<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2901 to 2915.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/events/charlotte-lapsansky-talk"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-fears-of-privacy-loss"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/moldova-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-dalwai-presentation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/transparency-mdgs-key-quotes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/no-uid-campaign"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/information-beautiful"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/july-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/internet-governance-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/freedom-of-expression"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/events/charlotte-lapsansky-talk">
    <title>A Talk by Charlotte Lapsansky</title>
    <link>https://cis-india.org/events/charlotte-lapsansky-talk</link>
    <description>
        &lt;b&gt;Charlotte Lapsansky will give a lecture on the "Mobile Voices project" at the Centre for Internet and Society, Bangalore on Thursday, 16 September 2010. &lt;/b&gt;
        
&lt;p&gt;Mobile Voices is an academic-community partnership to research and design a platform for low-wage immigrants in LA to publish stories about their lives and their communities directly from their mobile phones. This low-cost, open source, customizable, and easy to deploy multimedia mobile storytelling platform will be designed in collaboration with its users, and will help recent immigrants who lack computer access gain greater participation in the digital public sphere.&lt;/p&gt;
&lt;p&gt;In this talk, Charlotte will describe the Mobile Voices project and discuss key themes that have arisen for the Mobile Voices project team, including participatory technology design, community digital storytelling, and digital inclusion through mobile-phone based platforms. She will then describe the key technological and social issues that have arisen in the process of adapting Mobile Voices for India and the opportunities and challenges this presents.&lt;/p&gt;
&lt;h2&gt;About Charlotte Lapsansky&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Charlotte_Lecture.jpg/image_preview" alt="Charlotte" class="image-inline image-inline" title="Charlotte" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Charlotte Lapsansky&lt;/strong&gt; is a PhD Candidate and American Association of University Women Dissertation Fellow at the Annenberg School for Communication at the University of Southern California. Charlotte has a background in development communication and mass media campaigns addressing gender and health in India. At Annenberg, her research interests include communication for social change, participatory development communications, community mobilization and strategic campaign planning. For the past two years, she has been a team member for Mobile Voices, a participatory project which has created a Drupal-based digital storytelling platform for first-generation, low-wage migrant workers in Los Angeles, allowing them to create and publish stories about their communities directly from their mobile phones. &amp;nbsp;Currently, Charlotte is collaborating with organizations in India to customize and adapt the mobile voices platform social endeavours in India. &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKHrycA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKHsE8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKHsTgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKH%2BD0A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKIm3UA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKInF4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKInR8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKIomIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKI9FQA"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/charlotte-lapsansky-talk'&gt;https://cis-india.org/events/charlotte-lapsansky-talk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-22T07:41:20Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-fears-of-privacy-loss">
    <title>INDIA Fears of Privacy Loss Pursue Ambitious ID Project </title>
    <link>https://cis-india.org/news/india-fears-of-privacy-loss</link>
    <description>
        &lt;b&gt;Fears about loss of privacy are being voiced as India gears up to launch an ambitious scheme to biometrically identify and number each of its 1.2 billion inhabitants.&lt;/b&gt;
        
&lt;p&gt;In September, officials from the Unique Identification Authority of India (UIDAI), armed with fingerprinting machines, iris scanners and cameras hooked to laptops, will fan out across the towns and villages of southern Andhra Pradesh state in the first phase of the project whose aim is to give every Indian a lifelong Unique ID (UID) number.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The UID is soft infrastructure, much like mobile telephony, important to connect individuals to the broader economy," explains Nandan Nilekani, chairman of the UIDAI and listed in 2009 by Time magazine as among the world's 100 most influential people.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Nilekani is a co-founder of the influential National Association of Software and Services Companies and, before this assignment, chief of Infosys Technologies, flagship of India's information technology (IT) sector.&lt;/p&gt;
&lt;p&gt;According to Nilekani, the UID will most benefit India's poor who, because they lack identity documentation, are ignored by service providers.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The UID number, with its 'anytime, anywhere' biometric authentication, addresses the problem of trust," argues Nilekani.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;But a group of prominent civil society organisations are running a Campaign For No-UID, explaining that it is a "deeply undemocratic and expensive exercise" that is "fraught with unforeseen consequences."&lt;/p&gt;
&lt;p&gt;Participants in the campaign include well-known human rights organisations such as the Alternative Law Forum, Citizen Action Forum, People's Union for Civil Liberties, Indian Social Action Forum, and the Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;A meeting was organised by the campaigners in New Delhi on Aug. 25 where speakers ridiculed the idea of a 12-digit number, and said it is unlikely to rectify, for example, the massive corruption in the public distribution system that is supposed to provide food to poor families.&lt;/p&gt;
&lt;p&gt;J.T. D'Souza, an IT expert, asserted at the meeting that the use of biometrics on such a massive scale has never been attempted before and is bound to be riddled with costly glitches.&lt;/p&gt;
&lt;p&gt;Other speakers raised issues of security and the possibility of hackers getting at databases and passing on information to commercial outfits, intelligence agencies or even criminal gangs.&lt;/p&gt;
&lt;p&gt;In talks and television interviews, Nilekani has maintained that the benefits of the UID project far outweigh its risks. "It's worth taking on the project and trying to mitigate the risks so that we get the outcomes we want," he told the CNN-IBN television channel in an interview.&lt;/p&gt;
&lt;p&gt;But the possibility of religious profiling by state governments or misuse by caste lobbies is real. This is because the central government has decided to include caste as a category in the UID questionnaire to be filled out by applicants.&lt;/p&gt;
&lt;p&gt;Because identity is already a potent issue and the trigger for frequent identity-related conflict – such as the 2002 anti-Muslim riots in Gujarat that left 2,000 people dead – any exercise that enhances identification is fraught.&lt;/p&gt;
&lt;p&gt;Usha Ramanathan, a prominent legal expert who is attached to the Centre for the Study of Developing Societies in the national capital, does not buy the UIDAI's assurances.&lt;/p&gt;
&lt;p&gt;At the Aug. 25 meeting, Ramanthan said that while enrolling with the UIDAI may be voluntary, other agencies and service providers might require a UID number in order to transact business. Indeed, the UIDAI has already signed agreements with banks, state governments and hospital chains which will allow them to ask customers for UIDs.&lt;/p&gt;
&lt;p&gt;Ramanathan said that, taken to its logical limit, the UID project will make it impossible, in a couple of years, for an ordinary citizen to undertake a simple task such as travelling within the country without a UID number.&lt;/p&gt;
&lt;p&gt;The UIDAI will work with the National Population Register (NPR) which draws its powers from the Citizenship Rules of 2003 and provides for penalties if information is withheld.&lt;/p&gt;
&lt;p&gt;And as a government website says: "Certain information collected under the NPR will be published in the local areas for public scrutiny and invitation of objections." Seeking to allay privacy fears, the website goes on to explain that this is merely "in the nature of the electoral roll or the telephone directory."&lt;/p&gt;
&lt;p&gt;But things begin to look ominous when seen in the context of the National Intelligence Grid (NATGRID), the setting up of which home minister P. Chidambaram announced in February as part of his response to a major terrorist attack.&lt;/p&gt;
&lt;p&gt;Chidambaram said NATGRID would tap into 21 sets of databases that will be networked to achieve "quick, seamless and secure access to desired information for intelligence and enforcement agencies."&lt;/p&gt;
&lt;p&gt;He added that NATGRID will "identify those who must be watched, investigated, disabled and neutralised."&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"Internationally only a few countries have provided national ID cards because of the unsettled debate on privacy and civil liberties," says Prof. R. Ramakumar at the Tata Institute of Social Sciences in Mumbai. He added that several countries have had to withdraw ID card schemes or drop biometric aspects because of public opposition.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Nilekani maintains that the main purpose of the UID project is to empower the vast numbers of excluded Indians. "For the poor this is a huge benefit because they have no identities, no birth certificates, degree certificates, driver's licences, passports or even addresses." (END/2010)&lt;/p&gt;
&lt;p&gt;Read the original news in&amp;nbsp;&lt;a class="external-link" href="http://www.ipsnews.net/print.asp?idnews=52731"&gt;IPS&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-fears-of-privacy-loss'&gt;https://cis-india.org/news/india-fears-of-privacy-loss&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T10:00:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/moldova-online">
    <title>Moldova Online: An Interview with Victor Diaconu</title>
    <link>https://cis-india.org/internet-governance/blog/moldova-online</link>
    <description>
        &lt;b&gt;In this interview for Russian Cyberspace, set up with the help of Sunil Abraham (Executive Director at the Centre for Internet and Society in Bangalore, India), computer software professional Victor Diaconu explains the nature of Internet use, state control and the development of blogging and social media platforms in Moldova. Victor works at Computaris in Chisinau. He is Moldova educated, and has travelled to several western countries (including lengthy stays to US, UK) to learn about and understand what there is to be done in Moldova. Sudha Rajagopalan interviewed Victor Diaconu.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: After the 2009 elections, there was some talk of reform in Moldova and greater transparency, but now one also hears contradictory reports of increasing authoritarian tendencies. &amp;nbsp;Is this ambivalence evident in the way the internet is regulated and used here?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: I would not say the tendencies are authoritarian. The constitution says that the President should be voted in by a majority of 61 out of 101 members of the Parliament. If not, Parliament should be dissolved and re-elected. Well, this should happen twice a year at the most, and as such, after a second failed attempt to vote the President the authority of the Parliament and Government is somewhat questionable. The current Parliament has tried to change the rules of voting in the President - to make it by popular vote, for instance, but this is met with resistance from the Communist Party.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As to transparency - I would say it has improved. Though, one should not expect too many changes from a Government with questionable authority and with so many systemic flaws inherited from the previous government. At the moment we've got a coalition government. As such, there are frictions and these are indeed visible. This gives a sense of comfort and truthfulness since it is normal to have frictions in any human endeavour. While the communist party was ruling - everything was "nice and dandy" both in media and in political affairs and one could not get anything but "fake" - fake news, fake results, fake improvements.&lt;/p&gt;
&lt;p&gt;Internet control and filtering do not happen. In fact, we did have a "small revolt" on April 7, 2009, when it seemed the communist party had tried to steal the vote for the parliament. At that moment a few .md sites were blocked by the national Telecom operator, but most other sites were still available. In fact, news about the event was best available on twitter (might still be available under "pman" tags). There also were a few attempts to stifle free speech when authorities requested names/IP addresses of commenters on some forums. However, this is no longer conceivable ...&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: Given that the press and television are largely in the hands of the state and criticism of the state is considered defamation (and leads to the arrest of press people), does the internet play a special role as a space for alternative media and political blogs? Are these prevalent and influential?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: Yes, national TV is largely state owned and it was worse before the change in power. Now it seems to have improved. There are a series of smaller TV stations but these have reduced coverage - mostly in bigger cities. I understand that they've started rolling out IP TV with packages of 50+ TV channels - local and international. The national Telecoms operator provides very good Internet coverage. Dial-up Internet at reasonable prices is available everywhere in the country. Broadband availability even in rural areas is very good. And it's not too expensive. As to the role of Internet - indeed its influence is increasing. A series of media portals are frequented by many, including me. http://unimedia.md/; http://m.protv.md/; http://jurnaltv.md/; http://forum.md/to mention a few. The news here is conveyed tersely &amp;nbsp;but I do my own editorializing if need be. Also, I can read the comments if I want to get a feeling about how others feel about some specific event.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: Can you tell us about some of the popular bloggers and blogging platforms in Moldova? Live Journal is popular in Russia; can the same be said of Moldova?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: I'm not aware of any significant blogger, more so, political blogger. I'd say we still need to wait for someone whose commentary is mature enough for people to care about him or her... As to the platform - those blogging attempts that I've seen were indeed on major blogging portals like Live Journal.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: What can you tell us about the presence of social media in Moldova? Does Moldova prefer its own versions of global digital platforms, or are FB, My Space, Twitter popular here? &amp;nbsp;What is the role of the diaspora in this space?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: Global platforms are widely used. There are a few Russian popular platforms in wide use too, such as odnoklassniki.ru. We have up to 1 million Moldovans working in European countries, Russia and other places, since the pay is significantly higher over there. These people left a few years back and most of them intend to return. And they, indeed, rely on the available platforms to relate back to relatives and friends.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: Lastly, can you tell us about the linguistic landscape of Moldovan new media; I imagine the most widely used language on the internet is Moldovan/Romanian. Is Russian prevalent or is new media here a platform to assert their exclusive Moldovan identity?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: The rules for language are that media should have at least 60-70% of content in "state" language and the law was often changed so that sometimes 'state language’ included Russian too. &amp;nbsp;In fact, in Moldova we are very comfortable with the Russian language, at least those a bit older (30+ years) since we were supposed to speak it well in the Soviet era. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt; (with many thanks to Victor Diaconu and Sunil Abraham)&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;About Sudha Rajagopalan&lt;/h3&gt;
&lt;p&gt;Sudha Rajagopalan is the deputy editor of &lt;a class="external-link" href="http://www.digitalicons.org/"&gt;Digital Icons: Studies in&amp;nbsp;Russian, Eurasian and Central European New Media&lt;/a&gt;&amp;nbsp;and co-blogger at &lt;a class="external-link" href="http://russ-cyberspace.livejournal.com/"&gt;Russian Cyberspace&lt;/a&gt;.&amp;nbsp;Sudha is also a &amp;nbsp;Research Affiliate&amp;nbsp;with the Media Studies Group at the University of Utrecht in the&amp;nbsp;Netherlands. Her current research is on audience and fan communities&amp;nbsp;on Runet (the Russian-language internet), with a special interest in&amp;nbsp;identity, performativity and affect in online practices. Sudha&amp;nbsp;obtained her PhD in Russian History from Indiana University,&amp;nbsp;Bloomington (2005). She is the author of 'Leave Disco Dancer Alone:&amp;nbsp;Indian Cinema and Soviet Movie-going after Stalin,' Yoda Press, 2008&amp;nbsp;('Indian Films in Soviet Cinemas: The Culture of Movie-going after&amp;nbsp;Stalin,' Indiana University Press, 2009).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/moldova-online'&gt;https://cis-india.org/internet-governance/blog/moldova-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sudha Rajagopalan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:10:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-dalwai-presentation">
    <title>Presentation of the UID project by Ashok Dalwai – A Report</title>
    <link>https://cis-india.org/internet-governance/blog/uid-dalwai-presentation</link>
    <description>
        &lt;b&gt;On Tuesday, 7 September 2010, Ashok Dalwai, the Deputy Director General of the Unique Identification of India (UIDAI), gave a lecture at the Indian Institute for Science in Bangalore. Representing the UID Authority, his presentation explained the vision of the project and focused on the challenges involved in demographic and biometric identification, the technology adopted, and the enrolment process. Elonnai Hickok gives a report of his presentation in this blog post.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-dalwai-presentation'&gt;https://cis-india.org/internet-governance/blog/uid-dalwai-presentation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:09:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion">
    <title>Beyond Access as Inclusion</title>
    <link>https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion</link>
    <description>
        &lt;b&gt;On 13 September, the day before the fifth Internet Governance Forum opens, CIS is coorganising in Vilnius a meeting on Internet governance and human rights. One of the main aims of this meeting is to call attention to the crucial, yet in Internet governance often neglected, indivisibility of rights. In this blog post, Anja Kovacs uses this lens to illustrate how it can broaden as well reinvigorate our understanding of what remains one of the most pressing issues in Internet governance in developing countries to this day: that of access to the Internet.&lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;One of the most attractive characteristics of the
Internet – and perhaps also one of the most debated ones – is its
empowering, democratising potential. In expositions in favour of
access to the Internet for all, this potential certainly often plays
a central role: as the Internet can help us to make our societies
more open, more inclusive, and more democratic, everybody should be
able to reap the fruits of this technology, it is argued. In other
words, in debates on access to the Internet, most of us take as our
&lt;em&gt;starting point&lt;/em&gt; the desirability of such access, for the above
reasons. But how justified is such a stance? Is an Internet-induced
democratic transformation of our societies what is actually happening
on the ground?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;I would like to move away, in this blog post, from
the more traditional approaches to the issue of access, where debates
mostly veer towards issues of infrastructure (spectrum, backbones,
last mile connectivity, …) or, under the banner of “diversity”,
towards the needs of specific, disadvantaged communities (especially
linguistic minorities and the disabled). To remind us more sharply of
the issues at stake and of the wide range of human rights that need
our active attention to make our dreams a reality, I would like to
take a step back and to ask two fundamental questions regarding
access: why might access be important? And what do we actually have
access to?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Let me start, then, by exploring the first question:
why, actually, is Internet access important? In his canonical work on
the information age, and especially in the first volume on the rise
of the network society, Manuel Castells (2000) has perhaps provided
the most elaborate and erudite description of the ways in which new
technologies are restructuring our societies and our lives. We are
all all too familiar with the many and deep-seated ways in which the
Internet changes the manner in which we learn, play, court, pay, do
business, maintain relationships, dream, campaign. And yet, the exact
nature of the divide created by the unequal distribution of technical
infrastructure and access, despite being so very real, receives
relatively little attention: this divide is not simply one of
opportunities, it is crucially one of power. If in traditional
Marxist analysis the problem was that the oppressed did not have
access to the means of production, today, one could well argue, the
problem is that they do not have access to the means of communication
and information.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Indeed, the Internet is not something that is simply
happening to us: there are people who are responsible for these new
evolutions. And so it becomes important to ask: who is shaping the
Internet? Who is creating this new world? Let us, by way of example,
consider some figures relating to Internet use in India. So often
hailed as the emerging IT superpower of the world, there are, by the
end of 2009, according to official government figures, in this
country of 1 billion 250 million people slightly more than 15 million
Internet connections. Of these, only slightly more than half, or
almost 8 million, are broadband connections – the rest are still
dial-up ones (TRAI 2010). The number of Internet users is of course
higher – one survey estimates that there are between 52 million and
71 million Internet users in urban areas, where the bulk of users is
still located (IAMAI 2010). But while this is a considerable number,
it remains a fraction of the population in a country so big. What
these figures put in stark relief, then, is that the poor and
marginalised are not so much excluded from the information society
(in fact, many have to bear the consequences of new evolutions made
possible by it in rather excruciating fashion), but rather, that they
are fundamentally excluded from shaping the critical ways in which
our societies are being transformed.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To have at least the possibility to access the
Internet is, then, of central significance in this context for the
possibility of participation it signals in the restructuring of our
societies at the community, national and global level, and this in
two ways: in the creation of visions of where our societies should be
going, and in the actual shaping of the architecture of our societies
in the information age.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;If we agree that access attains great significance
in this sense, then a second question poses itself, and that is: in
practice, what exactly are we getting access to? This query should be
of concern to all of us. With the increasing corporatisation of the
Internet and the seemingly growing urges of governments on all
continents to survey and control their citizens, new challenges are
thrown up of how to nurture the growth of open, inclusive, democratic
societies, that all of us are required to take an interest in.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Yet it is in the case of poor and marginalised
people that the challenges are most pronounced.&amp;nbsp; Efforts to
include them in the information society are disproportionately
legitimised on the basis of the contribution these can make to
improving their livelihoods. Initiatives, often using mobile
technology, that allow farmers to get immediate information about the
market prices of the produce they are intending to sell, are perhaps
the most well-known and oft-cited examples in this category. Other
efforts aim to improve the information flow from the government to
citizens: India has set up an ambitious network of Common Service
Centres, for example, that aim to greatly facilitate the access of
citizens to particular government services, such as obtaining birth
or caste certificates – and going by first indications, this also
seems to be succeeding in practice. Only rarely, however, do
initiatives to “include” the poor in the information society
address them as holistic beings who do not only have economic lives,
but political, emotional, creative and intellectual existences as
well.&amp;nbsp; This is not to say that economic issues are not of
importance. But by highlighting only this aspect of poor people's
lives, we promote a highly impoverished understanding of their
existences.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The focus on a limited aspect of the poor's identity
- important as that aspect may be - has a function, however: it makes
it possible to hide from view the extremely restrictive terms on
which poor people are currently being integrated into the information
society. Even initiatives such as the Common Service Centres are in
fact based on a public-private-partnership model that explicitly aims
to “align [..] social and commercial goals” (DIT 2006: 1), and in
effect subordinates government service design to the requirements of
the CSC business model (Singh 2008). The point is not simply that we
need strong privacy and data protection policies in such a context –
although we clearly do. There is a larger issue here, which is that
efforts to include the poor in the information society, in the
present circumstances, really seem to simply integrate them more
closely into a capitalist system over which they have little control,
or to submit them to ever greater levels of government and corporate
surveillance. Their own capacity to give shape to the system in which
they are “included”, despite the oft-heralded capacities of the
Internet to allow greater democratic participation and to turn
everybody into a producer and distributor, as well as a consumer,
remains extremely limited.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such tendencies have not gone unnoticed. For
example, unlike in many other parts of the world, social movements in
India fighting against dams, special economic zones or mining
operations in forest areas - all initiatives that lead to large-scale
displacement – have not embraced technology as enthusiastically as
one might have expected. There are various reasons for this. Within
Indian nationalism, there have always been strands deeply critical of
technology, with Gandhi perhaps their most illustrious proponent. But
for many activists, technology often also already comes with an
ideological baggage: an application such as Twitter, for example, in
so many of its aspects is clearly manufactured by others, for others,
drawing on value sets that activists often in many ways are reluctant
to embrace. And such connotations only gain greater validity because
of the intimate connections that exist in India between the IT boom
and neoliberalism: technology has great responsibility for many of
the trends and practices these activists are fighting against. While
the Internet might have made possible many new publics, most
movements do not – as movements – recognise these publics as
their own (Kovacs, forthcoming).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To some extent, these are of course questions of the
extent of access that people are granted. But they also raise the
important issue of the value structure of the Internet. Efforts at
inclusion always take for granted a standard that is already set. But
what if the needs and desires of the many billions that still need to
be included are not served by the Internet &lt;em&gt;as it exists&lt;/em&gt;? What
if, for it to really work for them, they need to be able to make the
Internet a different place than the one we know today? While it is
obvious that different people will give different answers in
different parts of the world, such debates are complicated
tremendously by the fact that it is no longer sufficient to reach a
national consensus on the issues under discussion, as was the case in
earlier eras. The global nature of the Internet's infrastructure
requires that the possibility of differing opinions, too, needs to be
facilitated at the global level. What are the consequences of this
for the development of democracy?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;For access to the Internet to be substantively
meaningful from a human rights perspective in the information age, it
is crucial, then, that at a minimum, the openness of the Internet is
ensured at all levels. Of course, openness can be considered a value
in itself. But perhaps more importantly, at the moment, it is the
only way in which the possibility of a variety of answers to the
pressing question of what shape our societies should take in the
information age can emerge. Open standards and the portability of
data, for example, are crucial if societies are to continue to decide
on the role corporations should play in their public life, rather
than having corporations &lt;em&gt;de facto&lt;/em&gt; rule the roost. Similarly,
under no circumstances should anyone be cut off from the Internet, if
people are to participate in the public life of the societies of
which they are members. And these are not just concerns for
developing countries: if recent incidents from France to Australia
are anything to go by, new possibilities facilitated by the Internet
have, at least at the level of governments, formed the impetus for a
clear shift to the right of the political spectrum in many developed
countries. In the developed world, too, the questions of access and
what it allows for are thus issues that should concern all. In the
information age, human rights will only be respected if such respect
is already inscribed in the very architecture of its central
infrastructure itself.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;List of References&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Castells, Manuel (2000). &lt;em&gt;The Rise of the Network
Society, 2&lt;sup&gt;nd&lt;/sup&gt; edition&lt;/em&gt;. Oxford: Blackwell.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Department of Information Technology (DIT) (2006).
&lt;em&gt;Guidelines for the Implementation of Common Services Centers
(CSCs) Scheme in States&lt;/em&gt;. New Delhi: Department of Information
Technology, Government of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Internet and Mobile Association of India (IAMAI)
(2010). &lt;em&gt;I-Cube 2009-2010: Internet in India&lt;/em&gt;. Mumbai: Internet
and Mobile Association of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Kovacs, Anja (forthcoming). &lt;em&gt;Inquilab 2.0?
Reflections on Online Activism in India&lt;/em&gt; (working title).
Bangalore: Centre for Internet and Society.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Singh, Parminder Jeet (2008). &lt;em&gt;Recommendations for a
Meaningful and Successful e-Governance in India&lt;/em&gt;. IT for Change Policy
Brief, IT for Change, Bangalore.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Telecom Regulatory Auhority of India (TRAI) (2010).
&lt;em&gt;The Indian Telecom Services Performance Indicators,
October-December 2009&lt;/em&gt;. New Delhi: Telecom Regulatory Auhority of
India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion'&gt;https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>human rights</dc:subject>
    

   <dc:date>2011-08-02T07:29:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008">
    <title>Cybercrime and Privacy </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008</link>
    <description>
        &lt;b&gt;Elonnai Hickok examines privacy in the context of India’s legal provisions on cybercrime. She picks up the relevant provisions of the Information Technology Act as amended in 2008 dealing with cyber crimes and provides a fair analysis of the pros and cons of the amended Act.  &lt;/b&gt;
        
&lt;h2&gt;What is Cybercrime?&lt;/h2&gt;
&lt;p&gt;Looking at the recent &lt;a class="external-link" href="http://www.bbc.co.uk/news/technology-10796584"&gt;Facebook ‘break in’ where 100,000 of users’ information was downloaded&lt;/a&gt; and made accessible through a simple search engine,&amp;nbsp;, and t&lt;a class="external-link" href="http://www.bbc.co.uk/news/10473495"&gt;he new Microsoft virus that attacked 10,000 machines&lt;/a&gt;, it is clear that cybercrime is no longer an issue to be taken lightly. Cybercrime is defined as an unlawful act committed using a computer either as a tool or as a target (or both) for facilitating a crime. Although there is an overlap, some are more likely to use the computer as a tool, and others use it as a target. Examples of the former include: fraud, forgery, DOS, consumption of limited resources, cyberterrorism, IPR violations, software piracy, copyright infringement, trademarks violations, patent violations, cyber squatting, credit card frauds, forgery, EFT frauds, pornography, banking/credit card related crimes, sale or purchase of illegal articles, cyberstalking, phishing, theft, and breaches in privacy, and gambling. Crimes where the computer is made a target include: computer theft, physical destruction or alteration of network components, theft of computer source code, hacking, defacing websites, creation of viruses, destruction or alteration of configuration information and email spamming.&lt;/p&gt;
&lt;h2&gt;What is India's current legislation on cybercrime?&lt;/h2&gt;
&lt;h3&gt;The Information Technology Act 2000 (amended in 2008)&lt;/h3&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://nicca.nic.in/pdf/itact2000.pdf"&gt;Information Technology Act&lt;/a&gt; was first drawn up in 2000, and has been &lt;a class="external-link" href="http://164.100.24.219/BillsTexts/LSBillTexts/PassedLoksabha/96-c%20of%202006.pdf"&gt;revised&lt;/a&gt; most recently 2008. The Information Technology (Amendment) Bill, 2008 amended sections 43 (data protection), 66 (hacking), 67 (protection against unauthorised access to data), 69 (cyberterrorism), and 72 (privacy and confidentiality) of the Information Technology Act, 2000, which relate to computer/cybercrimes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Section 43 [Penalty and Compensation for damage to computer, computer system, etc.] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If any person without permission of the owner or any other person who is in-charge of a computer, computer system or computer network:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;accesses or secures access to such computer, computer system or computer network or computer resource (ITAA2008)&lt;/li&gt;&lt;li&gt;downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;&lt;/li&gt;&lt;li&gt;introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;&lt;/li&gt;&lt;li&gt;damages or causes to be damaged any computer, computer system or computer &amp;nbsp;network, data, computer data base or any other programmes residing in such computer, computer system or computer network;&lt;/li&gt;&lt;li&gt;disrupts or causes disruption of any computer, computer system or computer network;&lt;/li&gt;&lt;li&gt;denies or causes the denial of access to any person authorized to access any computer, computer system or computer network by any means;&lt;/li&gt;&lt;li&gt;provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made there under;&lt;/li&gt;&lt;li&gt;charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network;&lt;/li&gt;&lt;li&gt;destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means (Inserted vide ITAA-2008); and&lt;/li&gt;&lt;li&gt;Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage, (Inserted vide ITAA 2008) he shall be liable to pay damages by way of compensation to the person so affected. (change vide ITAA 2008)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Critique:&lt;/strong&gt; In comparison to the laws enacted in other countries, this provision still falls short of a strong data protection law. In most other countries data protection laws specify:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;the definition and classification of data types;&lt;/li&gt;&lt;li&gt;the nature and protection of the categories of data;&lt;/li&gt;&lt;li&gt;that equal protection will be given to data stored offline and data stored manually;&lt;/li&gt;&lt;li&gt;that data controllers and data processors have distinct roles;&lt;/li&gt;&lt;li&gt;clear restrictions on the manner of data collection;&lt;/li&gt;&lt;li&gt;clear guidelines on the purposes for which the data can be put and to whom it can be sent;&lt;/li&gt;&lt;li&gt;standards and technical measures governing the collection, storage, access to, protection, retention, and destruction of data;&lt;/li&gt;&lt;li&gt;that providers of goods or services must have a clear opt - in or opt - out option; and&lt;/li&gt;&lt;li&gt;in addition, most countries provide strong safeguards and penalties against breaches of any of the above&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;&lt;br /&gt;Section 66 [Computer Related Offences] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;
&lt;p&gt;Explanation: For the purpose of this section,-&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;the word "dishonestly" shall have the meaning assigned to it in section 24 of the Indian Penal Code;&lt;/li&gt;&lt;li&gt;the word "fraudulently" shall have the meaning assigned to it in section 25 of the Indian Penal Code.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;[Section 66 A] [Punishment for sending offensive messages through communication service, etc.]&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;(Introduced vide ITAA 2008):&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Any person who sends, by means of a computer resource or a communication device,-&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;any information that is grossly offensive or has menacing character; or&lt;/li&gt;&lt;li&gt;any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device;&lt;/li&gt;&lt;li&gt;any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages (Inserted vide ITAA 2008) shall be punishable with imprisonment for a term which may extend to three years and with fine.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail Message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, image, audio, video and any other electronic record, which may be transmitted with the message.&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;[Section 66 B] [Punishment for dishonestly receiving stolen computer resource or communication device] (Inserted Vide ITA 2008):&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;[Section 66C] [Punishment for identity theft] (Inserted Vide ITA 2008):&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[Section 66D] [Punishment for cheating by personation by using computer resource] (Inserted Vide ITA 2008):&lt;br /&gt;&lt;/strong&gt;Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[Section 66E] [Punishment for violation of privacy] (Inserted Vide ITA 2008):&lt;br /&gt;&lt;/strong&gt;Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both&lt;/p&gt;
&lt;p&gt;Explanation - For the purposes of this section--&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;“transmit” means to electronically send a visual image with the intent that it be viewed by a person or persons;&lt;/li&gt;&lt;li&gt;“capture”, with respect to an image, means to videotape, photograph, film or record by any means;&lt;/li&gt;&lt;li&gt;“private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast;&lt;/li&gt;&lt;li&gt;“publishes” means reproduction in the printed or electronic form and making it available for public;&lt;/li&gt;&lt;li&gt;“under circumstances violating privacy” means circumstances in which a person can have a reasonable expectation that:&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or&lt;/li&gt;&lt;li&gt;any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;[Section 66F] [Punishment for cyber terrorism]:&lt;br /&gt;&lt;/strong&gt;(1) Whoever,-&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;(A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by –&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;denying or cause the denial of access to any person authorized to access computer resource; or&amp;nbsp;&lt;/li&gt;&lt;li&gt;attempting to penetrate or access a computer resource without authorisation or exceeding authorized access; or&lt;/li&gt;&lt;li&gt;introducing or causing to introduce any Computer Contaminant and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under section 70, or&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;(B) knowingly or intentionally penetrates or accesses a computer resource without authorization or exceeding authorized access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons of the security of the State or foreign relations; or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber terrorism.&lt;/div&gt;
&lt;div&gt;(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life’.&lt;br /&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;Critique&lt;/strong&gt;: We find the terminology in multiple sections too vague to ensure consistent and fair enforcement. The concepts of ‘annoyance’ and ‘insult’ are subjective. Clause (d) makes it clear that phishing requests are not permitted, but it is not clear that one cannot ask for information on a class of individuals.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Section 67 [Publishing of information which is obscene in electronic form] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to two three years and with fine which may extend to five lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees.&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;[Section 67 A] [Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form] (Inserted vide ITAA 2008):&lt;br /&gt;&lt;/strong&gt;Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees.&lt;/p&gt;
&lt;p&gt;Exception: This section and section 67 does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;the publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper, writing, drawing, painting, representation or figure is in the interest of science, literature, art, or learning or other objects of general concern; or&lt;/li&gt;&lt;li&gt;which is kept or used bona fide for religious purposes.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;[Section 67 B] Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Whoever,-&lt;/div&gt;
&lt;div&gt;(a) publishes or transmits or causes to be published or transmitted material in any electronic&lt;/div&gt;
&lt;div&gt;form which depicts children engaged in sexually explicit act or conduct or&lt;/div&gt;
&lt;div&gt;(b) creates text or digital images, collects, seeks, browses, downloads, advertises,&lt;/div&gt;
&lt;div&gt;promotes, exchanges or distributes material in any electronic form depicting children in&lt;/div&gt;
&lt;div&gt;obscene or indecent or sexually explicit manner or&lt;/div&gt;
&lt;div&gt;(c) cultivates, entices or induces children to online relationship with one or more children for&lt;/div&gt;
&lt;div&gt;and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource or&lt;/div&gt;
&lt;div&gt;(d) facilitates abusing children online or&lt;/div&gt;
&lt;div&gt;(e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees:&lt;/div&gt;
&lt;div&gt;Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-&lt;/div&gt;
&lt;div&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/div&gt;
&lt;div&gt;(ii) which is kept or used for bonafide heritage or religious purposes&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;[Section 67 C] [Preservation and Retention of information by intermediaries]:&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.&lt;/p&gt;
&lt;p&gt;(2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Critique&lt;/strong&gt;: This provision adequately protects both the corporate and the citizen in a positive way.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Section 69 [Powers to issue directions for interception or monitoring or decryption of any information through any computer resource] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;(1) Where the central Government or a State Government or any of its officer specially authorized by the Central Government or the State Government, as the case may be, in this behalf may, if is satisfied that it is necessary or expedient to do in the interest of the sovereignty or integrity of India, defense of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence, it may, subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be&lt;/div&gt;
&lt;div&gt;intercepted or monitored or decrypted any information transmitted received or stored through any computer resource.&lt;/div&gt;
&lt;div&gt;(2) The Procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed.&lt;/div&gt;
&lt;div&gt;(3) The subscriber or intermediary or any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub section (1), extend all facilities and technical assistance to –&lt;/div&gt;
&lt;div&gt;(a) provide access to or secure access to the computer resource generating, transmitting, receiving or storing such information; or&lt;/div&gt;
&lt;div&gt;(b) intercept or monitor or decrypt the information, as the case may be; or&amp;nbsp;&lt;/div&gt;
&lt;div&gt;(c) provide information stored in computer resource.&lt;/div&gt;
&lt;div&gt;(4) The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with an imprisonment for a term which may extend to seven years and shall also be liable to fine.&lt;/div&gt;
&lt;div&gt;[ Section 69B] Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security:&lt;/div&gt;
&lt;div&gt;(1) The Central Government may, to enhance Cyber Security and for identification, analysis and prevention of any intrusion or spread of computer contaminant in the country, by notification in the official Gazette, authorize any agency of the Government to monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource.&lt;/div&gt;
&lt;div&gt;(2) The Intermediary or any person in-charge of the Computer resource shall when called upon by the agency which has been authorized under sub-section (1), provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating, transmitting, receiving or storing such traffic data or information.&lt;/div&gt;
&lt;div&gt;(3) The procedure and safeguards for monitoring and collecting traffic data or information, shall be such as may be prescribed.&lt;/div&gt;
&lt;div&gt;(4) Any intermediary who intentionally or knowingly contravenes the provisions of subsection&lt;/div&gt;
&lt;div&gt;(2) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.&lt;/div&gt;
&lt;div&gt;Explanation: For the purposes of this section,&lt;/div&gt;
&lt;div&gt;(i) "Computer Contaminant" shall have the meaning assigned to it in section 43&lt;/div&gt;
&lt;div&gt;(ii) "traffic data" means any data identifying or purporting to identify any person, computer system or computer network or location to or from which the communication is or may be transmitted and includes communications origin, destination, route, time, date, size, duration or type of underlying service or any other information.&lt;/div&gt;
&lt;div&gt;Critique: Though we recognize how important it is for a government to protect its citizens against cyberterrorism, we are concerned at the friction between these provisions and the guarantees of free dialog, debate, and free speech that are Fundamental Rights under the Constitution of India.&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Specifically:&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;a) there is no clear provision of a link between an intermediary and the information or resource that is to be monitored.&lt;/div&gt;
&lt;div&gt;c)the penalties laid out in the clause are believed to be too harsh, and when read in conjunction with provision 66, there is no distinction between minor offenses and serious offenses.&lt;/div&gt;
&lt;div&gt;e) the ITA is too broad in its categorization of acts of cyberterrorism by including information that is likely to cause: injury to decency, injury to morality, injury in relation to contempt of court, and injury in relation to defamation.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Section 72 [Breach of confidentiality and privacy] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Save as otherwise provided in this Act or any other law for the time being in force, any person who, in pursuant of any of the powers conferred under this Act, rules or regulations made there under, has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;[Section 72 A] Punishment for Disclosure of information in breach of lawful contract (Inserted vide ITAA-2008):&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to five lakh rupees, or with both.&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;General Notes and Critiques:&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;As general notes on the ITA and data protection we find that the Act is lacking in many ways, including:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;there is no definition of “sensitive personal data or information” and that term is used indiscriminately without.&lt;/li&gt;&lt;li&gt;the provisions and protections cover only electronic data and not stored data or non-electronic systems of media&lt;/li&gt;&lt;li&gt;in the absence of a data controller, liability is often imposed on persons who are not necessarily in a position to control data&lt;/li&gt;&lt;li&gt;civil liability for data breach arises where negligence is involved&lt;/li&gt;&lt;li&gt;criminal liability only applies to cases of information obtained in the context of a service contract.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2010-09-14T13:21:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/transparency-mdgs-key-quotes">
    <title>Transparency and MDGs: the Role of the Media and Technology </title>
    <link>https://cis-india.org/news/transparency-mdgs-key-quotes</link>
    <description>
        &lt;b&gt;Key quotes from sixth panel&lt;/b&gt;
        
&lt;p&gt;“We are thinking globally, acting locally. We take the bottom-up approach with radio for people in the community to tell their government what they need and to partake in decision making process.” &lt;br /&gt;— Lucy Maathai, Slums Information Development and Resource Centers, Kenya&lt;/p&gt;
&lt;p&gt;“For HIV/AIDS in Botswana during the 1990s, we tried creating big billboards saying ‘get tested’, we tried working through NGOs, but it was not until we also got local churches and local tribal leaders together, that things changed. We had to focus on getting buy-in from the political leadership and every local leader. UNDEF was set up to fill the gaps between UN agencies like UNICEF, UNDP, etc. What I have seen in botswana and 30 years of experience, is that if we always add information and communication at the end, we will fail. Rather we need to make sure that it is integrated all along. Furthermore, people in Botswana are aware of technologies, but they do not feel that they can use it or are supported to use it. Instead they use traditional methods, such as churches, in bars, and with local tribal leaders. The UN are mostly used to dealing with formal institutions, but in order to help the bottom billion in the world, we need to engage with the informal institutions, sometimes even with the ‘bad guys’”.&lt;br /&gt;— Bjoern Ferde, UNDP Oslo Center, Norway&lt;/p&gt;
&lt;blockquote&gt;“If a transparency system is based on suspicion rather than trust, it breeds corruption. If your demand for transparency and accountability undermines social safety nets, you will undermine your entire argument. Transparency may seem to add to accountability, but we must understand that it oftens undermines privacy (in the Gujarat genocide, muslims were found and killed by rioters using tax and electoral records). In addition, in india, a name alone reveals a lot of information on caste, area and religion, so what is normal in the west – disclosing names – is not always a good idea. Finally, in many places, particularly those in conflict, disclosing your income may lead to groups turning up at your door and demanding a share.”&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;— Sunil Abraham, Centre for Internet and Society, India&lt;/p&gt;
&lt;p&gt;“It’s great what ARTICLE 19 is doing. There’s often a lot of discussion within communities, but not so often discussions between communities. I want to connect the media too. So little has been done at the international level on how information and communication help development. We do need to acknowledge that the media has massive advantages as an information and transparency mechanism. If you ask politicians what they are worried about in regards to transparency, they are worried about the media. In peru, a report states that Fujimori bribed media executives 100x the amount that he bribed a judge. Indeed, there are so few people paid within UN organisations to focus on understanding and using communication to effect people’s lives. We are operating in a strategic vaccum. It’s hugely exciting to work out where we can go in the future. This event takes us a long way forward.”&lt;br /&gt;— James Deane, BBC World Trust, UK&lt;/p&gt;
&lt;p&gt;“There are simple and creative ways to demonstrate information, such as the ‘stone’ test. In Botswana, each person in a village was asked to place a stone in the middle of the group for every person that died due to HIV/AIDS. It created an immediate and devastating effect when people suddenly visualised the effect on their community and then collectively began to think about what that meant in regards to families and society.”&lt;br /&gt;— Bjoern Ferde, UNDP Oslo Center, Norway&lt;/p&gt;
&lt;p&gt;“In the south we call the media the fourth estate – a moral and ethical force to protect democracy and the constitution of our country. In the north however, we have a business model which completely removes any sense of ethics. The Indian Express, for example, will only talk about markets, not about people and their lives in poverty. Furthermore, whilst we want information shared, we do not want the information collected by the state to destroy the people.&lt;br /&gt;— Aruna Roy, MKSS&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.right2info-mdgs.org/sixth-panel/"&gt;Read the original&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/transparency-mdgs-key-quotes'&gt;https://cis-india.org/news/transparency-mdgs-key-quotes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T10:16:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act">
    <title>Privacy and the Indian Copyright Act</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act</link>
    <description>
        &lt;b&gt;India's Copyright Act was established in 1957, and is in the process of being placed before the Parliament in 2010. The provisions in the proposed Bill will work to make the Act WIPO Copyright Treaty (WCT) compliant. When looking at privacy in the context of copyright four key questions arise, says Elonnai Hickock as she analyses privacy in the context of the Indian Copyright Act. &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;How do DRM technologies undermine privacy and what safeguards are present in the Indian law to protect citizens’ right to privacy?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Technologies such as digital rights management technologies were developed to be used by hardware manufacturers, publishers, copyright holders and individuals to control the mode of use of certain digital devices and contents. DRM technologies pose as a privacy threat, because in their ability to monitor what is happening to a copyrighted work, they are also able to collect personal information and send it back to a host without knowledge of the user. The host is then able to use that data for marketing or commercial purposes. In the Copyright Act, 1957 there are no current provisions against DRM circumvention. In the proposed Copyright Bill 2010 there are two proposed provisions: to prevent anti circumvention of DRM technologies and one provision that clarifies what is a DRM technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Proposed Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 2 (xa)&lt;/b&gt;: Defines Rights Management Information – it is important to note that within the definition of RMI the provision specifically excludes any device or procedure intended to identify the user from the definition.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Section 65A (1)&lt;/b&gt; : Protection of Technological Measures - Any person who circumvents an effective technological measure applied for the purpose of protecting any of the rights conferred by this Act, with the intention of infringing such rights, shall be punishable with imprisonment which may extend to two years and shall also be liable to fine includes that any person facilitating circumvention by another person of a technological measure, shall  maintain a complete record of such other persons including his name, address and all relevant particulars necessary to identify him.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Section 65B&lt;/b&gt;: Protection of Rights Management Information – Any person who removes, or distributes, copies, or broadcasts any rights management information without authority shall be by punishable with imprisonment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Recommendation&lt;/i&gt;:  We find, not just exclusively to the Copyright Act, but that in all Indian legislation the privacy of an individual is brought into question, because there are no safeguards against the commercialization of information, and no formal process of redress if an individual discovers that his information is being used without his consent/prior knowledge. We would recommend that (perhaps appropriately in legislation on data protection) a provision be included to clearly articulate that the collection and commercialization of information and personal data is prohibited by DRM technologies and host companies, and a method of redress be put in place.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Under the copyright, does a person have the ability to expose privacy infringement?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Because DRM technologies have the ability to collect user information, which could potentially be done through the use of spyware, it is important that an individual has the ability to know if and when their information is being collected. To do this an individual can discover the technological principles of a device, object, or system through a process known as reverse engineering.  Currently reverse engineering is permitted under provision 52 (ac). It is further supported by provision 65A (2) (f).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Current Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provision 52 (ac): Certain acts not to be in infringement of copyright include: the observation, study or test of functioning of the computer programs in order to determine the ideas and principles which underlie any elements of the program while performing such acts necessary for the functions for which the computer program was supplied. The following acts shall not constitute an infringement of copyright, namely:&lt;br /&gt;65A (2) (f): Nothing in sub-section (1) shall prevent any person from, doing anything necessary to circumvent technological measures intended for identification or surveillance of a user.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Recommendation&lt;/i&gt;: We have no recommendation, but see this as a positive provision.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;How does the proposed exception for the disabled undermine privacy?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India under the current Copyright Act, 1957 there are no provisions for the benefit of disabled persons, thus currently permission from copyright holders needs to be exclusively sought every time the visually challenged person requires access. Under the Constitution of India and the Bernes Convention, India has committed to enshrining the rights of the disabled.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Proposed Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 31B:  will grant compulsory license in respect of publication of any copyrighted works not covered by the exception under section 52 (1) (zb). For this a registered intermediary organization that is recognized under The Persons with Disability Act shall apply to the Copyright Board for approval. The board will evaluate the applicant and application, and grant permission if it sees fit. The intermediary will then be responsible for monitoring the usage of the copyrighted work to ensure that copyright law is not violated.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Recommendation&lt;/i&gt;: Though currently the Indian legislation does not threaten the privacy of the disabled, we find it concerning that under the WIPO copyright treaty – the anonymity of the disabled would be compromised.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is On the Horizon?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As copyright and IP is a constantly evolving issue, countries are consistently amending and changing their laws. With the flow of peoples across borders increasing, Indians will be affected by different international policies that could pose to infringe upon their privacy, for example cross-border checks or three strike regimes, which will punish a person if caught infringing copyright three times. For example: France has proposed cutting off Internet to those caught infringing on copyright three times.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Examples of Proposed Legislation: The Anti-Counterfeiting Trade Agreement:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ACTA is a proposed legislation. Its objective is to combat counterfeiting and piracy. Partners in the negotiations include: The United States, Australia, Canada, the European Union, Japan, Mexico, Morocco, New Zealand, Singapore, South Korea, and Switzerland. The treaty will oblige each contracting party to adopt, in accordance with its legal system, the measures necessary to ensure the application of the treaty. Though ACTA has not been enacted, many worry that ACTA would facilitate privacy violations by trademark and copyright holders against private citizens suspected of infringement activities without any sort of legal due process. The Act could allow for random searches of laptops, MP3 players, and cellular phones for illegally downloaded or ripped music and movies.&lt;br /&gt;&lt;i&gt;&lt;br /&gt;Recommendation&lt;/i&gt;: We find that copyright infringement does not appear to justify cross border searches or other forms of regulating.  ACTA and other international treaties raise the question that if India became compliant with certain international standards, would the standards would be too stringent without safeguards, and pose as a risk to a person’s privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    

   <dc:date>2013-08-06T13:37:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/no-uid-campaign">
    <title>No UID Campaign in New Delhi - A Report</title>
    <link>https://cis-india.org/internet-governance/blog/no-uid-campaign</link>
    <description>
        &lt;b&gt;The Unique Identification (UID) Bill is not pro-citizen. The scheme is deeply undemocratic, expensive and fraught with unforseen consequences. A public meeting on UID was held at the Constitution Club, Rafi Marg in New Delhi on 25 August, 2010. The said Bill came under scrutiny at the meeting which was organised by civil society groups from Mumbai, Bangalore and Delhi campaigning under the banner of "No UID". The speakers brought to light many concerns, unanswered questions and problems of the UID scheme.&lt;/b&gt;
        
&lt;p&gt;Since 2009, when the UID Bill was presented to the general public by Nandan Nilekani, the project has been characterized as a landmark initiative that will transform India, bring in good governance, and provide relief and basic services for the poor.&amp;nbsp; The scheme is rapidly being put in place; the draft Bill has been put before the Parliament of India and the resident numbers and data have been collected.&lt;/p&gt;
&lt;p&gt;The UID proposes to take the finger prints and iris scans of every resident of India for authentication of each individual. J. T. D'Souza, an expert in free software technology exposed the flaws of the entire technical aspect of the UID project.&amp;nbsp; He presented the risks and loopholes that technology such as iris and fingerprint scanners pose, and the risks in using a biometric system as a form of identification system.&amp;nbsp; Contrary to the claim of the UID authority, that a scheme based on biometrics is foolproof, he explained how fingerprints&amp;nbsp; are not unchanging, both fingerprints and iris scans can be easily spoofed (with a budget of only $10), and there are many ways in which the technology can break, be inconsistent, or be inaccurate.&lt;/p&gt;
&lt;p&gt;From a human rights perspective the lack of democracy in the entire project was stressed. Usha Ramanathan reiterated the fact that&amp;nbsp; no white paper was issued, the Bill has not gone through the Parliament and yet citizens’ data is being collected, citizens were given only a two week period to comment on the Bill, and in practice the UID number will not be voluntary for individuals.&lt;/p&gt;
&lt;p&gt;The UID authority has posited the scheme as bringing benefits to the poor, plugging leakages in the Public Distribution System and the Mahatma Gandhi National Rural Employment Guarantee Scheme (MGNREGS), as well as enabling inclusive growth by providing each citizen with a verifiable and portable identity. These claims were debunked. An identity number will not fix the waste of grain that takes place every day, the portability of the number raises new problems of accessibility and distribution of resources, and the MGNREGS system is already working to be financially inclusive with a majority of its members already having a bank account.&lt;/p&gt;
&lt;p&gt;In response to hearing the presentations of the speakers and the comments by the audience, senior Member of Parliament of the Revolutionary Socialist Party of India (RSP), Abani Roy called for the launching of a massive campaign to resist this expensive and dangerous project through which several companies will gain massive contracts from the public exchequer.&lt;/p&gt;
&lt;p&gt;The campaigners for No UID plans to hold further meetings across the country and lobby Parliamentarians in the coming months.&lt;/p&gt;
&lt;p&gt;For more information contact: Mathew Thomas (Bangalore) mathew111983@gmaill.com, Elonnai Hickok (Bangalore) elonnai@cis-india.org , Sajan Venniyoor (Delhi): +91-9818453483 - Bobby Kunhu (Delhi): +91-9654510398&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/no-uid-campaign'&gt;https://cis-india.org/internet-governance/blog/no-uid-campaign&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-20T03:51:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do">
    <title>Wherever you are, whatever you do</title>
    <link>https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do</link>
    <description>
        &lt;b&gt;Facebook recently launched a location-based service called Places. Privacy advocates are resenting to this new development. Sunil Abraham identifies the three prime reasons for this outcry against Facebook. The article was published in the Indian Express on 23 August, 2010.&lt;/b&gt;
        
&lt;p&gt;Privacy activists are up in arms again, at Facebook’s recent launch of a new location-based service called Places. But what’s the new issue here? For years, telecom operators have been able to roughly locate you by triangulating the signal strength between the three nearest cell towers. In India, geo-location is part of the call logs maintained by the operator. That is how the police was able to determine that Bangalore resident Sathish Gupta killed his wife Priyanka. He took her mobile with him during a jog with his friend and then faked a phone call as an alibi. He knew that the time-stamps on the call logs would corroborate his lies. But the location-data nailed him. So, in short, the state and telecom operators know where you are even if you don’t have a smartphone with GPS support.&lt;/p&gt;
&lt;p&gt;For those who can afford it? GPS support provides greater accuracy and reliability, independent of telecom signal strength. The immediate and future benefits are huge. For parents, MyKidIsSafe.com, allows them to create a geo-fence and receive automatic notification when the child leaves the safety zone. In combination with RFID, businesses are able to provide their customers with accurate updates regarding status of deliveries. The Karnataka police is able to verify that the police inspector issuing the challan using a Blackberry for a traffic violation is not doing it from home. Seven hundred and fifty thousand gay men from 162 countries use a geo-social network called Grindr to find love. In the future, most car-pooling services will be GPS-enabled. Geo-location-based crowd-sourcing will be used to predict and avoid traffic jams by measuring the density and velocity of mobile phones on various routes.&lt;/p&gt;
&lt;p&gt;Privacy advocates worry that after helping the police solve crimes and fight terrrorism, telecom companies retain the logs instead of deleting, anonymising or obfuscating them. Especially so in India, given the lack of privacy laws, telecom operators, web and mobile service providers could retain the logs for customer profiling or worse still, sell the raw data or analysis to third parties. Cyber-stalkers, child molesters and rapists benefit. Cat burglars will know when you are away and be able to clean out your house in a more relaxed fashion. Geo-surveillance by a state, obsessed with terrorism, will have negligible benefits while extracting a huge social cost and significantly undermining national security.&lt;/p&gt;
&lt;p&gt;So why this particular outcry against the world’s most successful social networking website? There are three reasons that come immediately to mind. First, Facebook has a terrible record with privacy. In the last five years, the default settings have moved from one where no personal data was available for anonymous access to one with anonymous access to everything except birthday and contact information. And these are settings that affect the majority of the half a billion people who don’t bother changing default settings. So there is no guarantee that Facebook will not get more intrusive with its default geo-location privacy settings.&lt;/p&gt;
&lt;p&gt;Second, a friend can geo-tag you without requiring you to approve or confirm this. Once you are geo-tagged, all your common friends will be notified through the friend-feed system. This is similar to the current system of photo sharing. A friend can upload a inappropriate photograph and tag you almost instantly all your work-mates who also happen to be your Facebook friends get a notification via the feed. Of course, you can always untag the photo, change the settings and defriend the culprit but by then the damage is usually done.&lt;/p&gt;
&lt;p&gt;Third, the Facebook user-interface for privacy settings is notoriously complex and cumbersome. Many users will think that they have managed to bolt down the security settings when in fact their personal data will remain all up for grabs. The half a million third-party products available today on the Facebook platform only compounds this problem.&lt;/p&gt;
&lt;p&gt;Read the original in the&lt;a class="external-link" href="http://www.indianexpress.com/news/Wherever-you-are--whatever-you-do/663810"&gt; Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do'&gt;https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:12:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2010-bulletin">
    <title>August 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/august-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society. We bring you news and media coverage, research and event updates for the month of August 2010&lt;/b&gt;
        &lt;h3&gt;News Updates&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;RIM Offered Security Fixes&lt;br /&gt; &lt;/b&gt;In India Talks, BlackBerry Maker Said It Could Share Metadata, Notes Show&lt;br /&gt; &lt;a href="http://bit.ly/ahT7jD" target="_blank"&gt;http://bit.ly/ahT7jD&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;New Project to Assess Potential of Creating Open Government Data&lt;/b&gt; &lt;b&gt;Initiatives in Chile, Ghana and Turkey&lt;/b&gt;&lt;br /&gt; Steve Bratt, CEO of the World Wide Web Foundation (founded in 2009 by Tim Berners-Lee) has made an announcement on moving forward with a project to assess the potential of creating open government data&lt;br /&gt; initiatives in Chile, Ghana, and Turkey - the first step of what we hope to be a global initiative focusing on low- and middle-income countries.&lt;br /&gt; &lt;a href="http://bit.ly/d337Ex" target="_blank"&gt;http://bit.ly/d337Ex&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Govt and BlackBerry firm wait for the other to hang up&lt;/b&gt;&lt;br /&gt;Sunil Abraham speaks to Archna Shukla on the stand-off between the Government of India and RIM. The news was published in expressindia.com.&lt;br /&gt; &lt;a href="http://bit.ly/cGeipL" target="_blank"&gt;http://bit.ly/cGeipL&lt;/a&gt;&lt;br /&gt; &lt;br /&gt;&lt;b&gt;Call, text, email complaint against rogue auto driver&lt;/b&gt;&lt;br /&gt; Harassed by an auto driver? Helplines give you no relief? Here's the people's way to help you out. Just report your issue online, call or even SMS sitting in a noisy restaurant, and be heard.&lt;br /&gt; &lt;a href="http://bit.ly/atiiGW" target="_blank"&gt;http://bit.ly/atiiGW&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Call to increase awareness of intellectual property rights&lt;br /&gt; &lt;/b&gt;We need more knowledge on IPR itself, says IT Secretary&lt;br /&gt; &lt;a href="http://bit.ly/avxY16" target="_blank"&gt;http://bit.ly/avxY16&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Civil Society groups urge State Judicial Academy to restructure agenda for Judges' Roundtable meet&lt;/b&gt;&lt;br /&gt; Some of the Civil Society groups in the country have urged the Maharashtra State Judicial Academy to restructure the agenda for the 'Judges Roundtable on Intellectual Property Rights Adjudication' being held in Mumbai on July 24 and 25 to promote public interest and a deeper understanding of intellectual property amongst judicial officers. FICCI is the joint organiser of the event.&lt;br /&gt; &lt;a href="http://bit.ly/dCDZl0" target="_blank"&gt;http://bit.ly/dCDZl0&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;More Debate on UID Project Needed&lt;br /&gt; &lt;/b&gt;A press conference on UID was held at the Press Club in Bangalore on 26 July, 2010. It was co-organised by Citizen's Action Forum, Alternate Law Forum and the Centre for Internet and Society. Mathew Thomas and Vinay Baindur spoke about the UID. Proceedings from the conference was covered in the Hindu on 27 July, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/cSEsaP" target="_blank"&gt;http://bit.ly/cSEsaP&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;UID coverage in Udayavani&lt;/b&gt;&lt;br /&gt; A press conference was held at the Press Club in Bangalore on 26 July, 2010. It was co-organised by Citizen's Action Forum, Alternate Law Forum and the Centre for Internet and Society. Mathew Thomas and Vinay Baindur were the speakers. Leading Kannada newspaper Udayavani covered this event.&lt;br /&gt; &lt;a href="http://bit.ly/c3AU5s" target="_blank"&gt;http://bit.ly/c3AU5s&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open is the Future&lt;br /&gt; &lt;/b&gt;The third Open World Forum will gather together decision-makers from the open digital world, in Paris. 1,500 participants from 40 countries will come together to analyze the technological, economic and social impact of Open Source, the invisible engine behind the digital revolution. The aim: to interpret future trends and cross-fertilize initiatives.&lt;a href="http://bit.ly/amY9Qc" target="_blank"&gt;&lt;br /&gt;http://bit.ly/amY9Qc&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://bit.ly/amY9Qc" target="_blank"&gt; 
&lt;hr /&gt;
&lt;/a&gt;Upcoming Events&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;No UID till Complete Transparency, Accountability and People's Participation: A Public Campaign &lt;br /&gt;&lt;/b&gt;An interactive meeting on UID's lack of a feasibility study, cost involved and dangers of abuse is being held in New Delhi at the Constitution Club Auditorium, Rafi Marg on 25 August, 2010. The meeting is jointly organised by INSAF, PEACE, Citizens' Action Forum, People's Union for Civil Liberties - Karnataka, Slum Janandolana - Karnataka, Alternate Law Forum, The Centre for Internet and Society and concerned individuals.&lt;br /&gt; &lt;a href="http://bit.ly/8YsBIJ" target="_blank"&gt;http://bit.ly/8YsBIJ&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Governance and Human Rights: Strategies and Collaborations for Empowerment&lt;/b&gt;&lt;br /&gt;Leading up to the 2010 IGF, The Association for Progressive Communications (APC), Global Partners, the Centre for Internet and Society (CIS) and the Dynamic Coalition on Internet Rights and Principles are hosting, on 13 September 2010 in Vilnius, an event on 'Internet Governance and Human Rights: Strategies and Collaborations for Empowerment'.&lt;br /&gt; &lt;a href="http://bit.ly/aoOkPR" target="_blank"&gt;http://bit.ly/aoOkPR&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Freedom of Expression or Access to Knowledge: Are We Taking the Necessary Steps Towards an Open and Inclusive Internet?&lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society is co-organising a workshop on Freedom of Expression or Access to Knowledge: Are We Taking the Necessary Steps towards an Open and Inclusive Internet? at the Internet&lt;br /&gt; Governance Forum on 14 September, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/dl1WRL" target="_blank"&gt;http://bit.ly/dl1WRL&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sexual Rights, Openness and Regulatory Systems&lt;/b&gt;&lt;br /&gt;The Centre for Internet and Society is co-organising a workshop on Sexual Rights, Openness and Regulatory Systems at the Internet Governance Forum on 14 September, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/dl1WRL" target="_blank"&gt;http://bit.ly/dl1WRL&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Data in the Cloud: Where Do Open Standards Fit In?&lt;br /&gt; &lt;/b&gt;The Centre for Internet and Society is co-organising a workshop on Data in the Cloud: Where do Open Standards Fit In? on 16 September, 2010 at the Internet Governance Forum.&lt;br /&gt; &lt;a href="http://bit.ly/94AF4h" target="_blank"&gt;http://bit.ly/94AF4h&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;International Conference on Enabling Access to Education through ICT&lt;br /&gt; &lt;/b&gt;The Centre for Internet and Society (CIS), Bangalore in cooperation with the Global Initiative for Inclusive ICT (G3ICT), a flagship advocacy organization of the UN Global Alliance on ICT and Development (UN-GAID), the International Telecommunications Union (ITU), UNESCO, Digital Empowerment Foundation, Society for Promotion of Alternative Computing and Employment and the Deafway Foundation is organizing an international conference, Enabling Access to Education through ICT in New Delhi from&lt;br /&gt; 27th to 29th October, 2010....Registrations to begin soon!&lt;br /&gt; &lt;a href="http://bit.ly/9flyEK" target="_blank"&gt;http://bit.ly/9flyEK&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Research&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Political is as Political does&lt;br /&gt; &lt;/b&gt;The Talking Back workshop has been an extraordinary experience for me. The questions that I posed for others attending the workshop have hounded me as they went through the course of discussion, analysis and dissection. Strange nuances have emerged, certain presumptions have been questioned, new legacies have been discovered, novel ideas are still playing ping-pong in my mind, and a strange restless excitement – the kind that keeps me awake till dawning morn – has taken over me, as I try and figure out the wherefore and howfore of things. I began the research project on Digital Natives in a condition of not knowing, almost two years ago. Since then, I have taken many detours, rambled on strange paths, discovered unknown territories and reached a mile-stone where I still don’t know, but don’t know what I don’t know, and that is a good beginning.&lt;br /&gt; &lt;a href="http://bit.ly/9hY9sR" target="_blank"&gt;http://bit.ly/9hY9sR&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Digital Natives: Talking Back&lt;br /&gt; &lt;/b&gt;One of the most significant transitions in the landscape of social and political movements, is how younger users of technology, in their interaction with new and innovative technologised platforms have taken up responsibility to respond to crises in their local and immediate environments, relying upon their digital networks, virtual communities and platforms. In the last decade or so, the digital natives, in universities as well as in work spaces, as they experimented with the potentials of internet technologies, have launched successful socio-political campaigns which have worked unexpectedly and often without precedent, in the way they mobilised local contexts and global outreach to address issues of deep political and social concern. But what do we really know about this Digital Natives revolution?&lt;br /&gt; &lt;a href="http://bit.ly/bZNoSX" target="_blank"&gt;http://bit.ly/bZNoSX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Beyond the Digital: Understanding Digital Natives with a Cause&lt;/b&gt;&lt;br /&gt;Digital Natives with a cause: the future of activism or slacktivism? Maesy Angelina argues that the debate is premature given the obscured understanding on youth digital activism and contends that an effort to&lt;br /&gt; understand this from the contextualized perspectives of the digital natives themselves is a crucial first step to make. This is the first out of a series of posts on her journey to explore new insights to understand youth digital activism through a research with The Blank Noise Project under the Hivos-CIS Digital Natives Knowledge Programme.&lt;br /&gt; &lt;a href="http://bit.ly/b1GS7F" target="_blank"&gt;http://bit.ly/b1GS7F&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Accessibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to Knowledge: Barriers and Solutions for Persons with Disabilities in India&lt;/b&gt;&lt;br /&gt; Consumers International, Kuala Lumpur and Consumers Association of India in association with Madras Library Association organised a seminar on Access to Knowledge on 31st July, 2010 at the Tamil Nadu Pollution Control Auditorium in Guindy, Chennai. The Principal Secretary to the Government of Tamil Nadu Department of Information Technology was the chief guest. Former Central Vigilance Commissioner N. Vittal gave the keynote address. Prof Subbiah Arunachalam, Nirmita Narasimhan and Pranesh Prakash participated in the seminar. Nirmita and Pranesh made presentations on access to knowledge.&lt;br /&gt; &lt;a href="http://bit.ly/cJXSX8" target="_blank"&gt;http://bit.ly/cJXSX8&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Intellectual Property&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and the Indian Copyright Act, 1857 as Amended in 2010 &lt;br /&gt;&lt;/b&gt;In this post the author examines the issue of privacy in light of the Indian Copyright Act, 1857 as amended by the Copyright Amendment Bill in 2010. Four key questions are examined in detail and the author gives&lt;br /&gt; suitable recommendations for each of the questions that arise.&lt;br /&gt; &lt;a href="http://bit.ly/cJXSX8" target="_blank"&gt;http://bit.ly/cJXSX8&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Internet Governance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Does the Government want to enter our homes?&lt;/b&gt;&lt;br /&gt;When rogue politicians and bureaucrats are granted unrestricted access to information then the very future of democracy and free media will be in jeopardy. In an article published in the Pune Mirror on 10 August,&lt;br /&gt; 2010, Sunil Abraham examines this in light of the BlackBerry-to-BlackBerry messenger service that the Government of India plans to block if its makers do not allow the monitoring of messages. He says that civil society should rather resist and insist on suitable checks and balances like governmental transparency and a fair judicial oversight instead of allowing the government to intrude into the privacy&lt;br /&gt; and civil liberties of its citizens.&lt;br /&gt; &lt;a href="http://bit.ly/dkVHoS" target="_blank"&gt;http://bit.ly/dkVHoS&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UID Project in India - Some Possible Ramifications&lt;/b&gt;&lt;br /&gt;Having a standard for decentralized ID verification rather than a centralized database that would more often than not be misused by various authorities will solve ID problems, writes Liliyan in this blog entry. These blog posts to be published in a series will voice the expert opinions of researchers and critics on the UID project and present its unique shortcomings to the reader.&lt;br /&gt; &lt;a href="http://bit.ly/bOyBS8" target="_blank"&gt;http://bit.ly/bOyBS8&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Liberties and the amended Information Technology Act, 2000&lt;/b&gt;&lt;br /&gt;This post examines certain limitations of the Information Technology Act, 2000 (as amended in 2008). Malavika Jayaram points out the fact that when most countries of the world are adopting plain English instead of the conventional legal terminology for better understanding, India seems to be stuck in the old-fashioned method thereby, struggling to maintain a balance between clarity and flexibility in drafting its laws. The present Act, she says, is although an improvement over the old Act and seeks to address and improve on certain areas in the right direction but still comes up short in making necessary changes when it comes to fundamental rights and personal liberties. The new Act retains elements from the previous one making it an abnormal document and this could have been averted if there had been some attention to detail.&lt;br /&gt; &lt;a href="http://bit.ly/croc9T" target="_blank"&gt;http://bit.ly/croc9T&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Feedback to the NIA Bill&lt;br /&gt;&lt;/b&gt;Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/bhinUB" target="_blank"&gt;http://bit.ly/bhinUB&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Open Access to Science and Scholarship - Why and What Should We Do? The National Institute of Advanced Studies held the eighth NIAS-DST training programme on “Multidisciplinary Perspectives on Science, Technology and Society” from 26 July to 7 August, 2010. The theme of the project was ‘Knowledge Management’. Dr. MG Narasimhan and Dr. Sharada Srinivasan were the coordinators for the event. Professor Subbiah Arunachalam made a presentation on Open Access to Science and Scholarship.&lt;br /&gt; &lt;a href="http://bit.ly/ciohYy" target="_blank"&gt;http://bit.ly/ciohYy&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Civic Hacking Workshop&lt;br /&gt; &lt;/b&gt;CIS, with the UK Government's Foreign Office and the Cabinet Office Team for Digital Engagement, and Google India, is organizing a workshop on open data (or the lack thereof) and 'civic hacking'.&lt;br /&gt; &lt;a href="http://bit.ly/c3TF2t" target="_blank"&gt;http://bit.ly/c3TF2t&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Telecom&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;'Containing Inflation' - A myth&lt;/b&gt;&lt;br /&gt; We need problem-solving, not confused rhetoric or misguided action, says Shyam Ponappa. The article was published in Business Standard on 7 August, 2008.&lt;br /&gt; &lt;a href="http://bit.ly/9frC8q" target="_blank"&gt;http://bit.ly/9frC8q&lt;/a&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt; 
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2010-bulletin'&gt;https://cis-india.org/about/newsletters/august-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-10T10:40:34Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/information-beautiful">
    <title>Information is Beautiful hacks in India with David Cameron</title>
    <link>https://cis-india.org/news/information-beautiful</link>
    <description>
        &lt;b&gt;The Prime Minister took some of the UK's top hackers and data experts with him to India this week. David McCandless was with them.&lt;/b&gt;
        
&lt;p&gt;This week, I was lucky enough to accompany &lt;a class="external-link" href="http://www.guardian.co.uk/politics/wintour-and-watt/2010/jul/27/davidcameron-india"&gt;UK Prime Minister's delegation to India&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I was part of a small contingent of politically active programmers and civic-minded dataheads out to explore links between tech, transparency and community-based democracy in India. The raw stuff of &lt;a class="external-link" href="http://www.guardian.co.uk/politics/davidcameron"&gt;David Cameron&lt;/a&gt;'s 'Big Society' initiative.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;(To the businessmen, journos and politicos in the delegation, we were known simply as "The Hackers" - an image we played up by sometimes rebelliously removing our ties)&lt;/p&gt;
&lt;p&gt;The key event of the trip was a hackday hosted by &lt;a class="external-link" href="http://www.google.co.in/"&gt;Google India&lt;/a&gt; in the southern central city of Bangalore.&lt;/p&gt;
&lt;p&gt;I have to confess a slight colonial attitude going into the meet. Thinking of the UK as a great &lt;a class="external-link" href="http://www.guardian.co.uk/technology/hacking"&gt;hacking&lt;/a&gt; &amp;nbsp;nation and leading data port, I was expecting to be helping the collected Indian IT professionals and activists improve their skills and give them fresh ideas on how to bootstrap their democracy.&lt;/p&gt;
&lt;p&gt;However, our Indian counterparts very quickly astonished us with brilliant and powerful data projects and grass roots hacks using simple tools and technologies to solve everyday civic issues. Some of which I wanted to exhibit here.&lt;/p&gt;
&lt;h2&gt;Bus Map Hack&lt;/h2&gt;
&lt;p&gt;Information designer &lt;a class="external-link" href="http://www.google.com/profiles/arunganesh03"&gt;Arun Ganesh&lt;/a&gt; was frustrated by the bus maps in his native Chennai.&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_IndiahackdayBus1006.jpg/image_preview" alt="India hack" class="image-inline image-inline" title="India hack" /&gt;&lt;/p&gt;
&lt;p&gt;Chennai's bus map goes from this…&lt;/p&gt;
&lt;p&gt;The official map was incomplete and incomprehensible - and had been 'under construction' for six years.&lt;/p&gt;
&lt;p&gt;Passionate about maps and geo-mapping, Arun took it upon himself to design a new map to help the enormous number of people (Chennai has a population of over 4 million) who used the buses every day. Unfortunately, he faced a major challenge: over 5,000 separate buses &amp;amp; bus routes.&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/Hack.jpg/image_preview" alt="Hack" class="image-inline image-inline" title="Hack" /&gt;&lt;/p&gt;
&lt;p&gt;… to this&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;So he turned to crowd-sourcing on the web to gather data on all the routes. Local travellers poured timetables and bus details into his app. And in just 3 days he had compiled enough data to create a fresh map with a clean comprehensible design. And an accompanying interactive app &lt;a class="external-link" href="http://busroutes.in/chennai/"&gt;BusRoutes.in&lt;/a&gt; for painless route planning.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Then he went further. Using the data - and a fair walking distance of 500 metres - he visualised the areas covered by all the bus routes. The resulting heatmap instantly and cleverly reveals which areas of the city are poorly served by the bus network.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Karnataka Learning Partnership&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Education is a big issue in India, where close to 35% of the population are illiterate. The Karnataka Learning Partnership works to improve government schools in Karnataka region by running literacy, maths and library-use programs across the southern Indian state.&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/Hackschools.jpg/image_preview" alt="Hackschools" class="image-inline image-inline" title="Hackschools" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;Karnataka schools monitored&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;Mashing Googlemaps and their detailed data through a web interface, the &lt;a class="external-link" href="http://www.aksharafoundation.org/"&gt;Akshara Foundation&lt;/a&gt; &amp;nbsp;provides a dynamic monitoring and look up service for the quality of schools in each area. It's not unlike the recently launched &lt;a class="external-link" href="http://www.schooloscope.com/"&gt;SchooloScope&lt;/a&gt; here in the UK.&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;(Please note: the site is in beta and not live yet. You can see their work at blog.klp.org.in.)&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;National Election Watch&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;Using information liberated by the 2006 Right to Information Act in India, Nationalelectionwatch.org &amp;nbsp;tracks the backgrounds of every single politician in India. An incredible feat given the enormity and intricacies of Indian democracy.&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;Over 1200 NGOs work to collect data from affidavits filed by the candidates on their financial, criminal and educational background. The myneta.info website acts as an instant power check on a system unfortunately tainted by widespread corruption and bribery.&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;&lt;img src="https://cis-india.org/home-images/CriticalInformation.jpg/image_preview" alt="Critical Information" class="image-inline image-inline" title="Critical Information" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;The crime-o-meter&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span"&gt;Pages on particularly criminal MPs feature a 'crime dial' visualisation to get the message across.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Missed Calls&lt;/h2&gt;
&lt;p&gt;Despite a thriving tech-sector, India still has relatively low internet uptake. Just 0.05% of the 1.2 billion population are active internet users. Compared to around 40% in the UK and 29% in China.&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;But nearly half the population own mobile phones. So SMS and missed calls have become a dominant form of free information exchange, especially when ingeniously hacked together.&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;In a typical hacked service, information providers set up phone numbers. Information seekers phone the number and then immediately hang up, registering a 'missed call'. The information provider then sends them an SMS with the info they might be seeking. Carpenter jobs or internet cafes in the locality, for example.&lt;/p&gt;
&lt;p&gt;Ironically, lax privacy protection - by our standards - in the country actually improves this service. While banned here, triangulation of mobile signals to determine the location of a call is freely permitted in India. So services are able to text back localised information. All for free.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Hacktastic!&lt;/p&gt;
&lt;p&gt;Thanks to Harry Metcalfe at &lt;a class="external-link" href="http://tellthemwhatyouthink.org/"&gt;TellThemWhatYouThink.Org&lt;/a&gt;, Tim Green from &lt;a class="external-link" href="http://www.democracyclub.org.uk/"&gt;DemocracyClub.org.uk&lt;/a&gt;, Edmund von der Burg at &lt;a class="external-link" href="http://www.yournextmp.com/"&gt;YourNextMp.com&lt;/a&gt;, and Pranesh Prakash at the Centre for Internet and Society for their help and input.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: left;"&gt;Read the original in the&lt;a class="external-link" href="http://www.guardian.co.uk/news/datablog/2010/jul/30/information-beautiful-india-cameron"&gt; Guardian&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/information-beautiful'&gt;https://cis-india.org/news/information-beautiful&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T10:22:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/july-2010-bulletin">
    <title>July 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/july-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet &amp; Society. We bring you updates of our research, news and media coverage, information on our events and other updates for the month of July 2010.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Call for Case Studies on ICT&lt;/b&gt;&lt;br /&gt; CIS invites organisations to participate in a study focusing on best practices in the use of ICTs in education for persons with disabilities.&lt;br /&gt; &lt;a href="http://bit.ly/d03jS0"&gt;http://bit.ly/d03jS0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Networking? Not working&lt;/b&gt;&lt;br /&gt; Concerns about privacy, wastage of time and trivialized communication are some reasons ‘refuseniks’ are going off sites such as Facebook and MySpace, writes Shreya Ray in Livemint.&lt;br /&gt; &lt;a href="http://bit.ly/dpdKhX"&gt;http://bit.ly/dpdKhX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Digital them about yourself?&lt;/b&gt;&lt;br /&gt; If you’re on Facebook or have a blog, you could be a digital native, says Akhila Seetharaman.&lt;br /&gt; &lt;a href="http://bit.ly/ahA6Ts"&gt;http://bit.ly/ahA6Ts&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Next CPOV Conference in Leipzig&lt;/b&gt;&lt;br /&gt; Two CPOV conferences have been held so far. The first one in Bangalore and the second one in Amsterdam, the third is to be held in Leipzig.&lt;br /&gt; &lt;a href="http://bit.ly/cLN8XE"&gt;http://bit.ly/cLN8XE&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS featured in the &lt;span class="visualHighlight"&gt;Report on Research and Funding Landscape within the Arts and Humanities in India&lt;/span&gt;&lt;br /&gt; Centre for Internet and Society has been listed as an area of excellence and innovative research in this report.&lt;br /&gt; &lt;a href="http://bit.ly/9GJsJ7"&gt;http://bit.ly/9GJsJ7&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;UID Act may be released for debate, may be introduced in monsoon session&lt;/b&gt;&lt;br /&gt; An article by Karen Leigh &amp;amp; Surabhi Agarwal in livemint on June 30, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/9Hq5dg"&gt;http://bit.ly/9Hq5dg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A New Age in News&lt;/b&gt;&lt;br /&gt; Citizen journalism and online piracy were key topics during the opening day of the Mekong Information and Communication Technology conference. The 2010 Mekong ICT conference in Chang Mai, Thailand, has brought together an experienced crowd of experts from all over the globe. They have gathered to discuss the status, trends and the current situation of the ICT world.&lt;br /&gt; &lt;a href="http://bit.ly/bdGzbQ"&gt;http://bit.ly/bdGzbQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Activists welcome privacy Bill, but point out concerns&lt;/b&gt;&lt;br /&gt; Experts have welcomed the government's move to bring in a law for protecting individual privacy, amid concerns about the potential misuse of personal data it is collecting to execute social welfare and security schemes.&lt;br /&gt; &lt;a href="http://bit.ly/bnddaJ"&gt;http://bit.ly/bnddaJ&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Locating Gender Politics in the New Techno-Industrial Complex: A Lecture by Dr. Lisa McLaughlin&lt;/b&gt;&lt;br /&gt; The Centre for the Study of Culture and Society (CSCS), IT for Change and the Centre for Internet and Society (CIS) are hosting a lecture by Dr. Lisa McLaughlin, Associate Professor in Media Studies and Women's Studies, Miami University, Ohio, USA at CIS, Bangalore on 23 July, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/9zy2Fa"&gt;http://bit.ly/9zy2Fa&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Promoting Education through ICT&lt;/b&gt;&lt;br /&gt; ICT workshop in New Delhi from 27th to 29th October, 2010...Registrations to begin soon!&lt;br /&gt; &lt;a href="http://bit.ly/9flyEK"&gt;http://bit.ly/9flyEK&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Attention Economy - A Brief Introduction&lt;/b&gt;&lt;br /&gt; This post examines attention economy as a brief prelude to a paper and monograph to be published on it. It examines the current theses on attention economy and a few approaches to reading attention economy in gaming besides foregrounding the attention economy and its functions and influence in MMORPGs.&lt;br /&gt; &lt;a href="http://bit.ly/OP7QFl"&gt;http://bit.ly/OP7QFl&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Making of an Asian City&lt;/b&gt;&lt;br /&gt; Nishant Shah attended the conference on 'Pluralism in Asia: Asserting Transnational Identities, Politics, and Perspectives' organised by the Asia Scholarship Foundation, in Bangkok, where he presented the final paper based on his work in Shanghai. The paper, titled 'The Making of an Asian City', consolidates the different case studies and stories collected in this blog, in order to make a larger analyses about questions of cultural production, political interventions and the invisible processes that are a part of the IT Cities.&lt;br /&gt; &lt;a href="http://bit.ly/MXxyXP"&gt;http://bit.ly/MXxyXP&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet, Society and Space in Indian City: First Report&lt;/b&gt;&lt;br /&gt; This is the first report on the progress of the research on Internet, Society and Space in Indian City. The post is a collection of some of the initial focus of these studies. I have started simultaneously exploring and testing various arguments and have listed some key observations from the ones that are nearing completion.&lt;br /&gt; &lt;a href="http://bit.ly/Ndmday"&gt;http://bit.ly/Ndmday&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Digital Natives Workshop in Taipei: Only a Few Seats Left!!!&lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society in collaboration with the Frontier Foundation is holding a three day Digital Natives workshop in Taipei from 16 to 18 August, 2010. The three day workshop will serve as an ideal platform for the young users of technology to share their knowledge and experience of the digital and Internet world and help them learn from each other’s individual experiences.&lt;br /&gt; &lt;a href="http://bit.ly/P4mCKv"&gt;http://bit.ly/P4mCKv&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;NMEICT Funds Book Conversion Project for the Print Disabled&lt;/b&gt;&lt;br /&gt; IIT, Kharagpur, Daisy Forum of India, Inclusive Planet and the Centre for Internet and Society have joined hands to undertake a project for the print disabled. The National Mission on Education through Information and Communication Technology (NMEICT) is funding this project.&lt;br /&gt; &lt;a href="http://bit.ly/bWHi00"&gt;http://bit.ly/bWHi00&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right to Read: Campaign Updates&lt;/b&gt;&lt;br /&gt; A nationwide campaign on Right to Read was co-organised by CIS along with the Daisy Forum of India and Inclusive planet to highlight the lack of content in accessible formats and accelerate change in the provisions of the Indian Copyright Act, 1957, which presently does not permit the conversion of books in accessible formats for the benefits the blind, visually impaired and other reading disabled persons. The campaign is affiliated with the global R2R campaign started by the World Blind Union in April 2008.&lt;br /&gt; &lt;a href="http://bit.ly/akoaSj"&gt;http://bit.ly/akoaSj&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Analysis of the Copyright (Amendment) Bill, 2010&lt;/b&gt;&lt;br /&gt; CIS analyses the Copyright (Amendment) Bill, 2010, from a public interest perspective to sift the good from the bad, and importantly to point out what crucial amendments should be considered but have not been so far.&lt;br /&gt; &lt;a href="http://bit.ly/KLBQDx"&gt;http://bit.ly/KLBQDx&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A Guide to Key IPR Provisions of the Proposed India-European Union Free Trade Agreement&lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society presents a guide for policymakers and other stakeholders to the latest draft of the India-European Union Free Trade Agreement, which likely will be concluded by the end of the year and may hold serious ramifications for Indian businesses and consumers.&lt;br /&gt; &lt;a href="http://bit.ly/Rw7whN"&gt;http://bit.ly/Rw7whN&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Access to International Agricultural Research&lt;/b&gt;&lt;br /&gt; Open access advocates have urged the top management of the Consultative Group on International Agricultural Research to give open access to its research publications. A report by Subbiah Arunachalam on 3 June, 2010 was also circulated to all the signatories of the letter.&lt;br /&gt; &lt;a href="http://bit.ly/cspMYY"&gt;http://bit.ly/cspMYY&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Catching up on broadband&lt;/b&gt;&lt;br /&gt; The govt can invest some of the Rs 1,00,000 crore from the spectrum auctions to help India catch up on broadband, says Shyam Ponappa in his latest article published in the Business Standard on July 1, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/ag67TU"&gt;http://bit.ly/ag67TU&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/july-2010-bulletin'&gt;https://cis-india.org/about/newsletters/july-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-10T09:41:01Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/internet-governance-human-rights">
    <title>Internet Governance and Human Rights: Strategies and Collaborations for Empowerment </title>
    <link>https://cis-india.org/events/internet-governance-human-rights</link>
    <description>
        &lt;b&gt;Leading up to the 2010 IGF, The Association for Progressive Communications (APC), Global Partners, the Centre for Internet and Society (CIS), IT for Change, and the Dynamic Coalition on Internet Rights and Principles are hosting, on 13 September 2010 in Vilnius, an event on 'Internet Governance and Human Rights: Strategies and Collaborations for Empowerment'. &lt;/b&gt;
        
&lt;p&gt;Internet governance has significant impact on human rights. This is reflected by the inclusion of human rights considerations in the Geneva Declaration of Principles and the Tunis Agenda, which gave the IGF its mandate. However, human rights discussions have not featured prominently at the IGF. What discussions there have been tended to focus on civil and political rights without also sufficiently considering how the internet relates to cultural, social and economic rights. The indivisibility of rights has not received the attention it requires.&lt;/p&gt;
&lt;p&gt;The Internet governance and human rights communities work in different spaces and rarely have the opportunity to interact. The presence of the UN Special Rapporteur on Freedom of Expression, Frank la Rue at the 2009 IGF and again at the 2010 IGF shows that this is beginning to change. The 2010 IGF presents a valuable opportunity to place human rights more firmly on the Internet governance map and to identify opportunities for collaboration with mainstream human rights communities.&lt;/p&gt;
&lt;p&gt;With an increasing emphasis on the development agenda in the IGF it is also a good opportunity to look at the links between human rights, development and the Internet.&lt;/p&gt;
&lt;p&gt;Join the conversation with human rights, Internet governance and development activists as we review pressing IG issues such as access, diversity, equality, freedom, openness and development with a view to strengthening the human rights agenda at the IGF.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;More concretely, we hope to:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;continue building effective collaborations promoting human rights in Internet governance, and,&amp;nbsp;&lt;/li&gt;&lt;li&gt;identify appropriate spaces for intervention in the 2010 IGF.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Agenda:&amp;nbsp; &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
Moderator: Chad Lubelsky. Global Networking, Policy &amp;amp; Advocacy Coordinator,
&lt;p&gt;Association for Progressive Communications (APC)&lt;/p&gt;
&lt;p&gt;14:00 Introduction: Background and rationale of the session, aims and objectives. Anriette Esterhuysen (APC)&lt;/p&gt;
&lt;p&gt;Keynote speaker : Frank La Rue, UN Special Rapporteur on the Right to Freedom of Opinion and Expression.&lt;/p&gt;
&lt;p&gt;Keynote speaker: Arvind Ganesan, Director or Business and Human Rights Program, Human Rights Watch.&lt;/p&gt;
&lt;p&gt;14:45 Questions&lt;/p&gt;
&lt;p&gt;15:00 Open discussion session on 'Human rights and internet policy: the interconnectedness of economic, social, cultural, civil and political rights'. Moderated by Lisa Horner (Global Partners) and Anja Kovacs (the Centre for Internet and Society).&lt;/p&gt;
&lt;p&gt;15:40 Coffee/tea break&lt;/p&gt;
&lt;p&gt;16:00 Breakout group discussions&lt;/p&gt;
&lt;p&gt;16:40 Report Backs&lt;/p&gt;
&lt;p&gt;17:00 Plenary discussion on the way forward (Anriette Esterhuysen, APC and Parminder Jeet Singh, IT for Change)&lt;/p&gt;
&lt;p&gt;17:20 Closing remarks&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/internet-governance-human-rights'&gt;https://cis-india.org/events/internet-governance-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T03:59:50Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/freedom-of-expression">
    <title>Freedom of Expression or Access to Knowledge: Are We Taking the Necessary Steps Towards an Open and Inclusive Internet? </title>
    <link>https://cis-india.org/events/freedom-of-expression</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is co-organising a workshop on Freedom of Expression or Access to Knowledge: Are We Taking the Necessary Steps Towards an Open and Inclusive Internet? at the Internet Governance Forum on &lt;/b&gt;
        
&lt;p&gt;Although cyber-utopian visions have long been discredited, the promise that the Internet contains as a tool to work towards democratisation and greater social justice has not yet lost its attraction. This workshop will consider what kind of Internet architecture is needed, what kind of 'openness' and Internet 'freedom' is required to ensure that such visions can actually translate into reality. While the importance of freedom of expression has been fairly widely acknowledged, a concerted approach to many more Internet governance issue is urgently required if those who are at the forefront of struggles for social justice online are to continue to do their important work. The interplay between access to knowledge (including access to information and access to culture) on the one hand and human rights on the other, too, for example, requires our urgent attention.&lt;/p&gt;
&lt;p&gt;The aim of this workshop will be, then, to come to a more in-depth and more rounded understanding of what issues impact the democratising potential of the Internet and how exactly they do so, so that we can also start communicating about these with greater clarity. To reach this aim, the workshop will bring together activists, researchers and other stakeholders with expertise on different regions of the world and, consequently, at times diverging opinions on what the problems and solutions with regard to Internet governance are, and will bring them in debate with each other.&lt;/p&gt;
&lt;p&gt;The workshop will be organized in a roundtable format in order to increase the involvement of the participants. Initial remarks of the speakers will be followed by debate, and active moderation will ensure that the discussions are dynamic. The issues raised by the speakers will be grouped under several axes, including: (i) Civic empowerment online: towards a new public sphere?; (ii) governmental and private control over information and personal data; (iii) Cases of tension between copyright protection and access to knowledge online. Cases such as the adoption of laws following the three strikes model and the adoption of open data regulations will be taken into consideration.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Which of the five broad IGF Themes or the Cross-Cutting Priorities does your workshop fall under?&lt;br /&gt;&lt;/strong&gt;Security, Openness and Privacy&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Have you organized an IGF workshop before?&lt;/strong&gt; Yes&lt;br /&gt;&lt;strong&gt;If so, please provide the link to the report&lt;/strong&gt;:&lt;br /&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=94"&gt;http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=94&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Provide the names and affiliations of the panellists you are planning to invite:&lt;br /&gt;Civil Society:&lt;/strong&gt;&lt;br /&gt;Robert Guerra – Freedom House, US&lt;br /&gt;Anja Kovacs – Centre for Internet and Society, India&lt;br /&gt;Kevin Bankston – EFF, US&lt;/p&gt;
&lt;p&gt;Academics:&lt;br /&gt;Marília Maciel - Center for Technology and Society - Brazil &lt;br /&gt;Jeremy Malcolm - Consumers International, Kuala Lumpur, Malaysia&lt;/p&gt;
&lt;p&gt;Government:&lt;br /&gt;Johan Hallenborg – Swedish Ministry for Foreign Affairs, Sweden&lt;br /&gt;José Murilo Junior – Brazilian Ministry of Culture, Brazil&lt;/p&gt;
&lt;p&gt;Business sector:&lt;br /&gt;Alan Davidson – Director of Public Policy and Government Affairs for the Americas&lt;br /&gt;Cornelia Kutterer, Microsoft, Belgium&lt;/p&gt;
&lt;p&gt;Multistakeholder initiative:&lt;br /&gt;Susan Morgan, Global Network Initiative&lt;/p&gt;
&lt;p&gt;Remote moderator: &lt;br /&gt;Carlos Affonso Pereira de Souza - Center for Technology and Society, Getulio Vargas Foundation, Brazil&lt;/p&gt;
&lt;p&gt;(A moderator is still to be determined but will be chosen from among the civil society and academic speakers. All speakers have confirmed their participation)&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Biographies&lt;/em&gt;:&lt;br /&gt;There are no panelists biographies associated to this workshop at the moment.&lt;/p&gt;
&lt;p&gt;Provide the name of the organizer(s) of the workshop and their affiliation to various stakeholder groups:&lt;br /&gt;Carlos Affonso Pereira de Souza - Center for Technology and Society, Getulio Vargas Foundation – civil society&lt;br /&gt;Johan Hallenborg, Swedish Ministry for Foreign Affairs - government&lt;br /&gt;Anja Kovacs, Centre for Internet and Society - civil society&lt;br /&gt;Jeremy Malcolm. Consumers International - civil society&lt;br /&gt;Marília Maciel - Center for Technology and Society, Getulio Vargas Foundation – civil society&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Organization&lt;/strong&gt;:Centre for Internet and Society, India, and Center for Technology and Society of the Getulio Vargas Foundation, Brazil&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contact Persons&lt;/strong&gt;: Anja Kovacs and Marília Maciel&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/freedom-of-expression'&gt;https://cis-india.org/events/freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T03:59:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
