furtherance of these goals it aims to draft and promote an over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from "Privacy in Asia" CIS is also participating in the " Privacy and Identity"  project, which is funded by the Ford Foundation and managed by the Centre for Study of Culture and Society. The project is a research inquiry into the history of Privacy in India and how it shapes the contemporary debates around technology mediated identity projects like &lt;i&gt;Aadhaar&lt;/i&gt;. The "Privacy and Identity" project started in August 2010.&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eWxry1"&gt;Privacy Matters — Conference Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gocDqf"&gt;An Open Letter to the Finance Committee&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/privacy-UIDdec17"&gt;Does the UID Reflect India?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Staff Update&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Prashant Iyengar is a lawyer and legal scholar who has worked extensively on intellectual property issues particularly focusing on copyright reform and open access. He is a past recipient of an Open Society Institute fellowship for research into Open Information Policy, and has been affiliated with the Alternative Law Forum – a collective of lawyers in Bangalore engaged in human rights practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prashant joined the Centre for Internet and Society as a lead researcher in the Privacy India project recently.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this.&lt;/p&gt;
&lt;h3&gt;Column&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/grwFzq"&gt;The policy langurs&lt;/a&gt; [published on 6  January 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hcNWgX"&gt;Civic hackers seek to find their feet in India&lt;/a&gt; (Livemint, 24 January 2011) and (IndiaInfoline, January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/ihsya0"&gt;A Tweet and a poke from the CEO&lt;/a&gt; (Livemint, 24 January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/g19Yrv"&gt;Clicktivism &amp;amp; a brave new world order&lt;/a&gt; (Mail Today, 2 January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eiyWsT"&gt;Would it be a unique identity crisis&lt;/a&gt;? (Bangalore Mirror, 2 January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gnJNzc"&gt;Nel suk dei nativi digitali. Perché gli studenti 2.0 hanno bisogno di una bussola per orientarsi&lt;/a&gt; (Il Sore24 ORE, 2 January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fvn4Fw"&gt;A Refreshing Start!&lt;/a&gt; (Verveonline, Volume 19, Issue 1, January, 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/glcDk1"&gt;Getting Connected&lt;/a&gt; (Livemint, January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eN0Njz"&gt;Knowledge Warriors&lt;/a&gt; (Il Sore24 ORE, January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/f5m3fg"&gt;Nishant Shah Quoted in Livemint 2011 Tweet-out&lt;/a&gt; (Livemint, January 2011)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eti5N2"&gt;Digital Natives with a Cause? - Workshop in Chile seeks participants&lt;/a&gt; (Bahama islands info, 30 December 2010)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h1YBgf"&gt;Mothers discuss kids, music, fashions, on Net&lt;/a&gt; (The Hindu, 26 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://www.cis-india.org/"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Looking forward to hearing from you. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/january-2011-bulletin'&gt;https://cis-india.org/about/newsletters/january-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-30T11:25:44Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/privacy-conferencefeb5">
    <title>"Privacy matters"</title>
    <link>https://cis-india.org/events/privacy-conferencefeb5</link>
    <description>
        &lt;b&gt;Privacy India invites individuals to attend the second "Privacy matters" conference, a one-day event on the 5th February 2011 at the TERI Southern Regional Centre, Bangalore. Privacy India, Society in Action Group, and the Centre for Internet &amp; Society have joined hands to organize the event. &lt;/b&gt;
        
&lt;p&gt;The “Privacy matters” conference will focus on discussing the challenges to privacy that India is currently facing. The right to privacy in India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, e.g., the TRAI Act for telephony or RBI guidelines for banking, India does not as yet have a horizontal legislation that deals comprehensively with privacy across all contexts. This lack of uniformity has led to ironically imbalanced results. In India today one has a stronger right to privacy over telephone records than over one’s own medical records.&amp;nbsp; The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. – people who most need to know that sensitive information is protected.&lt;/p&gt;
&lt;p&gt;The emergence of information and communications technologies over the past two decades has radically transformed the speed and costs of access to information. However, this enhanced climate of access to information has been a mixed blessing. Whilst augmenting our access to knowledge, this new networked information economy has also now made it much easier, quicker, and cheaper to gain access to intimate personal information about individuals than ever before. As people expose more and more of their lives to others through the use of social networks, reliance on mobile phones, global trade, etc., there has emerged a heightened risk of privacy violations in India.&amp;nbsp; As privacy continues to be a growing concern for individuals, nations, and the international community, it is critical that India understands and addresses the questions, challenges, implications and dilemmas that violations of privacy pose.&lt;/p&gt;
&lt;h3&gt;Who We Are&lt;/h3&gt;
&lt;p&gt;Privacy India was set up in collaboration with The Centre for Internet and Society (CIS), Bangalore and Society in Action Group (SAG), under the auspices of the international organization ‘Privacy International.’&amp;nbsp; Privacy International is a non-profit group that provides assistance to civil society groups, governments, international and regional bodies, the media and the public in a number of countries (see www.privacyinternational.org).&amp;nbsp; Its Advisory Board is made up of distinguished intellectuals, academicians, thinkers and activists such as Noam Chomsky, the late Harold Pinter, and others, and it has collaborated with organizations such as the American Civil Liberties Union (ACLU).&lt;/p&gt;
&lt;h3&gt;'Privacy Matters' conference agenda&lt;/h3&gt;
&lt;p&gt;February 5th, 2011&amp;nbsp; ---&amp;nbsp; 10:30 am - 4:30pm&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;TERI Southern Regional Centre&amp;nbsp;&lt;/p&gt;
&lt;p&gt;4th Main, Domlur II Stage &lt;br /&gt;&amp;nbsp;Bangalore - 560 071&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;Item &lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10:30 -10:45&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Welcome Address&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Who is PI and what are our objectives &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Why is privacy important in India &lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;Prashant Iyengar (Lead Researcher at Privacy India)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;10:45-11:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Keynote&lt;/strong&gt;: Ashish Rajadhyaksha &lt;br /&gt;&lt;em&gt;(Senior Fellow, Centre for the Study of Culture &amp;amp; Society)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15-11:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 –12:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session I: Privacy and Open Government Data&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Property Rights, Privacy, and Open Government Data:&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;&lt;em&gt;Zainab Bawa (CIS-RAW Fellow) &lt;/em&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30 – 1:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session II: Privacy Rights and Minorities &amp;nbsp;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Privacy Rights of Sexualality Minorities:&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;&lt;em&gt;Arvind Narrain&lt;/em&gt; &lt;em&gt;(Alternative Law Forum)&lt;/em&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; Now you see her, now you don’t - Issues of sex workers and questions around privacy:&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;&amp;nbsp;Shubha Chacko (Sangama)&lt;/em&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;The UID and Refugees: &lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;Sahana Basavapatna&lt;/em&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:30 – 2:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:30 – 3:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session III: Identity and Privacy &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;&amp;nbsp; Malavika Jarayam (Jayaram &amp;amp; Jayaram) &amp;nbsp;&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;&amp;nbsp;Hamish Fraser (Partner at Truman Hoyle, Sydney Australia)&lt;/em&gt;&lt;em&gt;&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;&amp;nbsp; Michael Whitener (Principal and co-founder of VistaLaw International LLC)&lt;br /&gt;&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:00-3:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session IV:&amp;nbsp;&lt;/strong&gt; &lt;strong&gt;Privacy and the Media/Social Networking&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; Privacy and Social Networking:&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;&lt;em&gt;Ujjvala Ballal (Inclusive Planet)&lt;/em&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Privacy Issues in Social Networking Websites:&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;&lt;em&gt;Gagan K. (NLSIU law student)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30 – 3:45&lt;/td&gt;
&lt;td&gt;Tea break &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:45 – 4:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session V: Open discussion and opinion sharing&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;RSVP:&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;prashant@privacyindia.org&lt;/li&gt;&lt;li&gt;elonnai@privacyindia.org&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Download the poster &lt;a href="https://cis-india.org/advocacy/igov/privacy-bangalore-conference" class="internal-link" title="Privacy in Bangalore"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKn3xgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKn4lUA"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/privacy-conferencefeb5'&gt;https://cis-india.org/events/privacy-conferencefeb5&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:20:22Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/popular-myths-about-uid">
    <title>4 Popular Myths about UID</title>
    <link>https://cis-india.org/internet-governance/popular-myths-about-uid</link>
    <description>
        &lt;b&gt;By now, there is already a lot of material in the public domain that is critical about the UID/Aadhar project, writes Prashant Iyengar in this blog entry published in Privacy India on January 22, 2011.&lt;/b&gt;
        
&lt;p&gt;(See &lt;a class="external-link" href="http://aadhararticles.blogspot.com/"&gt;aadhararticles.blogspot.com&lt;/a&gt; for an exhaustive catalogue). Much of this material has criticized the UID for the ‘big brotherly’ techno-surveillance regime that it threatens to unleash, usually under the guise of delivering assured benefits to the marginal peasant. Many commentators have questioned the haste with which a project of this scale and complexity has sought to be pushed through. Some have expressed doubts on the feasibility – financial, technical or&amp;nbsp; logistical – of the scheme. Much of this material has criticized the UID for the ‘big brotherly’ techno-surveillance regime that it threatens to unleash, usually under the guise of delivering assured benefits to the marginal peasant. Many commentators have questioned the haste with which a project of this scale and complexity has sought to be pushed through. Some have expressed doubts on the feasibility – financial, technical or&amp;nbsp; logistical – of the scheme.&lt;/p&gt;
&lt;p&gt;I do not intend to rehearse these arguments in this post. Instead, I pick four somewhat obscure, but troublesome assertions made about the UID and test their veracity against documents available on the UIDIA site itself. The purpose is to cut through all the equivocation behind the claims that UID officials have been making, and arrive at some minimal clarity on what the UID is (and isn’t).&lt;/p&gt;
&lt;h3&gt;Registration is voluntary!&lt;/h3&gt;
&lt;p&gt;How does one make sense of Nandan Nilenkani’s cryptic remark, “I wouldn’t call it compulsory. I would rather say that it will become ubiquitous”?&lt;br /&gt;&lt;br /&gt;In a sense, this is true enough. Nowhere in the entire bulk of UID documentation will you encounter the express words “mandatory” or “compulsory”. Hence, proved!&amp;nbsp; But that isn’t to say, however, that there is any way you will be able to avoid getting registered.&lt;br /&gt;&lt;br /&gt;Very rapidly, accessing basic services and your very status as a citizen will be conditional on your possessing an Aadhar number. This is owing to the complex operational structure that the UID Scheme adopts which leaves the task of enrollment entirely in the hands of third party ‘Registrars’ who include a host of Central and State social security and welfare departments (including the Ministry of Rural Development which administers the Rural employment guarantee scheme), banks and insurance companies. There is nothing in the Aadhar Scheme that forbids these Registrars from making access to their services conditional on one’s consent to UID registration. In practice, many of them have and will continue to make UID registration a preliminary formality before access is granted to their services. So your ‘freedom’ to resist UID registration will depend on your ability to forego your minimum guarantee of the right to employment, cooking gas, banking and insurance services, food rations etc.&lt;br /&gt;&lt;br /&gt;And if miraculously you are able to subsist without these services, there is still one minor detail that is seldom mentioned in conversations about UID: without a UID number, you will not be counted as a citizen of India. This is owing to the fact that the Registrar General of India, the authority responsible for compiling the National Population Register of India under the Citizenship Act, also happens to be a ‘Registrar’ for the purposes of the UID. Which means that one’s registration in the NPR will entail automatic enrollment in the UID. The Citizenship (Registration of Citizens and Issue of National Identity Cards) Rules, 2003 makes it mandatory for everyone to be enrolled in the National Population Register. So, paradoxically, although the Aadhar number does not confer citizenship, one cannot be a citizen anymore without owning an Aadhar number.&lt;/p&gt;
&lt;p&gt;In other words, the UID scheme avoids the charge of being compulsory, by outsourcing its compulsion entirely.&lt;/p&gt;
&lt;h3&gt;The UID Scheme will only collect a minimal set of information&lt;/h3&gt;
&lt;p&gt;A frequently made assertion about the UID scheme is that the data collected will be limited to a standard set of information like one’s name, residence, date of birth, photo, all 10 finger prints and iris image. Once again, this is only a half truth. As mentioned previously, the entire process of enrollment is carried out through Registrars who have absolute freedom to expand the categories of information collected to include data that is entirely orthogonal to the purposes of the UID. This freedom is typically guaranteed by a clause in the MOUs which the UIDAI has signed with Registrars enabling them to collect additional data that “is required for their business or service”. Thus, for instance, in Himachal Pradesh, citizens are asked to provide additional details such as information about their ration cards, PAN cards, LPG connection and bank accounts[i]&lt;br /&gt;&lt;br /&gt;To employ a telling epithet found in one of the UID documents, the ‘Registrars own the process of enrollment’.&lt;/p&gt;
&lt;h3&gt;Privacy is guaranteed&lt;/h3&gt;
&lt;p&gt;Although the UIDAI makes repeated assertions regarding its intent to respect privacy and ensure data protection, the precise mechanism through which these objectives will be secured is extremely unclear.&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&amp;nbsp;To begin with, the entire responsibility for devising schemes for safeguarding information during the collection phase rests entirely on the Registrars. The UIDAI’s own responsibility for privacy begins only from the moment the information is transmitted to it by the Registrars – by which time the information has already passed through many hands including the Enrolling Agency, and the Intermediary who passes on information from the Registrar to the UIDAI.&lt;/li&gt;&lt;li&gt;Rather than setting out an explicit redressal mechanism and a liability regime for privacy violations, the UID’s documents stop at loosely describing the responsibility of the Registrars as a ‘fiduciary duty’ towards the resident/citizen’s information.&amp;nbsp; The Registrars are tasked with maintaining records of the data collected for a minimum period of six months. No maximum period is specified and Registrars are free to make what use of the data they see fit.&lt;/li&gt;&lt;li&gt;In addition, the Registrars are mandated to keep copies of all documents collected from the Resident either in physical or scanned copies “till the UIDAI finalizes its document storage agency.”[ii]&lt;/li&gt;&lt;li&gt;The ‘Data Protection and Security Guidelines’ which the UIDAI requires all Registrars to observe merely contains pious injunctions calling on them to observe care at all stages of data collection and to develop appropriate internal policies. There is mention of the desirability of external audits and periodic reporting mechanisms, but the details of these schemes are left to the individual Registrar to draw up.&lt;/li&gt;&lt;li&gt;Although the Draft National Identification Authority of India Bill penalizes the intentional disclosure or dissemination of identity information collected in the course of enrollment or authentication, this does not guard against accidental leaks and does not mandate the service providers to positively employ heightened security procedures. Prosecution of offences under the Act can only proceed with the sanction of the UID Authority, which further burdens the task of criminal enforcement in these cases and would make it difficult for individuals to obtain redress quickly. The total absence of a provision for civil remedies against Registrars makes it unlikely that they will take the task of protecting privacy seriously.&lt;/li&gt;&lt;li&gt;In other words, the individual’s right to privacy is only as strong as the weakest link in the elaborate chain of information collection, processing and storage.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;The UIDAI will not disclose any information and will only authenticate information with Yes/No answers&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;This is another of the frequently misleading claims made by the UID Authority. Thus, for instance, in April, 2010, in response to a question in the course of an interview, Nandan Nilekani said “UID itself has very limited fields, it has only four or five fields — name, address, date of birth, sex and all that. But it also does not supply this data to anybody. .. the only authentication you can get from our system is a yes or no. So, you can’t query and say what’s this guys name or what’s his date of birth, you can’t get all that.”[iii]&lt;br /&gt;&lt;br /&gt;This statement is, however belied by many of the UIDAI’s own documents.&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The draft NIA Bill, for instance, permits the Authority to issue regulations on the sharing of “the information of aadhaar number holders, with their written consent, with such agencies engaged in delivery of public benefits and public services as the Authority may by order direct”. In practice, prior “written consent” for sharing is obtained from the resident as a matter of course at the time of enrollment itself, and it is impossible to obtain an Aadhar number without consenting to sharing by the UID Authority.[iv] In practice, in India, a large number of forms will be filled in by assistants and the written consent box will be ticked as a matter of course without the resident understanding the full implications of her “consent”.&lt;/li&gt;&lt;li&gt;The draft NIA Bill permits the authority to “make any disclosure of information (including identity information) made in the interests of national security in pursuance of a direction to that effect issued by an officer not below the rank of Joint Secretary or equivalent in the Central Government after obtaining approval of the Minister in charge”. There is nothing in the Act that requires that this information be made available on an individual basis – in other words, it is possible for the data to be shared en-masse with any agency “in the interests of national security”.&lt;/li&gt;&lt;li&gt;There is nothing preventing “Registrars” who carry out the actual data collection functions from sharing this information with anyone they choose. Thus, for instance, the Aadhar information collected during the exercise of compiling the National Population Register will can be shared in whichever manner the Registrar General of India chooses – irrespective of what the UIDAI does with that information.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;So, while ordinarily, the UIDAI would not authenticate information other than giving Yes/No responses, there are mechanisms already in place that presume that all this information will be made available, on demand, to whichever agency that happens to be interested.&lt;/p&gt;
&lt;p&gt;[i] 2011. UID project picks up pace. Indian Express. Available at: &lt;a class="external-link" href="http://www.indianexpress.com/story-print/735790"&gt;http://www.indianexpress.com/story-print/735790&lt;/a&gt; [Accessed January 22, 2011].&lt;br /&gt;[ii] UIDAI – Document Storage Guidelines for Registrars Ver. 1.2, August 2010.&lt;br /&gt;[iii] 2010. To issue first set of UIDs by Feb 2011: Nilekani – CNBC-TV18 -. Money Control. Available at: &lt;a class="external-link" href="http://www.moneycontrol.com/news/business/to-issue-first-setuids-by-feb-2011-nilekani_449820-4.html"&gt;http://www.moneycontrol.com/news/business/to-issue-first-setuids-by-feb-2011-nilekani_449820-4.html&lt;/a&gt; [Accessed January 22, 2011].&lt;br /&gt;[iv] For instance, a flowchart of the Resident Enrollment Process issued by the UID stipulates&amp;nbsp; “Record Resident’s consent for Information Sharing” as the tenth step in the enrollment process. Unless this step is followed, the enrollment process cannot proceed!&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://privacy-india.org/2011/01/22/4-popular-myths-about-the-uid/"&gt;Click&lt;/a&gt; to read the original here&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/popular-myths-about-uid'&gt;https://cis-india.org/internet-governance/popular-myths-about-uid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-20T04:37:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
