<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1206 to 1220.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2016-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dna-amrita-madhukalya-april-23-2016-government-keeps-experts-out-of-cyber-security-discussions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-raj-shekhar-arun-dev-v-narayan-a-selvaraj-cctv-plays-sherlock"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/governance-now-april-23-2016-taru-bhatia-will-facebook-twitter-relocate-servers-to-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-on-smart-cities-mission-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/aadhaar-by-numbers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-april-10-2016-2014-showed-the-power-of-twitter"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information">
    <title>Facebook: A Platform with Little Less Sharing of Personal Information</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information</link>
    <description>
        &lt;b&gt;As Facebook becomes less personal, what happens to digital friendship?&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/eye-2016-facebook-social-personal-information-digital-friendship-2789325/"&gt;published in the Indian Express&lt;/a&gt; on May 8, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indianexpress.com/tag/facebook/"&gt;Facebook&lt;/a&gt; is worried. Even though usage is growing, something strange is happening on the social network. For the first time since it started its journey as a website to rate datable people on college campuses, to becoming the global reference point that defined friendship in the connected age, people are sharing less personal information on Facebook. For a social media network that positions itself largely as a space where our everyday, banal doings become newsworthy articulations, this is surprising news. But it is true. On Facebook, the traffic is high, but most of it is now sharing of external information. People are sharing links to news, to listicles, to videos, to blogs entries, to pictures and to information that they find interesting, but they are writing less and less about what it is that they are doing and feeling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ironically, this coincides with the latest change in Facebook’s “response” options, where the ubiquitous “Like” button can now expand to other emojis where you can also be appropriately angry, sad, surprised, or happy about the shared content. Even as Facebook is trying to get its users to qualify how they feel and give emotional value to their likes, people seem to be sharing even less of their private lives on Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the key ways of understanding this drop in people sharing their personal information is through the concept of “context collapse”. It has been a concern since the first instances of disembodied digital communication. In our everyday life, we make sense of information based on the different contexts that surround us. The person who authors the information, the setting within which that information reaches us, the emotional state that we are in when encountering the information, our sense of where we are when processing it, and the preparedness we have for receiving this information are all crucial parameters by which we make sense of the meaning of the information and also our response to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Facebook, the context within which information and transactions have made sense is “friendship”. The site’s USP was that you could bring in a variety of information, but you were always sharing it with friends. You could have a large audience, but this audience is formed of people you know, people you trust, people you add to your friend groups — there is a sense of intimacy, privacy, and casualness that marks the flow of information. You are able to talk, in an equal breath, about what you had for breakfast, your crush on a celebrity, your random acts of charity, and your strong political rant, one after the other, without requiring to think about what you are posting and how others will receive it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Facebook is not really a friendship platform. It is a company interested in selling our interactions and data to advertisers who can target us with content and information based on the patterns of our behaviour. To serve its advertisers better, Facebook started privileging “verified” information trying to ensure news and content producers higher attention and more eyeballs. This was further strengthened by their continued integration with third party vendors, who could push and pull information into the social world of Facebook, and is seen as one of the biggest reasons for this drop. Any newsfeed in the last few months has had equal amounts of professional and amateur content, leading to a context collapse, where you no longer feel like your Facebook feed is a private and intimate conversation with friends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Facebook’s expansive integration of its products —WhatsApp chats, Instagram updates, and Tumblr posts all can collapse into one — produced a confusing space where the personal information that you were once happy to share with your friends, is suddenly being shared along with news and information. Also, digital behaviour works on mirroring, and we often shape our updates to match what we see on our timelines. If we more and more see external content rather than personal statuses, we also start sharing more third party news and links, thus producing a domino effect of everybody shying away from extremely personal or intimate moments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, for the millennials, has been the context within which friendship got structured. Its own transitions have now collapsed that context, leading people to think of it as a content aggregator. It is going to be interesting to see what happens to our digital friendships and networks if Facebook is no longer the space where they are housed.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-06-05T02:38:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm">
    <title>Privacy Issues with DRM</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-issues-with-drm</link>
    <description>
        &lt;b&gt;This post has been written by Jalaj Pandey interning at CIS. It elaborates upon the various privacy issues with the Digital Rights Management. The author talks about the various ways in which content producers use DRM as a tool to infringe the privacy of the end users. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nehaa Chaudhari provided inputs and also edited the blog post. &lt;a href="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm.docx" class="internal-link"&gt;Click to download the File&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;span&gt;The ubiquity of internet in today's world has made content and information sharing an easy task. &lt;/span&gt;&lt;a name="_ftnref1"&gt;&lt;/a&gt;&lt;span&gt; A certain media file can be shared and made public with hardly any technical obstacles. &lt;/span&gt;&lt;a name="_ftnref2"&gt;&lt;/a&gt;&lt;span&gt; Issues 	like hacking, unauthorized copying and publication, unlicensed usage have become concerns for content producers, who have employed Digital Rights 	Management (hereafter DRM) measures to address some of them.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Several instances of the online privacy intrusion by the content producers have been recorded.	&lt;a name="_ftnref3"&gt;&lt;/a&gt; In 	such a scenario the balancing the rights of the content producers and the end users becomes an important one. It is imperative to find a common ground to safeguard the interests of both the parties involved. In the recent past DRM has been receiving a lot of flak	&lt;a name="_ftnref4"&gt;&lt;/a&gt; because of the privacy issues contented by the users.	&lt;a name="_ftnref5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the most rudimentary form privacy can be explained as any information about an individual which he/she does not want to be made public. It is important 	to mention that this information is seen from the perspective of an ordinary reasonable person. The UN Declaration of Human Rights, 1948, defines privacy as a fundamental right of every human.	&lt;a name="_ftnref6"&gt;&lt;/a&gt; The functioning of the DRM 	is based on restricting the usage or distribution of the content. Since this restriction is only possible after there is a formal identification of the end 	user,&lt;a name="_ftnref7"&gt;&lt;/a&gt; the content producers 	end up collecting information about the users. For example: a DRM for a music file might work in a manner where it can only be accessed by one computer from which the user accesses and registers for the first time.	&lt;a name="_ftnref8"&gt;&lt;/a&gt; DRMs initially identify the IP addresses of the system and make the file functioning on only that IP address.	&lt;a name="_ftnref9"&gt;&lt;/a&gt; In this way the producer ends up collecting information about the end user. Different DRM models take different ways to collect information of their user.	&lt;a name="_ftnref10"&gt;&lt;/a&gt; While collecting IP 	addresses&lt;a name="_ftnref11"&gt;&lt;/a&gt; in one of them the other way is tracking the user information via download,	&lt;a name="_ftnref12"&gt;&lt;/a&gt; browsing activities, 	subscription service,&lt;a name="_ftnref13"&gt;&lt;/a&gt; etc. 	The usage log of the users is generated and becomes a valuable asset to assess and predict the preferences of the users&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two contentions of privacy have been raised on the privacy issues of DRM -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) What is the accountability of this process and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Whether it puts the content producers in a position where they can control the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information collected is under the control of content producers, who mostly store this information in the form database. BEUC (European Consumer 	Organization) claimed that the DRM systems technologically enable content providers to monitor private consumption of content, create reports of consumption, and profile users.	&lt;a name="_ftnref14"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information is at the disposal of the content producers. An assessment of DRM applications under Canadian Privacy showed that the firms did not even recognise privacy issues of the customers as a priority.	&lt;a name="_ftnref15"&gt;&lt;/a&gt; In fact the firms failed to provide the information that was stored in their databases.	&lt;a name="_ftnref16"&gt;&lt;/a&gt; This gives an idea about 	the lack of transparency that exists in collecting the information about users. The question whether users are aware of what information is being collected 	and to what extent they are being tracked online remains unanswered. The CEN/ISSS (European Committee for Standardization/ Information Society Standardisation System) pointed out that DRMs have a large potential to transmit, generate personal information about users.	&lt;a name="_ftnref17"&gt;&lt;/a&gt; It has also been characterized by unprecedented levels of monitoring by various content producers.	&lt;a name="_ftnref18"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further the principled level argumentation to this is on lines of collection of information without any authentication from the user herself/himself. It is essential that if any information is collected or saved by the producers it should only be after taking consent of the user.	&lt;a name="_ftnref19"&gt;&lt;/a&gt; Surveillance and compelled disclosure of information about intellectual consumption threaten rights to personal integrity.	&lt;a name="_ftnref20"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DRMs take away the anonymity of the consumption.	&lt;a name="_ftnref21"&gt;&lt;/a&gt; Since the producers can practically monitor the content usage of the user, this has led to wide scale of price discrimination.	&lt;a name="_ftnref22"&gt;&lt;/a&gt; This means that producers would monitor and assess the preferences	&lt;a name="_ftnref23"&gt;&lt;/a&gt; of the user and subsequently raise the prices of that particular class of products.	&lt;a name="_ftnref24"&gt;&lt;/a&gt; In the report of FIPR 	(Foundation of Information Policy and Research) it was found that Microsoft had been trying to implement their DRM systems in their products using a similar approach to gain a monopoly position as in their strategy of browser implementation.	&lt;a name="_ftnref25"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 	&lt;strong&gt; Sony BMG copy protection rootkit scandal		&lt;a name="_ftnref26"&gt;&lt;/a&gt; &lt;/strong&gt; in 2005 brought much criticism to DRM. It was found out that Sony BMG had introduced illegal and harmful copy protection measure in its CDs. The rootkit 	element of the software is used to hide virtually all traces of the copy protection software's presence on a PC, so that an ordinary computer user would 	have no way to find it. Further more than just the DRM part of it the software also made the user's system open to a number of malwares and created 	vulnerabilities in the system. Sony was eventually made to compensate consumer costs, etc on the same. However the question of whether the database in the hands of companies can be used in arbitrary manner was intensely discussed after this.	&lt;a name="_ftnref27"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is essential that an effective framework is brought into effect which caters to privacy interests of the users. Privacy is the basic human right and it 	is the onus of the State to protect and safeguard this right. It is essential that the State does not compromise and support mechanisms which promote the 	welfare of the content producers over the users. The balance of users and producers becomes all the more important in a developing country like ours. The 	lack the awareness and the knowledge coupled with increasing usage of internet can lead to the exploitation of many. It is essential that the States see 	through these problems and collectively find an all encompassing solution to it.&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; K. G. Coffman and A. M. Odlyzko, Growth of the Internet, AT&amp;amp;T Labs - Research, July 6, 2001, available at, (			&lt;a href="http://www.dtc.umn.edu/~odlyzko/doc/oft.internet.growth.pdf"&gt;www.dtc.umn.edu/~odlyzko//doc/oft.internet.growth.pdf&lt;/a&gt;) (hereinafter 			Growth).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; The Daily Source, The Growing Impact of the Internet, April 4, 2016, available at (https://www.dailysource.org/about/impact).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Corryne Mcsherry, Adobe Spyware Reveals (Again) The Price Of DRM: Your Privacy And Security, Electronic Frontier Foundation, October 17, 2014, 			available at,&lt;/p&gt;
&lt;p&gt;(https://www.eff.org/deeplinks/2014/10/adobe-spyware-reveals-again-price-drm-your-privacy-and-security).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Digital Rights Management: A failure in the developed world, a danger to the developing world, Electronic Frontier Foundation, March 23, 2005, 			available at,&lt;/p&gt;
&lt;p&gt;(https://www.eff.org/wp/digital-rights-management-failure-developed-world-danger-developing-world).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; R. Subramanya and Byung k. Yi, Digital Rights Management, available at, (			&lt;a href="https://www.academia.edu/8054608/Digital_Rights_Management"&gt;https://www.academia.edu/8054608/Digital_Rights_Management&lt;/a&gt;) (hereinafter 			Digital Rights Management).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; Global internet liberty campaign, privacy and human rights, An International Survey of Privacy Laws and Practice, available at, 			(http://gilc.org/privacy/survey/intro.html).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Ann Cavoukian, Privacy and Digital Rights Management (DRM): An Oxymoron, Information and Privacy Commissioner Ontario, available at, (			&lt;cite&gt;https://www.ipc.on.ca/images/Resources/up-1&lt;/cite&gt;&lt;strong&gt;drm&lt;/strong&gt;&lt;cite&gt;.pdf&lt;/cite&gt; ) (hereinafter Oxymoron)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Varian, H.R. (1985) 'Price discrimination and social welfare', American Economic Review, Vol. 75, available at, 			(http://www.economics-ejournal.org/economics/journalarticles/2007-1/references/Varian1985).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; Privacy and Digital Rights Management,A position paper for the W3C workshop on Digital Rights Management, January 2001, available at, (			&lt;cite&gt;www.w3.org/2000/12/drm-ws/pp/hp-poorvi.html&lt;/cite&gt;&lt;cite&gt;)&lt;/cite&gt;&lt;cite&gt;.&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; Growth supra note, 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Digital Rights Management supra note, 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Thierry Rayna, Privacy or piracy, why choose? Two solutions to the issues of digital rights management and the protection of personal information, 			Intellectual Property Management, Vol. X, No. Y, available at,&lt;/p&gt;
&lt;p&gt;(www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; Oxymoron supra note, 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; BEUC, Consumentenbond, and CLCV at DRM Working Group 1 (2002), available at, (&lt;cite&gt;https://privacy.org.nz/assets/Files/4558510.pdf).&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Natali Helberger and Kristo´f Ker´enyi and Bettina Krings, Digital Rights Management and Consumer Acceptability: A Multi-Disciplinary 			Discussion of Consumer Concerns and Expectations, available at (citeseerx.ist.psu.edu/showciting?cid=733532).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Knud Bohle, Indicare, Research into unfriendly DRM : A Review, December, 2004,available at, (citeseerx.ist.psu.edu/showciting?cid=733532) 			(hereinafter Indicare).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; European Committee for Standardization/Information Society Standardisation System (CEN/ISSS) DRM Report, 2003.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Indicare supra note, 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; News Release, "Forrester Technographics Finds Online Consumers Fearful of Privacy Violations" (October 27, 1999 available at, 			(www.forrester.com/ER/Press/Release/0,1769,177,FF.html).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Julia E. Cohen, Georgetown Law Faculty Publications, DRM and Privacy, January 2010, available at,&lt;/p&gt;
&lt;p&gt;(https://www.academia.edu/2164013/DRM_and_Privacy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Thierry Rayna, Privacy or piracy, why choose? Two solutions to the issues of digital rights management and the protection of personal information, Intellectual Property Management, available at, (			&lt;a href="http://www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138"&gt;www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138&lt;/a&gt;) 			(hereinafter Privacy or piracy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; Moe, W. and Fader, P. (2004) 'Dynamic conversion behavior at e-commerce sites', Management Science, Vol. 50, available at,&lt;/p&gt;
&lt;p&gt;(https://www.researchgate.net/publication/227447618_Dynamic_Conversion_Behavior_at_E-Commerce_Sites).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; Privacy or piracy supra note, 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Sismeiro, C. and Bucklin, R. (2004) 'Modeling purchase behavior at an e-commerce web site: a task completion approach', Journal of Marketing 			Research, available at, (&lt;cite&gt;citeseerx.ist.psu.edu/showciting?cid=906878&lt;/cite&gt;&lt;cite&gt;).&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; Ross Anderson, Foundation of Information Policy and Research Consultation Response to DRM (2004), available at, (&lt;cite&gt;www.&lt;/cite&gt; &lt;strong&gt;fipr&lt;/strong&gt;&lt;cite&gt;.org/APIG_&lt;/cite&gt;&lt;strong&gt;DRM&lt;/strong&gt;&lt;cite&gt;_submission&lt;/cite&gt;&lt;cite&gt;.pdf&lt;/cite&gt;).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Otto Helweg, Sony, Rootkits and Digital Rights Management Gone Too Far, Oct, Oct. 31, 2014, available at 			(https://blogs.technet.microsoft.com/markrussinovich/2005/10/31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; Sony BMG Litigation Info, Electronic Frontier Foundation, available at, (https://www.eff.org/cases/sony-bmg-litigation-info).&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-issues-with-drm'&gt;https://cis-india.org/internet-governance/blog/privacy-issues-with-drm&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Jalaj Pandey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-05-03T02:41:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2016-newsletter">
    <title>April 2016 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/april-2016-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the CIS newsletter for April 2016. The key issues we worked on this month included the Aadhaar Act 2016, Standard Essential Patents, cyber security of smart grids, and involvement of international agencies in the smart cities project in India.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Early last year, thanks to the fund raising efforts of a friend of CIS - Suhail Kazi, we received Rs. 1.9 lakhs as donations from 19 individuals. In January this year, we set up an online giving feature on our website which would ease the donation process, but we haven’t got a single donation so far! This could be because many of you may be under a false impression that CIS is very wealthy and does not need more support. Unfortunately, this is no longer true. Today, we are unable to find a single donor who is interested in our Accessibility, Telecom, or RAW programmes. In other words, we need your support. Would you to consider making a small donation to CIS? &lt;strong&gt;Click &lt;a href="http://imojo.in/CISDonations"&gt;here&lt;/a&gt; to donate.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be accessed here: &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;CIS prepared an &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"&gt;FAQ on the Aadhaar / UIDAI project&lt;/a&gt; and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. Further, two infographics were produced to highlight on the questions of "&lt;a href="http://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill"&gt;Can the Aadhaar Act 2016 be Classified as a Money Bill?&lt;/a&gt;" and "&lt;a href="http://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"&gt;Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?&lt;/a&gt;".&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;NVDA team &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/april-2016-report/view"&gt;prepared a report&lt;/a&gt; on the progress of the project for the month of&amp;nbsp;April 2016.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS submitted its &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;comments to the Department of Industrial Policy and Promotion's Discussion Paper&lt;/a&gt; on Standard Essential Patents and their Availability on FRAND Terms. CIS has offered its assistance on other matters aimed at developing a suitable policy framework for SEPs and FRAND in India, and, working towards the sustained innovation, manufacture and availability of mobile technologies in India. A summary of the comments can be &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/summary-of-cis-comments-to-dipp2019s-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;accessed here&lt;/a&gt;. Responses to the Discussion Paper is &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;available here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rohini Lakshané's paper titled &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/patents-and-mobile-devices-in-india-an-empirical-survey"&gt;Patents and Mobile Devices in India: An Empirical Survey&lt;/a&gt; has been accepted for publication by the Vanderbilt Journal of Transnational Law.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Kiran A.B. in a &lt;a class="external-link" href="http://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02"&gt;blog post has documented the availability and openness of data sets in India&lt;/a&gt; that are relevant for monitoring the targets under the SDGs.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Low-cost Aakash tablet and its previous iterations in India have gone through several phases of technological changes and ideological experiments wrote Sumandro Chattapadhyay and Jahnavi Phalkey &lt;a class="external-link" href="http://cis-india.org/raw/buying-into-the-aakash-dream"&gt;in an article published in the Economic and Political Weekly&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/news"&gt;CIS in the News&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS gave inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/daily-mail-april-4-2016-afp-india-biometric-database-crosses-billion-member-mark"&gt;India's biometric database crosses billion-member mark&lt;/a&gt;&amp;nbsp;(AFP and Daily Mail, UK; April 4, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/big-news-network-april-6-2016-claire-lauterbach-panama-papers-and-question-of-privacy"&gt;The Panama Papers and the question of privacy&lt;/a&gt;&amp;nbsp;(Big News Network; April 6, 2016). This was originally published by Privacyinternational.org.&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/economic-times-april-8-2016-neha-alawadhi-daunting-task-ahead-for-investigative-agencies-with-whatsapp-end-to-end-encryption"&gt;Daunting task ahead for investigative agencies with WhatsApp's end-to-end encryption&lt;/a&gt;&amp;nbsp;(Neha Alawadhi; Economic Times; April 8, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar"&gt;PMO’s no to smart cards, insists on Aadhaar&lt;/a&gt;&amp;nbsp;(Somesh Jha; Hindu; April 10, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-telegraph-april-10-2016-2014-showed-the-power-of-twitter"&gt;2014 showed the power of Twitter, now every Indian politician wants a handle&lt;/a&gt;&amp;nbsp;(T.V. Jayan, Smitha Verma,Sonia Sarkar and V. Kumara Swamy; Telegraph; April 10, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-april-13-2016-why-is-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data"&gt;Why is the UIDAI cracking down on individuals that hoard Aadhaar data?&lt;/a&gt;&amp;nbsp;(Alnoor Peermohamed; Business Standard; April 13, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir"&gt;You will need a license to create a WhatsApp group in Kashmir&lt;/a&gt;&amp;nbsp;(Governance Now; April 19, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/governance-now-april-23-2016-taru-bhatia-will-facebook-twitter-relocate-servers-to-india"&gt;Will Facebook, Twitter relocate servers to India?&lt;/a&gt;&amp;nbsp;(Taru Bhatia; Governance Now; April 23, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/dna-amrita-madhukalya-april-23-2016-government-keeps-experts-out-of-cyber-security-discussions"&gt;Government keeps experts out of cyber security discussions&lt;/a&gt;&amp;nbsp;(Amrita Madhukalya; DNA; April 23, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-raj-shekhar-arun-dev-v-narayan-a-selvaraj-cctv-plays-sherlock"&gt;CCTV plays Sherlock&lt;/a&gt;&amp;nbsp;(Raj Shekhar, Arun Dev, V Narayan &amp;amp; A Selvaraj with inputs from Sindhu Kannan and Somreet Bhattacharya; The Times of India; April 24, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;CIS members wrote the following pieces:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li style="text-align: justify;"&gt;Sunil Abraham wrote an&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project"&gt;article in the July 15 edition of Frontline&lt;/a&gt;&amp;nbsp;arguing that the Aadhaar project’s technological design and architecture is an unmitigated disaster and no amount of legal fixes in the Act will make it any better.&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Amber Sinha wrote an article in The Wire arguing that&amp;nbsp;&lt;a href="http://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"&gt;the Aaddhaar Act is not a money bill&lt;/a&gt;, and the Supreme Court may very well question the decision by the Lok Sabha speaker to classify it as such.&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Sumandro Chattapadhyay also wrote on The Wire arguing that "&lt;a href="http://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"&gt;the last chance for a welfare state doesn’t rest in the Aadhaar system&lt;/a&gt;."&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Subhashish Panigrahi's article on the&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/global-voices-april-27-2016-subhashish-panigrahi-eight-challenges-indian-language-wikipedias-need-to-overcome"&gt;8 challenges that Indian language Wikipedias have to overcome was published by Global Voices&lt;/a&gt;. The article had&amp;nbsp;earlier been&amp;nbsp;published in the Wire.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Elonnai Hickok and Vanya Rakesh co-authored an article on&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"&gt;Cyber Security of Smart Grids in India&lt;/a&gt;&amp;nbsp;that was published by Dataquest.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Shyam Ponappa&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-april-6-2016-shyam-ponappa-breakthroughs-needed-for-digital-india"&gt;in his monthly column&lt;/a&gt;&amp;nbsp;published in the Business Standard tell us that it's time the government accepts that current policies are not enough to bring about Digital India.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't have access to read printed materials due to some form of physical, sensory, 	cognitive or other disability. As part of our endeavour to make available accessible content for persons with disabilities, we are developing a text-to-speech software in 15 languages with support from the Hans Foundation. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/march-2016-report.pdf/view"&gt;March 2016 Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/april-2016-report" class="internal-link"&gt;April 2016 Report&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a 	grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;Comments on Department of Industrial Policy and Promotion Discussion Paper on Standard Essential Patents and their Availability on Frand Terms&lt;/a&gt; (Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané; April 23, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;Responses to the DIPP's Discussion Paper on SEPs and their Availability on FRAND Terms&lt;/a&gt; (Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané; April 23, 2016).&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/summary-of-cis-comments-to-dipp2019s-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;Summary of CIS Comments to DIPP’s Discussion Paper on SEPs and their availability on FRAND terms&lt;/a&gt; (Anubha Sinha; April 26, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/global-congress-2015"&gt;Global Congress 2015 - A Collection of Resources&lt;/a&gt; (Pervasive Technologies Team; April 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt;Compilation of Mobile Phone Patent Litigation Cases in India&lt;/a&gt; (Rohini Lakshané; updated on April 15, 2016). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation"&gt;Joining the Dots in India's Big-Ticket Mobile Phone Patent Litigation&lt;/a&gt; (Rohini Lakshané; updated on April 29, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-tezpur-university"&gt;MHRD IPR Chair Series: Information Received from Tezpur University&lt;/a&gt; (Karan Tripathi; April 26, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/sectoral-innovation-councils-on-intellectual-property-rights-2013-rti-requests-dipp-responses"&gt;National IPR Policy Series : Sectoral Innovation Councils on Intellectual Property Rights – RTI Requests + DIPP Responses&lt;/a&gt; (Nehaa Chaudhari and Saahil Dama; April 30, 2016). Nisha S. Kumar assisted in compilation of the document.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/fifth-annual-ip-teaching-workshop"&gt;Fifth Annual IP Teaching Workshop&lt;/a&gt; (Organised by the Centre for Innovation, Intellectual Property and Competition at National Law University Delhi in association with National Academy of Law Teaching, NLU-D; Delhi; March 31 and April 1, 2016). Nehaa Chaudhari was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/first-round-table-on-innovation-ip-and-competition"&gt;First Round-table on Innovation, IP and Competition&lt;/a&gt; (Organized by the Centre for Innovation, Intellectual Property &amp;amp; Competition (CIIPC) at the National Law University, Delhi; India Habitat Centre; New Delhi; April 1-2, 2016). Nehaa Chaudhari and Anubha Sinha attended the round-table.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/brainstorming-workshop-on-pg-programme-on-media-studies-for-ugc-e-pathshala-programme"&gt;Brainstorming Workshop on PG Programme on Media Studies for UGC E-Pathshala Programme&lt;/a&gt; (Organized by Jamia Milla Islamia; New Delhi; April 5, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/sensitization-seminar-on-ipr-for-electronics-ict-sectors"&gt;Sensitization Seminar on IPR for Electronics &amp;amp; ICT Sectors&lt;/a&gt; (Organized by&amp;nbsp;Andhra Pradesh Technology Development &amp;amp; Promotion Centre (APTDC) of Confederation of Indian Industry (CII), in association with Department of Electronics and Information Technology (DeitY); Vishakhapatnam; April 21, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Work Plan&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017"&gt;CIS - A2K Work Plan: July 2016 - June 2017&lt;/a&gt; (CIS-A2K Team; April 2, 2016): We have revised the work plan template taking into account the changed proposal plan sent out by WMF and in light of the feedback that we have received from FDC assessment during last proposal application. The FDC feedback is taken into account at the level of design, RoI and ensuring quality for all our activities.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/global-voices-april-27-2016-subhashish-panigrahi-eight-challenges-indian-language-wikipedias-need-to-overcome"&gt;Eight Challenges Indian-Language Wikipedias Need to Overcome&lt;/a&gt; (Subhashish Panigrahi; Global Voices; April 21, 2016). &lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;&lt;a href="http://thewire.in/2016/03/17/eight-challenges-that-indian-language-wikipedias-need-to-overcome-25062/" target="_blank"&gt;&lt;strong&gt;A version of this post&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt; was previously published on &lt;/strong&gt;&lt;strong&gt;&lt;a href="http://thewire.in/" target="_blank"&gt;&lt;strong&gt;The Wire&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Media Coverage&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/the-telegraph-april-7-2016-anwesha-ambaly-odia-gets-more-space-in-e-world"&gt;Odia gets more space in e-world&lt;/a&gt; (Anwesha Ambaly; The Telegraph; April 7, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/exercise-to-correct-articles-in-tulu-wikipedia-begins"&gt;Exercise to Correct articles in Tulu Wikipedia begins&lt;/a&gt; (Raviprasad Kamila; The Hindu; April 28, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/events/tulu-wikipedia-editathon-to-improve-quality-of-articles-in-tulu-wikipedia"&gt;Tulu Wikipedia Editathon to Improve Quality of Articles in Tulu Wikipedia&lt;/a&gt; (Shri Ramakrishna PU College; Mangaluru; April 26 - 30, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;a style="text-align: justify;" href="http://cis-india.org/openness"&gt;Openness&lt;br /&gt;&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02"&gt;Monitoring Sustainable Development Goals in India: Availability and Openness of Data&lt;/a&gt; (Part II) (Kiran A.B.; April 12, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Cyber Security&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"&gt;Cyber Security of Smart Grids in India&lt;/a&gt; (Elonnai Hickok and Vanya Rakesh; April 25, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Big Data&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;Blog Entry&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/rti-on-smart-cities-mission-in-india"&gt;RTI regarding Smart Cities Mission in India&lt;/a&gt; (Paul Thottan; April 21, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Privacy&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"&gt;FAQ on the Aadhaar Project and the Bill&lt;/a&gt; (Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda; April 13, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india"&gt;Aadhaar Act and its Non-compliance with Data Protection Law in India&lt;/a&gt; (Vanya Rakesh; April 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"&gt;Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?&lt;/a&gt; (Pooja Saxena; April 24, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Articles&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-quint-march-31-2016-nehaa-chaudhari-will-aadhaar-act-address-indias-dire-need-for-a-privacy-law"&gt;Will Aadhaar Act Address India’s Dire Need For a Privacy Law?&lt;/a&gt; (Nehaa Chaudhari; Quint; March 31, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"&gt;The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System&lt;/a&gt; (Sumandro Chattapadhyay; April 19, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"&gt;The Aadhaar Act is Not a Money Bill&lt;/a&gt; (Amber Sinha; April 25, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/rightscon-silicon-valley-2016"&gt;RightsCon Silicon Valley 2016&lt;/a&gt; (Organized by RightsCon; March 31 and April 1, 2016). Elonnai Hickok attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security"&gt;Panel Discussion on UID/ Aadhar act 2016 and its impact on Social, Security&lt;/a&gt; (Organized by Students Christian Movement of India at SCM House; Bangalore; April 25, 2016). Sunil Abraham was a panelist.&lt;/li&gt;
&lt;li&gt;The Centre for the Study of Law and Governance (CSLG), Jawaharlal Nehru University (JNU), organised a &lt;a href="http://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016"&gt;roundtable discussion on Tuesday, April 26&lt;/a&gt;, to discuss the Aadhaar project and Act. Along with Prasanna S, Apar Gupta, and Dr. Chirashree Dasgupta, Sumandro Chattapadhyay was one of the discussants.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/aadhaar-by-numbers"&gt;Aadhaar by Numbers&lt;/a&gt; (Organized by National Institute of Public Finance and Policy; New Delhi; April 29, 2016). Sunil Abraham was a speaker.&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;Article&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-april-6-2016-shyam-ponappa-breakthroughs-needed-for-digital-india"&gt;Breakthroughs Needed For Digital India&lt;/a&gt; (Shyam Ponappa; Business Standard; April 6, 2016 and Organizing India BlogSpot; April 7, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/buying-into-the-aakash-dream"&gt;Buying into the Aakash Dream - A Tablet’s Tale of Mass Education&lt;/a&gt; (Sumandro Chattapadhyay and Jahnavi Phalkey; Economic &amp;amp; Political Weekly; April 23, 2016). &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;Announcement&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/jobs/call-for-proposal-big-data-for-development-field-studies"&gt;Call for Proposal: Big Data for Development – Initial Field Studies&lt;/a&gt; (Sumandro Chattapadhyay; April 29, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from 	policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual 	property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), 	internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations 	of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet 	and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at 	sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an 	indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, 	write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and 	support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 	Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2016-newsletter'&gt;https://cis-india.org/about/newsletters/april-2016-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-05-10T06:26:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security">
    <title>Panel Discussion on UID/ Aadhar act 2016 and its impact on Social, Security </title>
    <link>https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at this event organized by Students Christian Movement of India at SCM House in Bangalore on April 25, 2016. Mathew Thomas and Usha Ramanathan also gave talks.&lt;/b&gt;
        &lt;p&gt;With the passage of the Aadhaar act 2016 is UID / Aadhar mandatory now? How do we understand the issue of Social Security in the context of the new law? What does it mean for those who need to access their senior citizen pension, rations, school and college scholarships, etc.&lt;/p&gt;
&lt;p&gt;How does one understand the money bill route for introducing the bill in Parliament? What are implications of this for the validity of the law?&lt;/p&gt;
&lt;p&gt;What will happen to the court cases challenging the UID now?&lt;/p&gt;
&lt;p&gt;Where are we now on the thorny issues of surveillance, tracking, profiling, biometrics, private and foreign companies and subsidy? What does the law say?&lt;/p&gt;
&lt;p&gt;This discussion will revisit the debates around the UID and examine the implications of the new law.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security'&gt;https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-28T17:02:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india">
    <title>Cyber Security of Smart Grids in India</title>
    <link>https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india</link>
    <description>
        &lt;b&gt;An integral component of the ambitious flagship programme of the Indian Government- Digital India, which paves way for a digital data avalanche in the country, is a well-designed digital infrastructure ensuring high connectivity and integration of services, the potential areas being smart cities, smart homes, smart energy and smart grids, to list a few. Likewise, the 100 Smart Cities Mission envisions changing the face of urbanization in India, to manage the exponential growth of population in the cities by creating smart cities with ICT driven solutions, along with big data analytics. Smart grid technologies are key for both these schemes.&lt;/b&gt;
        &lt;p&gt;The article by Elonnai Hickok and Vanya Rakesh was published by &lt;a class="external-link" href="http://www.dqindia.com/cyber-security-of-smart-grids-in-india/"&gt;Dataquest&lt;/a&gt; on April 25, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Smart grid is a promising power delivery infrastructure integrated with communication and information technologies which enables monitoring, prediction and management of energy usages. Establishment of smart grids becomes highly important for the Indian economy, as the present grid losses are one of the highest in the world at upto 50% and costing India upto 1.5% of its GDP. India operates one of the largest synchronous grids in the world – covering an area of over 3 million sq km, 260 GW capacity and over 200 million customers with the estimated demand of India increasing 4 times by the year 2032.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the year 2013, the Ministry of Power (MoP), in consultation with India Smart Grid Forum and India Smart Grid Task Force released a smart grid vision and roadmap for India, a key policy document aligned to MoP’s overarching objectives of “Access, Availability and Affordability of Power for All”. It lays plans for a framework to address cyber security concerns in smart grids as well. To achieve goals envisaged in the roadmap, the Government of India established the National Smart Grid Mission in the year 2015 for planning, monitoring and implementation of policies and programs related to Smart Grid activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of smart grid projects have been introduced, and are currently underway. KEPCO in Kerala has established smart meter/intelligent power transmission and distribution equipment system in the year 2011 and the smart grid operations focus on peak reduction, load standardization, reduction in power transmission/distribution loss, response to new/renewable energy and reduction in black-out time. Gujarat was introduced to India’s first modernized electrical grid in the year 2014, to study consumer behaviour of electricity usage and propose a tariff structure based on usage and load on the power utility by installing new meters embedded with SIM card to monitor the data. The Bangalore Electricity Supply Company Ltd. (BESCOM) project in Bangalore envisaged the Smart Grid Pilot Project for integration of renewable and distributed energy resources into the grid, which is vital to meet growing electricity demands of the country, curb power losses, and enhance accessibility to quality power.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cybersecurity challenges&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the introduction of a smart grid brings with it certain security risks and concerns, particularly to a nation’s cyber security. Increased interconnection and integration may render the grids vulnerable to cyber threats, putting stored data and computers at great risk.With sufficient cyber security measures, policies and framework in place, a Smart Grid can be made more efficient, reliable and secure as failure to address these problems will hinder the modernization of the existing power system. Smart Grids, comprising of numerous communication, intelligent, monitoring and electrical elements employed in power grid, have a greater exposure to cyber-attacks that can potentially disrupt power supply in a city.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Cyber security and data privacy are some of the key challenges for smart grids in India, as establishment of digital electricity infrastructure entails the challenge of communication security and data management. Digital network and systems are highly prone to malicious attacks from hackers which can lead to misutilisation of consumers’ data, making cyber security the key issue to be addressed. Vulnerabilities allow an attacker to break a system, corrupt user privacy, acquire unauthorized access to control the software, and modify load conditions to destabilize the grid. Hackers or attackers, who compromise a smart meter can immediately alter their energy costs or change generated energy meter readings to monetize it by help of remote PCs. Also, inserting false information could mislead the electric utility into making incorrect decisions about the local usage and capacity.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Initiatives in India&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;As cybersecurity is critical for Digital India and the Smart City Concept note highlights a smart grid to be resilient to cyber attacks, a National Cyber Coordination Centre is being established by the Indian Government. Also, National Cyber Safety and Security Standards has been started with a vision to safeguard the nation from the current threats in the cyberspace, undertaking research to understand the nature of cyber threats and Cyber Crimes by facilitating a common platform where experts shall provide an effective solution for the complex and alarming problems in the society towards cyber security domain. Innovative strategies and compliance procedures are being developed to curb the increasing complexity of the Global Cyber Threats faced by countries at large.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The National Cyber Security Policy 2013 was released with an umbrella framework for providing guidance for actions related to security of cyberspace, by the Department of Electronics and Information Technology (DeitY). The Working Group on Information Technology established under the Planning Commission has also published a 12 year plan on IT development in India with a road map for cyber security, stating six key priority and focus areas for cyber security including:Enabling Legal Framework ; Security Policy, Compliance and Assurance; Security R&amp;amp;D; Security Incident – Early Warning and Response ; Security awareness, skill development and training, and Collaboration.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In case of Bangalore, to ensure smooth implementation of BESCOM’s vision, the company realised the need to put a cyber-security system in place to protect the smart grid installations in Bangalore city. To ensure security, BESCOM has come out with a separate IT security policy and dedicated trained IT cadre to safeguard its data and servers, becoming one of the few Discoms in India to take such measures for safeguarding the servers and data network from cyber crimes and threats.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Way forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;An electric system like Smart grids has enormous and far-reaching economic and social benefits. However, increased interconnection and integration tends to introduce cyber-vulnerabilities into the grid. With the evolution of cyber threats/attacks over time, it can be said that there are a lot of challenges for implementing cyber security in Indian smart grid. Considering importance of secure smart grid networks for flagship projects in India, the existing regulatory framework does not seem to adequately take into consideration the cyber security implications.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In light of this, the government must aim to develop and adopt high level cybersecurity policy to withstand cyber-attacks. Also, India must focus on skills development in this domain and have a capable workforce to achieve the targets set by Indian Government. The country must look up to develop an overall intelligence framework that brings together industry, governments and individuals with specific capabilities for this purpose.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The National Cyber Security Policy 2013, protecting public and private infrastructure from cyber attacks, along with all kinds of information, such as personal information of web users, banking and financial information,etc. is yet to be implemented by the Government properly. In the Indian Power sector, the cyber security regulations or mandates are absent in the National Electricity Policy (NEP) as well as the Electricity Act 2003 and its amendment in 2007, with no reference to cyber security concerns. These key legislations must be amended to take into account the growing challenges due to increased use of ICT in the power sector.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;As the concept of smart grids is still evolving in India, professional intervention from various domains has pushed for adoption and development of standard process and products. Many international standard setting organisations like IEC, IEEE, NIST, CENELEC are engaged in standardization activities of Smart Grids and in India, the Bureau of Indian Standards (BIS) has been rolling out several varieties of standards targeting various technologies. Therefore, BIS must develop standards taking into account the security challenges in the cyberspace as well.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Apart from policy and regulatory measure, the system on which the smart grids are built and networked must be made architecturally strong and secure.One of the areas where due attention is required is making the Supervisory Control and Data Acquisition (SCADA) secure, a system that operates with coded signals to provide control of remote equipment and is entirely based on computer systems and network. Numerous systems also employ the Public Key Infrastructure (PKI) to secure the Smart Grids and address the security challenges by enabling identification, verification, validation and authentication of connected meters for network access. This can be leveraged for securing data integrity, revenue streams and service continuity. The key vulnerable areas prone to cyber attacks on information transmission are network information, data integrity and privacy of information. The information transmission networks must be well-designed as the network unavailability may result in the loss of real-time monitoring of critical smart grid infrastructures and power system disasters.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Addressing these fast growing challenges and cyber security needs of the country by adopting suitable regulatory, policy and architectural steps would help achieve the objectives of Digital India and Smart Cities enabling “Access, Availability and Affordability for All”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india'&gt;https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-28T15:34:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill">
    <title>The Aadhaar Act is Not a Money Bill</title>
    <link>https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill</link>
    <description>
        &lt;b&gt;While the authority of the Lok Sabha Speaker is final and binding, Jairam Ramesh’s writ petition may allow the Supreme Court to question an incorrect application of substantive principles. This article by Amber Sinha was published by The Wire on April 24, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Originally published by &lt;a href="http://thewire.in/2016/04/24/the-aadhaar-act-is-not-a-money-bill-31297/"&gt;The Wire&lt;/a&gt; on April 24, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Since its introduction as a money bill in the Lok Sabha in the first week of March &lt;strong&gt;[1]&lt;/strong&gt;, the Aadhaar (Targeted delivery of Financial and other subsidies, benefits and services) Bill, 2016 has been embroiled in controversy. The Lok Sabha rejected the five recommendations of the Rajya Sabha and adopted the bill on March 16 and only presidential assent was required for it become to become valid law. However, former Union Minister Jairam Ramesh filed a writ petition contesting the decision to treat the Aadhaar Bill as a money bill. The petition is due to be heard before the Supreme Court on April 25, and should the court decide to entertain the petition, it could have far-reaching implications for the Aadhaar project and the manner in which money bills are passed by the Parliament.&lt;/p&gt;
&lt;p&gt;There are three broad categories of bills (all legislations or Acts are known as ‘bills’ till they are passed by the Parliament) that the Parliament can pass. The first kind, Constitution Amendment Bills, are those that seek to amend a provision in the Constitution of India. The second are financial bills which contain provisions on matters of taxation and expenditure. Money bills are a subset of the financial bills which contain provisions only related to taxation, financial obligations of the government, expenditure from or receipt to the Consolidated Fund of India and any matters incidental to the above. The third category is of ordinary bills which includes all other bills. The process for the enactment of all these bills is different. Money bills are peculiar in that they can only be introduced in the Lok Sabha where it can be passed by simple majority. Following this, it is transmitted to the Rajya Sabha. The Rajya Sabha’s powers are restricted to giving recommendations on the Bill and sending it back to the Lok Sabha, which the Lok Sabha is under no obligation to accept. The decision to introduce the Aadhaar Bill as a money bill has been widely seen as an attempt to circumvent the Rajya Sabha where the ruling party is in a minority.&lt;/p&gt;
&lt;p&gt;Article 110 (1) of the Constitution defines a money bill as one containing provisions only regarding the matters enumerated or any matters incidental to them. These are a) imposition, regulation and abolition of any tax, b) borrowing or other financial obligations of the Government of India, c) custody, withdrawal from or payment into the Consolidated Fund of India (CFI) or Contingent Fund of India, d) appropriation of money out of CFI, e) expenditure charged on the CFI or f) receipt or custody or audit of money into CFI or public account of India. Article 110 is modelled on Section 1(2) of the (UK) Parliament Act, 1911 which also defines the money bills as those only dealing with certain enumerated matters. The use of the word “only” was brought up by Ghanshyam Singh Gupta during the Constituent Assembly Debates. He pointed out that the use of the word “only” limits the scope of money bills to only those legislations which did not deal with other matters. His amendment to delete the word “only” was rejected clearly establishing the intent of the framers of the Constitution to keep the ambit of money bills extremely narrow.&lt;/p&gt;
&lt;p&gt;While the Aadhaar Bill does make references to benefits, subsidies and services funded by the Consolidated Fund of India (CFI), even a cursory reading of the bill reveals its main objectives as creating a right to obtain a unique identification number and providing for a statutory apparatus to regulate the entire process. The mere fact of establishing the Aadhaar number as the identification mechanism for benefits and subsidies funded by the CFI does not give it the character of a money bill. The bill merely speaks of facilitating access to unspecified subsidies and benefits rather than their creation and provision being the primary object of the legislation. Erskine May’s seminal textbook, ‘Parliamentary Practice” is instructive in this respect and makes it clear that a legislation which simply makes a charge on the Consolidated Fund does not becomes a money bill if otherwise its character is not that of one.&lt;/p&gt;
&lt;p&gt;PDT Achary, former secretary general of the Lok Sabha, has expressed concern about the use of Money Bills as a means to circumvent the Rajya Sabha. He has written here &lt;strong&gt;[2]&lt;/strong&gt; and here &lt;strong&gt;[3]&lt;/strong&gt;, on what constitutes a money bill and how the attempts to pass off financial bills like the Aadhaar Bill as money bills could erode the supervisory role Rajya Sabha is supposed to play. This is especially true in the case of a legislation like the Aadhaar Bill which has far reaching implications for individual privacy as it governs the identification system conceptualised to provide a unique and lifelong identity to residents of India dealing with both the analog and digital machinery of the state and by virtue of Section 57 of any private entities. Already over 1 billion people have been enrolled under this identification scheme, and the project has been a subject of much debate and a petition before the Supreme Court. The project has been portrayed as both the last hope for a welfare state and  surveillance infrastructure. Regardless of which of the two ends of spectrum one leans towards, it is undeniable that the law governing the Aadhaar project deserved a proper debate in the Parliament. Even those who are strong proponents of the project must accept the decision to pass it off as a money bill undermines the importance of democratic processes and is a travesty on the Constitution and a blatant abrogation of the constitutional duties of the speaker.&lt;/p&gt;
&lt;p&gt;The petition by Jairam Ramesh would hinge largely on the powers of the judiciary to question the decision of the Speaker of the Lok Sabha. Article 110 (3) is very clear in pronouncing the authority of the Speaker as final and binding. Additionally, Article 122 prohibits the courts from questioning the validity of any proceedings in Parliament on the ground of any alleged irregularity of procedure. The powers of privilege that Parliamentarians enjoy are integral to the principle of separation of powers. However, the courts may be able to make a fine distinction between inquiring into procedural irregularity which is prohibited by the Constitution; and questioning an incorrect application of substantive principles, which I would argue, is the case with the Speaker decision.&lt;/p&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://thewire.in/2016/03/07/arun-jaitley-introduces-money-bill-on-aadhar-in-lok-sabha-24115/"&gt;http://thewire.in/2016/03/07/arun-jaitley-introduces-money-bill-on-aadhar-in-lok-sabha-24115/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://indianexpress.com/article/opinion/columns/show-me-the-money-4/"&gt;http://indianexpress.com/article/opinion/columns/show-me-the-money-4/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://www.thehindu.com/opinion/lead/circumventing-the-rajya-sabha/article7531467.ece"&gt;http://www.thehindu.com/opinion/lead/circumventing-the-rajya-sabha/article7531467.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill'&gt;https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2016-04-25T10:51:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill">
    <title>Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?</title>
    <link>https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill</link>
    <description>
        &lt;b&gt;In this infographic, we highlight the matters dealt with in the Aadhaar Act 2016, recently tabled in and passed by the Lok Sabha as a money bill, and consider if these can be objects of a money bill. The infographic is designed by Pooja Saxena, based on information compiled by Sumandro Chattapadhyay and Amber Sinha. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the infographic: &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_ObjectsOfMoneyBill.pdf"&gt;PDF&lt;/a&gt; and &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_ObjectsOfMoneyBill.jpg"&gt;JPG&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;License:&lt;/strong&gt; It is shared under Creative Commons &lt;a href="https://creativecommons.org/licenses/by/4.0/"&gt;Attribution 4.0 International&lt;/a&gt; License.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_ObjectsOfMoneyBill.jpg" alt="Can the matters dealt with in the Aadhaar Act be the objects of a money bill?" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill'&gt;https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pooja Saxena</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2016-04-24T14:15:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill">
    <title>Can the Aadhaar Act 2016 be Classified as a Money Bill?</title>
    <link>https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill</link>
    <description>
        &lt;b&gt;In this infographic, we show if the Aadhaar Act 2016, recently tabled in and passed by the Lok Sabha as a money bill, can be classified as a money bill. The infographic is designed by Pooja Saxena, based on information compiled by Amber Sinha and Sumandro Chattapadhyay. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the infographic: &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_DoesAadharSatisfy.pdf"&gt;PDF&lt;/a&gt; and &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_DoesAadharSatisfy.jpg"&gt;JPG&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;License:&lt;/strong&gt; It is shared under Creative Commons &lt;a href="https://creativecommons.org/licenses/by/4.0/"&gt;Attribution 4.0 International&lt;/a&gt; License.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_DoesAadharSatisfy.jpg" alt="Does Aadhaar Act satisfy the conditions for a money bill?" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill'&gt;https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pooja Saxena</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2016-04-25T13:48:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dna-amrita-madhukalya-april-23-2016-government-keeps-experts-out-of-cyber-security-discussions">
    <title>Government keeps experts out of cyber security discussions</title>
    <link>https://cis-india.org/internet-governance/news/dna-amrita-madhukalya-april-23-2016-government-keeps-experts-out-of-cyber-security-discussions</link>
    <description>
        &lt;b&gt;Anja Kovacs of the Internet Democracy project feels that India has given away too much, and that India's multi-stakeholder approach in the context of the role of the International Telecommunication Union (ITU) is not too clear. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amrita Madhukalya was &lt;a class="external-link" href="http://www.dnaindia.com/india/report-government-keeps-experts-out-of-cyber-security-discussions-2205157"&gt;published in DNA&lt;/a&gt; on April 23, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;During India's closed-door discussions on cyber security and Internet policies at the recently-concluded Russia-India-China (RIC) convention, Internet experts fear that the government may be trying to leave out discussions with social stakeholders like social activists, businessmen or the academia. It must be borne in mind that telecom minister Ravi Shankar Prasad in an ICAN meet last year stressed on the role of the government in cyber-security policy measures, despite the need to have an Internet largely unregulated by the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anja Kovacs of the Internet Democracy project feels that India has given away too much, and that India's multi-stakeholder approach in the context of the role of the International Telecommunication Union (ITU) is not too clear. "Russia and China have traditionally, since the 90s, wanted a bigger role for the ITU, despite a pushback from the West. The ITU has had a positive role in the recent past. Yet, when they mention multilateralism, the scope for developing nations is not too wide. The US may have the scope to include several stakeholders from the business community, civil society and academia, but how much scope does a developing country have," says Anja, adding that the mention of internationalising, too, is problematic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The grouping of the three countries could also be to signal an alliance to counter the US's efforts to ensure the exemption of the UK from the mutual legal assistance treaty (MLAT) system which is headquartered in the United States, says Chinmayi Arun, policy director at the Centre for Communication Governance at NLU Delhi. Under the MLAT process, any request about data that originates in case of a criminal breach from a country is usually routed via US's department of justice, which takes time while following due processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The concerns expressed, understandably, on the growing concerns of cyber terrorism and the efforts to deal with it are needed, but there is no need to exclude other stakeholders in the process," said Chinmayi. "Russia and China have also been pushing for a growing role of the state in policing the government, and are keen to use the UN to facilitate that."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa of Medianama, who steer-headed the net neutrality movement by engaging several stakeholders, says that the government's stance is unclear, as it speaks of both multilateralism and multiple stakeholders, as both are contradictory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash of the Centre for Internet and Society says that he is sceptical of the sentiments expressed on internationalisation of internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"For instance, there's been a two-year process via which the US's oversight over ICANN and the IANA functions are nominally being removed. But Russia, India, and China have not really pushed for internationalisation, and ICANN and the Internet's root zone system is going to remain subject to US jurisdiction, including US sanctions. If the ministers truly meant what they say, they should intervene in that process and say that we need to internationalise ICANN in practice and spirit, not just in name," he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dna-amrita-madhukalya-april-23-2016-government-keeps-experts-out-of-cyber-security-discussions'&gt;https://cis-india.org/internet-governance/news/dna-amrita-madhukalya-april-23-2016-government-keeps-experts-out-of-cyber-security-discussions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-24T05:03:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-raj-shekhar-arun-dev-v-narayan-a-selvaraj-cctv-plays-sherlock">
    <title>CCTV plays Sherlock</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-raj-shekhar-arun-dev-v-narayan-a-selvaraj-cctv-plays-sherlock</link>
    <description>
        &lt;b&gt;Whether it's the Mercedes hit-and-run in Delhi or the antics of the chaddi baniyan gang in Mumbai, police are increasingly relying on CCTV footage to solve crimes. Sunday Times looks at how the small picture is getting bigger.
.&lt;/b&gt;
        &lt;p&gt;The article by Raj Shekhar, Arun Dev, V Narayan &amp;amp; A Selvaraj with inputs from Sindhu Kannan and Somreet Bhattacharya was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/home/sunday-times/deep-focus/CCTV-plays-Sherlock/articleshow/51960067.cms"&gt;published by the Times of India&lt;/a&gt; on April 24, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In case after high-profile case, cameras have been the big stars of Delhi police investigations in recent months. After the Civil Lines hit-and-run case, where a 17-year-old driving a Mercedes was caught on camera speeding away from his victim, reliable witness to the crime came from a nearby CCTV. A few weeks ago, in the Vikaspuri lynching on Holi eve that threatened to take on communal colours, it was CCTV footage that clinched the case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Across India, police officials reel off cases where CCTVs have made all the difference in identifying offenders and speeding up investigations. "Petty crimes like snatchings have been brought down by 50% in areas like Chandni Chowk since 2014," estimates Madhur Verma, DCP (north), Delhi Police. "Even if the face cannot be fully recognised, the timing shown on the CCTV grabs, and proof of the accused being present at the spot, can be useful corroborating evidence for the court," says DCP Dhananjay Kulkarni, explaining how CCTV helped nail the infamous "chaddi baniyan gang" in Borivli, Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CCTV cameras have proliferated across our public spaces in the last few years, mutely observing our movements. It's not just the police; shops, companies and individuals install them too, and these come in handy for law enforcement. For instance, Delhi has about 1,79,000 CCTV cameras installed around the city, out of which 4,000 have been placed by the Delhi government, and the rest by private agencies who collaborate with the Delhi Police under its 'Eyes and Ears' scheme. "Cameras are a fact of life around the world, there's no going back for the police or for anyone else," says N Ramachandran, a former IPS officer, now president of the Indian Police Academy think-tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether London, Boston or Bengaluru, it is often a terrorist attack that shocks a city into ramping up its CCTV network. After the Church Street attacks, the police got cracking on surveillance, using crime-mapping techniques and shortlisting vantage points. While they currently use 300 cameras, the police believe the figure must be taken up to 2,500 to keep a better eye on the city.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But does CCTV control crime? To that question, there is only one unsatisfying answer — it depends. The debate is torn between those who see CCTVs as the embodiment of an eerie Orwellian warning, and those who believe that the more cameras there are, the less crime there will be. Studies, though, suggest that CCTV has specific and narrow uses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Obviously, it helps catch people who have committed an offence, after the event. CCTV networks, though, have no noticeable impact on crime rates according to several reviews in the US and UK. The UK is the most monitored nation in the world, but as a Home Office study in 2005 concluded, there was no statistically significant reduction in crime, once other variables like seasonal and national trends, and other police initiatives, were factored in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While CCTVs are not easy to isolate as a determining factor in crime control, they are demonstrably effective in some contexts. They can reduce some kinds of disorder and petty crime, particularly in car parks and public transit. Micro-level analyses of aspects like environmental features, camera line-of-sight, enforcement activity, and camera design suggest that the power to deter crime depends greatly on how the CCTV sites are chosen, and police operations designed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The downsides are well known. The more mundane footage there is, the harder it is for police to sift through. There is often a displacement effect — the presence of a camera pushes the crime off-stage into other areas, or prompting criminals to change tactics in pursuit of the same ends (ie, rather than carry out a drug transaction on the street, arrange online and deliver). What's more, CCTVs can be gamed. In Mumbai, the police has found out that criminals apply toothpaste or flash a torchlight at the lens, or cover up with helmets and burqas, or even steal the digital video recorder in the CCTV. These cameras have to be constantly maintained. "Many believe that CCTV installation is a one-time investment, but it needs to be serviced to yield results," says S. David, who runs an electronics shop and sells CCTV cameras in Chennai's Ritchie Street.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If there is no overwhelming impact on crime prevention, why are India's security forces investing so heavily in CCTVs, and is it worth the inevitable tradeoff with privacy? More worryingly, it is doing so without any comprehensive regulation on their use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before this technology of databases and recording, "we seldom had situations where a police official or private detective was trailing you all day, recording your movements, which is more or less the situation with CCTVs now," says Pranesh Prakash of the Centre for Internet and Society. "Yes, you're in a public space, but that doesn't denude you of privacy".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as Farhad Manjoo, a prominent tech blogger in the US, pointed out, the benefits outweigh our fears about privacy. "When you weigh cameras against other security measures, they emerge as the least costly and most effective choice. In the aftermath of 9/11, it's impossible for you to get into tall buildings, airports, many museums, concerts, and even public celebrations without being subjected to pat-downs and metal detectors. When combined with competent law enforcement, surveillance cameras are more effective, less intrusive, less psychologically draining, and much more pleasant than these alternatives," wrote Manjoo in Slate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What we need is public oversight over the surveillance apparatus — in other words, we need to watch how they watch us. If there is clear respect for the principles of proportionality, accountability and transparency, "there need not be a conflict between ethical and effective use of these cameras," says Ramachandran.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-raj-shekhar-arun-dev-v-narayan-a-selvaraj-cctv-plays-sherlock'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-raj-shekhar-arun-dev-v-narayan-a-selvaraj-cctv-plays-sherlock&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-24T04:51:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/governance-now-april-23-2016-taru-bhatia-will-facebook-twitter-relocate-servers-to-india">
    <title>Will Facebook, Twitter relocate servers to India?</title>
    <link>https://cis-india.org/internet-governance/news/governance-now-april-23-2016-taru-bhatia-will-facebook-twitter-relocate-servers-to-india</link>
    <description>
        &lt;b&gt;The debate to relocate offshore servers of internet and social media firms including Google, Facebook and Twitter has revived.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Taru Bhatia was published in &lt;a class="external-link" href="http://www.governancenow.com/gov-next/egov/will-facebook-twitter-relocate-servers-india"&gt;Governance Now&lt;/a&gt; on April 23, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Home minister Rajnath Singh has requested the social media companies, located outside India, to maintain servers in the country, in order to expedite the process of getting information on accounts which spread mischievous messages posing a threat to law and order situation. The move has come in the backdrop of delayed or no response to the government’s requests to these companies, for extracting information of some of its users on security grounds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February, the minister claimed Jamaat-ud-Dawa chief Hafiz Saeed’s involvement in the anti-national slogans that were allegedly raised in the campus of Jawaharlal Nehru University (JNU). The claim was based on a tweet that appeared on a fake twitter account of Saeed (@HafeezSaeedJUD), which was later deactivated by Twitter. But the US-based social media company has still not replied to the Indian government as to who was running the account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is interesting to note here that India shares mutual legal assistance treaty with the US, wherein, the duo can share information for the purpose of criminal investigation, via judicial route. The process, however, is lengthy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Given the nature of the content, sometimes the government cannot afford to wait. The process of issuing direction to get information or blocking certain content from public view is lengthy. The Indian government under the IT law is empowered to ask these companies to maintain servers in India,” says senior advocate, supreme court, and cyber law expert, Pavan Duggal, terming it as a legitimate concern related to national security. As India is a big market for all these companies, it shouldn’t be a problem for them to have servers in India, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If the police or security agencies want information from these companies, it becomes tall orders since they are not operating from India. They step back and say they are not accountable,” says Virag Gupta, a senior supreme court lawyer, adding that ministries of telecom and finance must join the home ministry in its request and spearhead the matter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gupta has filed a petition in the Delhi high court asking such offshore companies to register themselves under the Indian law. On the other hand, Pranesh Prakash, policy director at center for internet and society (CIS), a non-government research organisation supported by Google, feels that instead of requesting these companies to maintain servers in India, it is best for the government to figure out ways to speed up judicial process of the treaty, when it comes to internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From July to December 2015, India issued 141 requests to Twitter to retrieve information of its users’ accounts for criminal investigation purpose, as per the company’s transparency report. But the compliance rate was only 42 percent, the report says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While India seeks information on national security grounds, the law here does not clearly define national security, which is still vast and ambiguous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I do believe that there is a need for a much clear definition of national security. If the government really wants to have servers of these companies in India then appropriate guidelines must exist, so that companies should not be taken by surprise,” says Duggal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Data localisation is witnessing a growing trend among many countries. Last year, Russia enforced law to mandate internet companies to store its citizens’ data within the country. The move is generally taken in fear of losing country’s data to hackers. It also means that it would be easier for the government to get information from these internet companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And so protecting data and privacy of individuals within the country is also a matter of concern. Not having a strong data privacy law in place could lead to violation of internet rights of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Privacy is a legitimate concern but at the end of the day the government is well empowered in the interest of protecting cyber security under the IT Act. But it is necessary for the government to look at the issue from a holistic perspective. There is a need for balancing privacy and security of an individual on one hand and national security on the other hand,” adds Duggal.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/governance-now-april-23-2016-taru-bhatia-will-facebook-twitter-relocate-servers-to-india'&gt;https://cis-india.org/internet-governance/news/governance-now-april-23-2016-taru-bhatia-will-facebook-twitter-relocate-servers-to-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-23T15:26:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir">
    <title>You will need a license to create a WhatsApp group in Kashmir</title>
    <link>https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir</link>
    <description>
        &lt;b&gt;The internet rights activists have criticised the move stating it as unconstitutional.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/you-may-need-a-license-in-kashmir-run-a-whatsapp-group"&gt;published by Governance Now&lt;/a&gt; on April 19, 2016. Pranesh Prakash tweeted on this.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Moving beyond internet ban, Kashmir’s Kupwara district issued a notice asking all admins of WhatsApp news groups to register their groups with the district authority within ten days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With this move, the authorities are taking power in their hands to monitor WhatsApp news groups owned by private individuals. However, internet rights activists criticised it saying the move is unconstitutional as it breaches freedom of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The circular is issued under the subject of ‘registering of WhatsApp news group and restrictions for spreading rumours thereof’.  The district magistrate said that any spread of information by these WhatsApp news groups, “leading to untoward incidents will be dealt under the law”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You may need a license in Kashmir to run a WhatsApp group&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/WhatsApp.jpg" alt="WhatsApp" class="image-inline" title="WhatsApp" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The valley witnessed five-day internet shutdown following the Handwara firing incident.  Internet ban is a common phenomenon in Kashmir. &lt;br /&gt;&lt;br /&gt; “For how long will the government decide whether we can communicate with each other or not? Actually, the authorities do not want us to spread the truth about the army’s atrocities far and wide,” said a resident of Handwara as quoted in Kashmir Reader.&lt;br /&gt;&lt;br /&gt; Earlier, parts of Haryan and Gujarat also witnessed internet ban during Jat and Patidar agitation, respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.governancenow.com/gov-next/egov/hard-broad-ban-internet-haryana-jat-agitation" target="_blank"&gt;&lt;span&gt;Blocking all internet access &lt;/span&gt;&lt;/a&gt;is clearly an unnecessary and disproportionate measure that cannot be countenanced as a ‘reasonable restriction’ on freedom of expression and the right to seek and receive information, which is an integral part of the freedom of expression,” said Pranesh Prakash.&lt;br /&gt;&lt;br /&gt; For instance, he adds, a riot-affected woman seeking to find out the address of the nearest hospital cannot do so on her phone. “Instead of blocking access to the internet, the government should seek to quell rumours by using social networks to spread the truth, and by using social networks to warn potential rioters of the consequences,” he said. &lt;br /&gt;&lt;br /&gt; Former Mumbai police commissioner Rakesh Maria used WhatsApp to counter rumours spread after circulation of a fake photo in January 2015. &lt;br /&gt;&lt;br /&gt; “The way in which the ban is imposed is unreasonable. Problem is in the method that is being used in absence of guidelines, defining circumstances under which they can impose a restriction on internet sites,” says Arun Kumar, head of cyber initiatives at Observer Research Foundation (ORF). &lt;br /&gt;&lt;br /&gt; If government formulates these rules or guidelines it will set a threshold for state or central authorities, which will define the urgency of imposing ban on internet services.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir'&gt;https://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    

   <dc:date>2016-04-21T02:34:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-on-smart-cities-mission-in-india">
    <title>RTI regarding Smart Cities Mission in India</title>
    <link>https://cis-india.org/internet-governance/blog/rti-on-smart-cities-mission-in-india</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society (CIS) had filed an RTI on 3 February 2016 before the Ministry of Urban Development (MoUD) regarding the Smart Cities Mission in India. The RTI sought information regarding the role of various foreign governments, private industry, multilateral bodies that will provide technical and financial assistance for this project and information on Government agreements regarding PPP’s for financing the project.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A response to the RTI &lt;a href="https://cis-india.org/internet-governance/blog/rti-smart-cities-mission-in-india.pdf" class="internal-link"&gt;is here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt; The various government, private industry and civil society actors involved in the Smart Cities Mission.&lt;/li&gt;
&lt;li&gt;The various agreements the Government has undertaken through PPP’s for financing the mission.&lt;/li&gt;
&lt;li&gt;Role of private companies in this project.&lt;/li&gt;
&lt;li&gt;The process for selecting the cities for this mission and ministry responsible for this task.&lt;/li&gt;
&lt;li&gt;The various international organisations, foreign governments and multilateral bodies that will provide technical and financial assistance for this project.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The MoUD sent its reply to the RTI application and the response is as follows:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;With reference to the first query, the answer provided was that the mission statement and guidelines are available on the Missions website - smartcities.gov.in. This mission statement essentially envisages the role of citizens/citizen groups such as Resident Welfare Associations, Taxpayers Associations, Senior Citizens and Slum Dwellers Associations etc, apart from the government of India, States, Union Territories and Urban local bodies.&lt;/li&gt;
&lt;li&gt;Regarding information about agreements for the purpose of financing the project, it has been provided in the response that the Ministry would facilitate the execution of MoU’s between Foreign Agencies and States/UT’s for assistance under this mission. The two agreements that have been executed include the MoU between the United States Trade and Development Agency (USTDA) and the French Agency for Development (AFD) for the States/UT’s of Andhra Pradesh, Uttar Pradesh, Rajasthan, Maharashtra, Chandigarh and Puducherry. They have also provided us with copies of the same and they have been summarised below. They also go on to state that various countries like Spain, Canada, Germany, China, Singapore, UK and South Korea have also shown interest in collaborating with the Ministry for the development of Smart Cities.&lt;/li&gt;
&lt;li&gt;CIS sought the documents relating to role of private actors in this field. This information could not be provided by the Department since it was not available with them. Further, an application has been sent to the SC-III Division for providing the information directly to us.&lt;/li&gt;
&lt;li&gt;As regards the fourth query, the information provided states that the role of the government, States/UT’s and Urban Local Bodies has been envisaged in para 13 of the Smart Cities Mission Statement - smartcities.gov.in&lt;/li&gt;
&lt;li&gt;With respect to the query regarding the foreign actors involved, the information provided states that the documents relating to the involvement of the same are scattered in different files. Compilation of such information would divert the limited resources of the Public Authority disproportionately. Another application must be filed if any specific information is required.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Copies of several MoUs signed between Foreign Development Agencies and States (for the respective cities) that were shared with us are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Memorandum of Understanding between the United States Trade and Development Agency(USTDA) and the Government of Andhra Pradesh of the Republic of India on Cooperation to support the development of Smart Cities in Andhra Pradesh-namely Visakhapatnam.&lt;/li&gt;
&lt;li&gt;Memorandum of Understanding between the United States Trade and Development Agency (USTDA) and the Government of Rajasthan of the Republic of India on Cooperation to support the development of Smart Cities in Rajasthan- namely Ajmer.&lt;/li&gt;
&lt;li&gt;Memorandum of Understanding between the United States Trade and Development Agency (USTDA) and the Government of Uttar Pradesh of the Republic of India on Cooperation to support the development of Smart Cities in Uttar Pradesh- namely Allahabad.&lt;/li&gt;
&lt;li&gt;Memorandum of Understanding between the Agence Francaise De Developpement and the Government of the Union Territory of Chandigarh of the Republic of India on Technical Cooperation in the field of Sustainable Urban Development. &lt;/li&gt;
&lt;li&gt;Memorandum of Understanding between the Agence Francaise De Developpement and the Government of Maharashtra on Technical Cooperation in the field of Sustainable Urban Development.&lt;/li&gt;
&lt;li&gt;Memorandum of Understanding between the Agence Francaise De Developpement and the Government of the Union Territory of Puducherry of the Republic of India on Technical Cooperation in the field of Sustainable Urban Development.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Key clauses under the MoU between the United States Trade and Development Agency (USTDA) and the governments of Andhra Pradesh, Rajasthan and Uttar Pradesh are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The MoU undertaken by the USTDA for the development of Visakhapatnam, Allahabad and Ajmer clearly establishes that the document only cements the intention of the body to assist in the development of these cities and funding must be addressed separately.&lt;/li&gt;
&lt;li&gt;The USTDA intends to contribute specific funding for feasibility studies, study tours, workshops/training, and any other projects mutually determined, in furtherance of this interest. The USTDA will also fund advisory services for the same. &lt;/li&gt;
&lt;li&gt;The USTDA will seek to bring in other US government agencies such as the Department of Commerce, the US Export Import Bank and other trade and economic agencies to encourage US-India infrastructure development cooperation and support the development of smart cities in Vishakhapatnam, Allahabad and Ajmer.&lt;/li&gt;
&lt;li&gt;One of the key points the USTDA stresses on is the creation of a Smart Solutions for Smart Cities Reverse Trade Mission, where Indian delegates will get a chance to showcase their methodologies and inventions in the United States. &lt;/li&gt;
&lt;li&gt;The MoU also talks about involving industry organisations in the development of Smart Cities, to address important aviation and energy related infrastructure connected to developing smart cities.&lt;/li&gt;
&lt;li&gt;The respective State Governments of the cities will provide resources for the development of these smart cities, including technical information and data related to smart cities planning; staff, logistical and travel support, and state budgetary resources will be allocated accordingly.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Key clauses under the MoU between the Agency Francaise De Developpement (AFD) and the governments of Maharashtra, Chandigarh and Puducherry are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The MoU with AFD is along the same lines but with more detail provided in the field of research in sustainable urban development. It comprises of four articles dealing with implementation, research, resource allocation and cooperation. &lt;/li&gt;
&lt;li&gt;The AFD clearly states that it will adopt an active role in managing and implementing the project.&lt;/li&gt;
&lt;li&gt;The AFD will equip the respective state governments with a technical cooperation programme which will include a pool of French experts from the public sector, complemented by experts from the private sector. &lt;/li&gt;
&lt;li&gt;The MoU goes on to state the various vectors of sustainable urban development that will be the focal point of this project – urban transport, water and waste management, integrated development and urban planning, architecture and heritage, renewable energy, energy efficiency etc. &lt;/li&gt;
&lt;li&gt;Apart from strategizing, the AFD looks to provide technical support as well. This technical expertise would be used to strengthen strategy and management of urban services in the city. &lt;/li&gt;
&lt;li&gt;They would also play a key role in management through the creation of a Special Purpose Vehicle(SPV) to build strategic management (Human Resources, finance, potential market assessment) and capacity building for financial management.&lt;/li&gt;
&lt;li&gt;As per Article II of the MoU, this support framework will be accompanied by annual reviews, a policy similar to the USTDA Smart Solutions for Smart Cities Reverse Mission with Indian and French counterparts, collaboration between academic and research institutions for the exchange of information, documentation and results of research in the field of smart cities (a key policy to establish firm research groundwork and increase cooperation and innovation), capacity building research and development. &lt;/li&gt;
&lt;li&gt;Article III of the MoU deals with resource allocation wherein the respective State Governments will assist AFD by providing technical information and data related to smart cities planning, and also meet their logistical requirements.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-on-smart-cities-mission-in-india'&gt;https://cis-india.org/internet-governance/blog/rti-on-smart-cities-mission-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Paul Thottan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>RTI Application</dc:subject>
    
    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-21T02:25:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/aadhaar-by-numbers">
    <title>Aadhaar by Numbers</title>
    <link>https://cis-india.org/internet-governance/news/aadhaar-by-numbers</link>
    <description>
        &lt;b&gt;Sunil Abraham will be addressing a public seminar at an event organized by National Institute of Public Finance and Policy (NIPFP) in New Delhi on Friday, April 29, 2016. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This talk will reflect on several aspects of the Aadhaar project from a technical perspective. First, there will be a reflection on biometrics as a unique, identification and authentication technology. Second, there will be a critique of open washing by the UIDAI through their adoption of free software and open standards and finally there will be an analysis of alternative technical solutions and architecture which will allow India to harvest the benefits of identity management without the harms and risks of centralized biometrics.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sunil Abraham&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham (an Ashoka Fellow) is the executive director of the Centre for Internet and Society (CIS), Bangalore/New Delhi. CIS is a 7 year old policy and academic research organisation that focuses on accessibility, access to knowledge, internet governance and  telecommunications. He is also the founder and director of Mahiti, a 17 year old social enterprise that aims to reduce the cost and complexity of ICTs for the voluntary sector by using free software. Starting 2004, for 3 years, Sunil also managed the International Open Source Network, a project of UNDP's APDIP, serving 42 countries in the Asia-Pacific region.  Sunil currently serves on the advisory boards of OSF – Information Programme, Mahiti and Samvada.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The talk reflected on several aspects of the Aadhaar project from a technical perspective.  First, there is a reflection on biometrics as a unique, identification  and authentication technology. Second, there is a critique of open  washing by the UIDAI through their adoption of free software and open  standards and finally there is an analysis of alternative technical  solutions and architecture which will allow India to harvest the benefits of identity management without the harms and risks of centralized biometrics.&lt;/p&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/Y9uOBAqjIMg" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/aadhaar-by-numbers'&gt;https://cis-india.org/internet-governance/news/aadhaar-by-numbers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-11T16:36:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-april-10-2016-2014-showed-the-power-of-twitter">
    <title>2014 showed the power of Twitter, now every Indian politician wants a handle </title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-april-10-2016-2014-showed-the-power-of-twitter</link>
    <description>
        &lt;b&gt;Twitter is fast turning into an effective political tool. As political parties fight another round of electoral battles, a new survey on the 2014 general elections states that those who tweeted well, fared well.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by T.V. Jayan, Smitha Verma,Sonia Sarkar and V. Kumara Swamy quoted Sumandro Chattapadhyay. &lt;a class="external-link" href="http://www.abplive.in/india-news/2014-showed-the-power-of-twitter-now-every-indian-politician-wants-a-handle-319116"&gt;Click to read the original published by Telegraph on April 10&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Clean image? Tick. Right caste? Tick. Money to fund an election? Tick. Good rapport with the top brass? Tick. But no followers on Twitter or other social media sites? Sorry, then you are not going to get a ticket for the Uttar Pradesh Assembly polls next year, says Bharatiya Janata Party president Amit Shah.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was a time when Twitter was what little old ladies – purportedly – did. Now it’s a veritable tool for politicians. As states go for Assembly elections this summer, politicians and their parties are tweeting like never before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And perhaps rightly so, for a recently published study of the 2014 general elections indicates that the more you tweet, the brighter are your chances of winning. The BJP’s victory in 2014 – which came riding a social media wave – seems to have spurred other parties on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter, for those who came in late, is the micro-blogging social site that allows you to post, repost and comment on anything under the sun. These days, Twitter in India is abuzz with electoral comments and speculation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hashtags related to state elections have been dominating the site. The four major players in Bengal – the Trinamul Congress (TMC), the Communist Party of India (Marxist), the Congress and the BJP – have been giving updates about rallies, poll plans and issues. In Assam, the 81-year-old Congress chief minister, Tarun Gogoi, has started tweeting, too. His posts are mostly about his achievements and critical reviews of the BJP’s poll promises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CPI(M), which launched its Twitter handle only in February 2014, now has more than 20,000 followers, marginally more than the TMC’s approximately 19,500 followers. Party general secretary Sitaram Yechury is a relentless tweeter – posting comments on issues that range from fuel price hikes to drought and foreign policy. Other senior party leaders such as West Bengal state secretary Surya Kanta Mishra and Mohammad Salim in Bengal and Pinarayi Vijayan in Kerala have been giving regular updates of the party’s campaign on Twitter and Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Twitter gives political organisations the ability to broadcast information on a worldwide stream (not just their subscribers), join any ongoing debates and discussions and have a two-way interaction with the public during political processes and campaigns,” notes the study – The 2014 Indian elections on Twitter: A comparison of campaign strategies of political parties. The study, conducted by researchers from the department of communications, University of California, Davis, and Nanyang Technological University, Singapore, was recently published online in the journal Telematics and Informatics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is the third largest user of Twitter in the world, with an estimated 23.2 million active users, up from 11.5 million in 2013. Market researcher group Emarketer estimates that Twitter will have around 40 million users in India by 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That is a sizable number. No surprise then that political parties are reaching out to voters with the help of social media arms such as Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Twitter is an important platform for the Congress to reach out to a certain section but the content has to be important,” agrees Congress leader Sachin Pilot, who joined Twitter in March 2014, but started tweeting actively four months ago. “We joined the medium late but we are using it positively and not to spread exaggerated promises or look at short-term gains,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the Congress has been greatly outpaced by BJP in the race for tweets. According to the University of California study, the BJP posted 80,981 tweets during the 2014 elections, far ahead of any of the other political parties. The Aam Aadmi Party (AAP) came next with 7,980 tweets, followed by the TMC with 3,990 and the Congress with 2,890. The CPI(M) had 402 tweets.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The 2014 general elections was the first time social media was being used for electoral campaigning in India and hence the disparity in usage between parties,” says Saifuddin Ahmed, the corresponding author of the study. “The next general elections would be a different game as most of the parties would be well-prepared going by the success of BJP’s 2014 social media campaign.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The study found that the BJP’s Twitter feed dealt with campaign updates (28 per cent) and criticism of other political parties or moves (24 per cent). It also posted the second-highest in proportion and the highest in absolute numbers of self-promotion tweets (19 per cent as against AAP’s 35 per cent).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We strongly believe that a message is effectively sent across when one has a credible message, a credible messenger and also a credible tool of communication. And Twitter is a credible tool,” asserts Dilip Pandey, AAP’s head of communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The study says the BJP often tweeted the words “thank you” while the Congress’s pet phrases included “Gandhi Gandhi” (in a single tweet). AAP used old emotional slogans such as ” Satyamev Jayate” and “Azaadi ladai”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It concludes that the winning party’s electoral success [in 2014] is significantly associated with its use of Twitter for engaging voters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The BJP’s primary purpose was to use Twitter as a broadcasting medium, and they tweeted their party messages as shareable content, such as images, which users could share in their personal networks,” Ahmed points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not surprisingly, others are embracing Twitter. In Maharashtra, the BJP state unit campaigned extensively on social media for Assembly elections – and ended up forming the government in the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A tweet helps in changing mindset and perception. The urban population which never voted for BJP was targeted through Twitter to present the vision of our party,” says Jiten Gajaria, BJP social media head during Maharashtra elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elsewhere, too, political leaders have been jumping on to the Twitter bandwagon. Nitish Kumar joined Twitter in May 2010, but remained almost inactive for most of his second term before springing back to life in 2015 before the elections. More than 95 per cent of his tweets were posted in the election year. There was even a question-answer-session with people on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Nitish ji in a way engaged with the media through his Twitter handle,” Janata Dal (United) spokesperson K.C. Tyagi says. “He would tweet something about the BJP or Modi and that became the talking point. The NDA was asked by the media to respond to the tweet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi joined Twitter in January 2009, and Kejriwal in 2011 before launching AAP. Among politicians, the two most active tweeters are Shashi Tharoor of the Congress and Derek O’Brien of the TMC. Rahul Gandhi’s first tweet was on May 7, 2015, about beginning a padayatra in Telangana’s Adilabad district.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though a late entrant, the CPI(M), too, sees advantages of using the medium. “We don’t want to leave any stone unturned during the elections and being on Twitter is a part of the strategy,” says Rajya Sabha member Ritabrata Banerjee. “Although we don’t believe in hiring professionals, as the BJP does to prop itself up on Twitter, we believe people will follow us and listen to what we are saying.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img width="555" height="201" src="http://www.telegraphindia.com/1160410/images/10now.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Sumandro Chattopadhyay, research director, Centre for Internet and Society, Bangalore, is sceptical about linking electoral victories to Twitter usage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There are many variables such as Internet penetration, media device availability and media exposure. Rich states always perform better in these parameters,” Chattopadhyay says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Politicians also stress that Twitter is just one of the tools of a campaign. “The social media is one part of a 360-degree electoral strategy. Twitter probably is only 10 degrees of the overall electoral strategy,” O’Brien states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And not all politicians look at Twitter as the virtual equivalent of traditional campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What we see on Twitter is exaggerated hysteria,” says a BJP leader who is also active on Twitter. “Twitter is a double-edged sword. It is an effective tool for putting your message to an expanding and bigger audience. But at the same time, we don’t know if what we are being told is true because we cannot verify the source.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A member of the CPI(M)’s communications team stresses that traditional modes of campaigning still outrank social media campaigns. “We believe that as far as our connection with the people is concerned, there is no alternative to the traditional way of reaching out to the masses,” he says. “Twitter can only publicise what we do on the ground.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the final analysis, does popularity on Twitter translate into votes? Shah seems to believe so – he is not giving away tickets to BJP members if they don’t have enough followers on Twitter or Facebook. But the Twitter-savvy BJP leader, who seeks anonymity, doesn’t agree.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It could be one of the factors to influence voters. Maybe a fraction of voters form their opinion based on what they see on Twitter. But it is certainly not the most decisive factor,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, as politicians battle it out, Twitter is making the most of the poll fervour. The site has said it will launch an exclusive emoji for the Tamil Nadu Assembly elections, which will come up on counting day in May. Did we just hear Twitter crow?&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;– T.V. Jayan, Smitha Verma,Sonia Sarkar and V. Kumara Swamy report.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-april-10-2016-2014-showed-the-power-of-twitter'&gt;https://cis-india.org/internet-governance/news/the-telegraph-april-10-2016-2014-showed-the-power-of-twitter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-20T02:33:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
