<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1906 to 1920.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-october-4-2018-surupasree-sarmmah-gmail-users-beware-while-giving-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/arabian-business-september-1-2013-beatrice-thomas-gmail-ban-looms-for-indian-govt-workers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-technology-summit-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-partners-meeting-london"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/global-freedom-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/global-censorship-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression">
    <title>GNI Assessment Finds ICT Companies Protect User Privacy and Freedom of Expression</title>
    <link>https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Elonnai Hickok analyses a public report recently published by GNI on the independent assessment process for Google, Microsoft, and Yahoo. The report finds Google, Microsoft, and Yahoo to be in compliance with the GNI principles on privacy and freedom of expression.&lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In January 2014, the &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf"&gt;Global Network Initiative (GNI)&lt;/a&gt; published t&lt;a href="http://globalnetworkinitiative.org/sites/default/files/GNI%20Assessments%20Public%20Report.pdf"&gt;he &lt;i&gt;Public Report on the Independent Assessment Process for Google, Microsoft, and Yahoo&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;GNI is an industry consortium that was started in 2008 with the objective of protecting user’s right to privacy and freedom of expression globally. The main objectives of GNI are to provide a framework for companies that is based on international standards, ensure accountability of ICT companies through independent assessments, create opportunities for policy engagement, and create opportunities for stakeholders from multiple jurisdictions to engage in dialogue with each other. The Centre for Internet and Society, Bangalore, is a member of GNI. Companies based in India have yet to join as members to the GNI network.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overview of the Public Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Public Report provides an overview of assessments completed on the practices and policies of Google, Yahoo, and Microsoft from 2011 - 2013 to measure company compliance with the &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf"&gt;GNI principles&lt;/a&gt; on freedom of expression and privacy. The principles lay out broad guidelines that member companies  should seek to incorporate in their internal and external practices and speak to freedom of expression, privacy, responsible company decision making, multi – stakeholder collaboration, and organizational governance, accountability, and transparency. The GNI principles have also been developed with &lt;a href="https://globalnetworkinitiative.org/sites/default/files/GNI_-_Implementation_Guidelines_1_.pdf"&gt;Implementation Guidelines&lt;/a&gt; to provide companies with a framework for companies to respond to government requests. The assessment carried out by GNI reviewed cases in each company pertaining to governmental: blocking and filtering, takedown requests, criminalization of speech, intermediary liability, selective enforcement, content surveillance, and requests for user information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, the assessment undertaken by GNI finds Yahoo, Microsoft, and Google to be in compliance with the GNI principles on freedom of expression and privacy. The Report highlights practices by the companies that work to protect freedom of expression and privacy such as conducting human rights impact assessments, issuing transparency reports, and notifying affected users when content is removed, have been, adopted by these companies. For example, Google conducts Human Rights Impact Assessments to assess potential threats to freedom of expression and privacy. Google also has in place internal processes to review governmental requests impacting freedom of expression and privacy, and the legal team at Google prepares a “global removal report” to provide a bird’s eye view of trends emerging from content removal requests. If Google has the email address of a user who’s posted content is removed, Google will often notify the user and directs the user to the Chilling Effects website. Google has also published a transparency report since 2010. Like Google, Microsoft conducts Human Rights Impact Assessments before making decisions on whether to incorporate certain features into its platforms when operating in high risk markets. Microsoft has also issued two global law enforcement requests reports in 2013. Yahoo has established a Business and Human Rights Program to ensure responsible actions are taken by the company with regards to freedom of expression and privacy, and now issues transparency reports about government requests. Yahoo’s Public Policy team also engages in dialogue with governments  on an international level about existing and proposed legislation impacting and implicating privacy and freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report highlights challenges to compliance with the GNI principles that companies face – namely legal restraints and mandates that they are faced with. On the issue of transparency, the assessment found that companies do not disclose information when there are legal prohibitions on such disclosure, when users privacy would be implicated, when companies choose to assert attorney client privilege, and when trade secrets are involved. Despite this, the assessment found that companies do deny and push back on governmental requests impacting freedom of expression and privacy for reasons such as the request needed clarification and modification, or that the request needed to follow established procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of findings came out of the assessments undertaken for the Report including:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;As demonstrated by the lack of ability to access information about secret national security requests, and the lack of ability for companies to disclose information on this topic there is a dire need for governments to reform surveillance policy and law impacting freedom of expression and privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The implementation of the GNI Principles is challenging when a company is undergoing an acquisition. In this scenario, contractual provisions limiting third party disclosure are critical in ensuring protection of privacy and free expression rights. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Companies need to pro-actively and on an ongoing basis internally review governmental restrictions on content to determine if it is in compliance with the commitment made by that company to the GNI Principles. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The assessment resulted in GNI defining a number of actionable (non-binding) recommendations for companies such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improving the integration of human rights considerations in the due diligence process with respect to the acquiring and selling companies. &lt;/li&gt;
&lt;li&gt;Consider the impact of hardware on freedom of expression and privacy.&lt;/li&gt;
&lt;li&gt;Improve external and internal reporting.&lt;/li&gt;
&lt;li&gt;Review employee access to user data to ensure that employee access rights are restricted by both policy and technical measures on a ‘need to know’ basis across global operations. &lt;/li&gt;
&lt;li&gt;Review executive management training.&lt;/li&gt;
&lt;li&gt;Improve stakeholder engagement.&lt;/li&gt;
&lt;li&gt;Improve communication with users. &lt;/li&gt;
&lt;li&gt;Increase sharing of best practices. &lt;/li&gt;
&lt;li&gt;The GNI principles are focused on freedom of expression and privacy and are based on internationally recognized laws and standards for human rights. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;NSA leaks, global push for governmental surveillance reform, and the Public Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With special attention given to the various companies responses to the NSA leaks, the Report notes that in response to the NSA leaks the assessed companies have issued public statements and filed legal challenges with the US government  and filed suit with the FISA Court seeking the right to disclose data relating to the number of FISA requests received with the public. All three companies have also supported legislation and policy that would allow for such transparency. Furthermore in December 2014, the companies , along with other internet companies, developed and issued the five &lt;a href="http://reformgovernmentsurveillance.com/"&gt;Principles on Global Government Surveillance Reform&lt;/a&gt;.  Similar to other efforts to end mass and disproportionate surveillance, such as the &lt;a href="https://en.necessaryandproportionate.org/text"&gt;Necessary and Proportionate&lt;/a&gt; principles, the Principles on Global Government Surveillance Reform address: Limiting Governments’ Authority to Collect Users’ Information, Oversight and Accountability, Transparency about Government Demands, Respecting the Free Flow of Information, Avoiding Conflicts Among Governments. Other companies that signed these principles include AOL, Facebook, LinkedIn, and Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along these lines, on January 14&lt;sup&gt;th&lt;/sup&gt;, GNI released the statement &lt;a href="http://globalnetworkinitiative.org/news/surveillance-reforms-protect-rights-and-restore-trust"&gt;“Surveillance Reforms to Protect Rights and Restore Trust”, &lt;/a&gt; urging the U.S Government to review and enact surveillance legislation that incorporate a ‘rights based’ approach to issues involving national security. In the statement, GNI specifically recommends the Government to action and: end mass collection of communications metadata, protect and uphold the rights of non-Americans, continue to increase transparency of surveillance practices, support the use of strong encryption standards.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion and way forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Looking ahead, GNI is planning on developing and implementing a mechanism to address effectively address consumer engagement and complaints issued by individuals who feel that GNI member companies have not acted consistently with the commitments made as a GNI member. GNI is also looking to expand work around public policy and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Public Report on the Independent Assessment Process for Google, Microsoft, and Yahoo is an important step towards ensuring ICT sector companies are accountable to the public in their practices impacting freedom of expression and privacy. The assessment comes at a time when ICT companies often find themselves stuck between a rock and a hard place – with Governments issuing surveillance and censorship demands with mandates for non-disclosure, and the public demanding transparency, company resistance to such demands from the Government, and a strong commitment to users freedom of expression and privacy. Hopefully, the GNI assessment is and will evolve into a middle ground for ICT companies – where they can be accountable to the public and their customers and compliant with Governmental mandates in all jurisdictions that they operate in. It will be interesting to see if in the future Indian companies join GNI as members and being to adopt the GNI principles and undergo GNI assessments.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression'&gt;https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-01-20T06:17:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws">
    <title>GNI and IAMAI Launch Interactive Slideshow Exploring Impact of India's Internet Laws </title>
    <link>https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws</link>
    <description>
        &lt;b&gt;The Global Network Initiative and the Internet and Mobile Association of India have come together to explain how India’s Internet and technology laws impact economic innovation and freedom of expression. &lt;/b&gt;
        &lt;p&gt;The &lt;a class="external-link" href="http://www.globalnetworkinitiative.org/"&gt;Global Network Initiative (GNI)&lt;/a&gt;, and the &lt;a class="external-link" href="http://www.iamai.in/"&gt;Internet and Mobile Association of India (IAMAI)&lt;/a&gt; have launched an interactive slide show exploring the impact of existing Internet laws on users and businesses in India. The slide show created by Newsbound, and to which Centre for Internet and Society (CIS) has contributed its comments—explain the existing legislative mechanisms prevalent in India, map the challenges of the regulatory environment and highlight areas where such mechanisms can be strengthened.&lt;/p&gt;
&lt;p&gt;Foregrounding the difficulties of content regulation, the slides are aimed at informing users and the public of the constraints of current legal mechanisms in place, including safe harbour and take down and notice provisions. Highlighting Section 79(3) and the Intermediary Liability Rules issued in 2011, the slide show identifies some of the challenges faced by Internet platforms, such as the broad interpretation of the legislation by the executive branch.&lt;/p&gt;
&lt;p&gt;Challenges governing Internet platforms highlighted in the slide show include uniform Terms of Service that do not consider the type of service being provided by the platform, uncertain requirements for taking down content and compliance obligations related to information disclosure. Further the issues of over compliance and misuse of the legal notice and take down system introduced under Section 79 of the Information Technology (Intermediaries Guidelines) Rules 2011.&lt;/p&gt;
&lt;p&gt;The Rules were created with the purpose of providing guidelines for the ‘post-publication redressal mechanism expression as envisioned in the Constitution of India'. However, since their introduction, the Rules have been criticised extensively, by both the national and the international media on account of not conforming to principles of natural justice and freedom of expression. Critics have pointed out that by not recognising the different functions performed by the different intermediaries and by not providing safeguards against misuse of such mechanism for suppressing legitimate expression, the Rules have a chilling effect on freedom of expression.&lt;/p&gt;
&lt;p&gt;Under the current Rules, the third party provider/creator of information is not given a chance to be heard by the intermediary, nor is there a requirement to give a reasoned decision by the intermediary to the creator whose content has been taken down. The take down procedure also, does not have any provisions for restoring the removed information, such as providing a counter notice filing mechanism or appealing to a higher authority.  Further, the content criteria for removal of content includes terms like 'disparaging' and 'objectionable', which are not defined and prima facie seem to be beyond the reasonable restrictions envisioned by the Constitution of India. With uncertainty in content criteria and no safeguards to prevent abuse complainant may send frivolous complaints and suppress legitimate expressions without any fear of repercussions.&lt;/p&gt;
&lt;p&gt;Most importantly, the redressal mechanism under the Rules shifts the burden of censorship, previously, the exclusive domain of the judiciary or the executive, and makes it the responsibility of private intermediaries. Often, private intermediaries, do not have sufficient legal resources to subjectively determine the legitimacy of a legal claim, resulting in over compliance to limit liability. The slide show cites  the &lt;a href="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet"&gt;2011 CIS research carried out by Rishabh Dara&lt;/a&gt; to determine whether the Rules lead to a chilling effect on online free expression, towards highlighting the issue of over compliance and self censorship.&lt;/p&gt;
&lt;p&gt;The initiative is timely, given the change of guard in India, and stresses, not only the economic impact of fixing the Internet legal framework, but also the larger impact on users rights and freedom of expression. The initiative calls for a legal environment for the Internet that enables innovation, protects the rights of users, and provides clear rules and regulations for businesses large and small.&lt;/p&gt;
&lt;p&gt;See the slideshow here: &lt;a href="http://globalnetworkinitiative.org/india"&gt;How India’s Internet Laws Can Help Propel the Country Forward&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Other GNI reports and resources: &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf"&gt;Closing the Gap: Indian Online Intermediaries and a Liability System Not Yet Fit for Purpose&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf"&gt;Strengthening Protections for Online Platforms Could Add Billions to India’s GDP&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws'&gt;https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2014-07-17T12:01:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-october-4-2018-surupasree-sarmmah-gmail-users-beware-while-giving-access">
    <title>Gmail users beware while giving access</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-october-4-2018-surupasree-sarmmah-gmail-users-beware-while-giving-access</link>
    <description>
        &lt;b&gt;Recently, Google admitted to giving hundreds of firms access to users’ Gmail inboxes. It also revealed that many apps are able to scan and share data from email inboxes. However, Google explained that it vets third parties that are given access, and permission should be given by the user.&lt;/b&gt;
        &lt;p&gt;The article by Surupasree Sarmmah was &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/gmail-users-beware-while-696147.html"&gt;published in Deccan Herald&lt;/a&gt; on October 4, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Metrolife asks Gmail users if they were aware of giving permission to third-party apps and talks to an expert to see if access to emails can make a user vulnerable to blackmail, loss of individual liberty and compromise on one’s safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vinod Singha, finance lead, IDP Events, says, “It is shocking that a third party is given access to a user’s Facebook and Gmail data. These third-party apps will put the user’s name on a target group to sell products and services, without the person’s knowledge. It’s high time we, as users, become aware of both advantages and disadvantages of online data sharing.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pallavi Shivakumar, assistant professor, says, “There should be more transparency and accountability from these app developers. There might not be any violation from their end but this is definitely a case of infiltration. I also feel that people need to be more aware of the footprint they are leaving behind.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aayush Rathi, policy officer, Centre for Internet and Society, says that the Cambridge Analytica scandal is an example of misuse of access to data granted to third parties.&lt;br /&gt;&lt;br /&gt;He elaborates, “Google mandates every user to give consent to a third-party app before the app can access their information. A screen asking your permission to let the app access to your inbox pops up. While you may willingly click on that, the ripple effects will create problems — people you send emails to and who you receive emails from may also be impacted. Further, while as a user I may consent to a third party getting access to my inbox, what we may not be able to control is their sharing of our data with a fourth party.”&lt;br /&gt;&lt;br /&gt;He adds that technically, Google is in the clear because unless an app gets consent from the user, it can’t access your inbox. The apps are also vetted by Google to see if they are in consonance with privacy standards; this is even before they are permitted to take permission from a user. “From a security point of view, Google claims to have high-end malware detection systems in place. Apps within the play store ecosystem can be vetted by Google but there are applications outside the ecosystem that can be used too. One of the central questions then becomes the degree to which we want Google to close down its API while maintaining data portability and interoperability considerations,” Aayush told Metrolife.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What can a user do?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Do your own vetting before giving access to a third-party app.&lt;/li&gt;
&lt;li&gt;Regular review of the third-party applications you have given access to through Google settings on Gmail. email ID Google Google Account&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-october-4-2018-surupasree-sarmmah-gmail-users-beware-while-giving-access'&gt;https://cis-india.org/internet-governance/news/deccan-herald-october-4-2018-surupasree-sarmmah-gmail-users-beware-while-giving-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-08T15:25:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/arabian-business-september-1-2013-beatrice-thomas-gmail-ban-looms-for-indian-govt-workers">
    <title>Gmail ban looms for Indian gov't workers </title>
    <link>https://cis-india.org/news/arabian-business-september-1-2013-beatrice-thomas-gmail-ban-looms-for-indian-govt-workers</link>
    <description>
        &lt;b&gt;Government workers in India will soon be banned from using Google’s Gmail service for official communication in a move said to be in response to revelations of widespread cyberspying by the US, a national paper reported.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Beatrice Thomas's blog post was &lt;a class="external-link" href="http://www.arabianbusiness.com/gmail-ban-looms-for-indian-gov-t-workers-516095.html#.Ujqdfn-sQgc"&gt;published in Arabian Business.com &lt;/a&gt;on September 1, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Two weeks after Dubai announced a ban on private emails by Government staff, a senior official in India’s Ministry of Communications and Information Technology said the crackdown would apply to 500,000 government employees, according to The Times of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They would be banned from using providers such as Gmail, which had servers based in the US, and instead asked to stick to the official email service provided by India's National Informatics Centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Gmail data of Indian users resides in other countries as the servers are located outside," J Satyanarayana, secretary in the Department of Electronics and Information Technology, told the Times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Currently, we are looking to address this in the Government domain, where there are large amounts of critical data.”&lt;br /&gt;&lt;br /&gt;The move comes in the wake of revelations by former US National Security Agency contractor Edward Snowden that the US government had direct access to large amounts of personal data on the internet such as emails and chat messages from companies such as Google, Facebook and Apple through a program called PRISM.&lt;br /&gt;&lt;br /&gt;The Times said several senior government officials in India, including ministers of state for communications and IT, Milind Deora and Kruparani Killi, had their Gmail IDs listed in government portals as their official email.&lt;br /&gt;&lt;br /&gt;However, IT  Minister Kapil Sibal said last week there had been no evidence of the US accessing internet data from India.&lt;br /&gt;&lt;br /&gt;The newspaper quoted a senior official in the IT Department saying Gmail was preferred by employees because, compared to official email services, it was easy to set up.&lt;br /&gt;&lt;br /&gt;Sibal said the new policy would require all government officials living abroad to use NIC servers that were directly linked to a server in India while accessing government email services.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, executive director of Bangalore-based research firm Centre for Internet and Society, said he agreed with the ban.&lt;br /&gt;&lt;br /&gt;“After Snowden’s revelations, we can never be sure to what extent foreign governments are intercepting government emails," he told the Times.&lt;br /&gt;&lt;br /&gt;It emerged last month that Dubai government employees had been banned from sending and receiving private emails at work, including the use of independent email providers such as Hotmail, Yahoo! and Gmail.&lt;br /&gt;&lt;br /&gt;The new regulations announced by Sheikh Mohammed bin Rashid Al Maktoum, Vice President, Prime Minister and ruler of Dubai, specifically referred to religious and political communication as well as messages relating to charitable causes.&lt;br /&gt;&lt;br /&gt;Workers are also not allowed to open unsolicited mail, spam or emails that contain viruses, or alter the date, time, source of destination information on an email.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/arabian-business-september-1-2013-beatrice-thomas-gmail-ban-looms-for-indian-govt-workers'&gt;https://cis-india.org/news/arabian-business-september-1-2013-beatrice-thomas-gmail-ban-looms-for-indian-govt-workers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-19T07:19:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-technology-summit-2017">
    <title>Global Technology Summit 2017</title>
    <link>https://cis-india.org/internet-governance/news/global-technology-summit-2017</link>
    <description>
        &lt;b&gt;The 2017 Global Technology Summit will take place on December 7 and 8, 2017 at the Hotel Leela Palace, Bangalore. Sunil Abraham is a speaker at the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Link to the original published by Carnegie &lt;a class="external-link" href="http://carnegieindia.org/2017/12/08/global-technology-summit-2017-event-5656?mkt_tok=eyJpIjoiTjJKbFlXWTBaakV3TVRVMSIsInQiOiJ1YkRmVHZHd2h2bVFOTzNEQm94YzRBYUtrWjFwNnhXMkJFSWNiSDE0QldRd3RsT3d1cXhyd2xrNGs4MjdUc2NTN3kyMm9wd28zWGgrcWFDVVBMXC90czhYQ0dSTzlPajRseGdzXC80WW4wWE9zMVR1N1pYY0pmdHBqZTRjSGphQWVRIn0%3D"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The inaugural edition of the &lt;a href="http://carnegieindia.org/2016/12/07/global-technology-summit-2016-event-5407"&gt;Global Technology Summit&lt;/a&gt; convened leading scholars, experts, and officials from more than ten  countries for wide-ranging discussions on policy frameworks for  technological innovation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building on its success, leading innovators, researchers, and  entrepreneurs in cutting-edge technologies from around the world will  engage with regulators, policy experts, and civil society actors this  December in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Summit will focus on new directions in technology policy, such as  tech-diplomacy, data protection, and building an innovation ecosystem,  as well as fields like digital finance, e-mobility, robotics, and smart  cities, where massive technological transformation is likely in the  coming years.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/global-technology-summit-2017-agenda"&gt;&lt;b&gt;Agenda here&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Panel Description&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Navigating Big Data Challenges: Access to data, and capabilities to analyze the same, redefine the business moat for corporations and governance opportunities for governments. Data dictates product and policy success. It also raises complex challenges. With ever increasing hacks and vulnerabilities, data security continues to confound us. Data-driven businesses and governments also question core assumptions of privacy and individual reputation. Machine learning and deep learning, facilitated by data crunching algorithms, can either be coded to discriminate or learn from human data sets and imbibe the very same prejudices. This panel will deliberate upon these varied challenges, and explore possible policy frameworks to address them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The panelists are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ann Cavoukian&lt;/li&gt;
&lt;li&gt;Rahul Matthan&lt;/li&gt;
&lt;li&gt;Vishnu Shankar&lt;/li&gt;
&lt;li&gt;Rob Sherman&lt;/li&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Chaired by B.N. Srikrishna, former judge, Supreme Court of India&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-technology-summit-2017'&gt;https://cis-india.org/internet-governance/news/global-technology-summit-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2017-12-05T13:47:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/global-partners-meeting-london">
    <title>Global Partners Meeting @ London</title>
    <link>https://cis-india.org/news/global-partners-meeting-london</link>
    <description>
        &lt;b&gt;Privacy International is organizing the Global Partners Meeting in London from March 22 to 25, 2013. The workshop will be held at the London School of Economics and Political Science. Sunil Abraham and Malavika Jayaram will be participating in this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/global-partners-meeting-london.pdf" class="internal-link"&gt;Click to read the full details published by Privacy International here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The meeting is an opportunity to connect global partners with each other and with researchers, human rights advocates, and privacy and technology experts from over 20 countries. This will provide an opportunity for discussion and debate, that will enrich global research and advocacy agenda for the next two years.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Workshop Overview&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The purpose of the three day workshop is as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;To understand the privacy discourse and identify the challenges faced in advancing the right to privacy across the globe.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To consolidate our network and look for opportunities for collaboration and cross-pollination for research and advocacy initiatives.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To share experiences about research, dissemination and advocacy strategies that influence policy change.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;We envisage this workshop as a launching pad for the work that Privacy International and our global partners will conduct over the next two years under the ambit of the Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project, funded by the International Development&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research Centre. The focus of the SAFEGUARD project is to understand what are the threats, challenges and obstacles to, and opportunities for, the protection of privacy in developing countries.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background to the SAFEGUARD project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nowhere are the challenges to, and opportunities for, privacy protections as dynamic and complex as in the developing world. As these countries seek new measures to develop their economies, build social and technological infrastructures, sustain their social systems, and ensure security they need to consider what are the modern policy frameworks they require to ensure a just society. The windows around these policy frameworks are key opportunities for reflection about rights and democratic values, and in the case of this project, the protection of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vast scope and relevance of the right to privacy in this age of technology gives rise to a myriad of challenges and issues, many of which have relevance across, as well as within, borders. This is particularly the case in the developing world, where South-South collaboration is gaining increasing currency in the development sector, and donor countries continue to contribute to and influence policy in recipient countries, particularly with respect to the adoption of new technologies. Many of the trends in developing countries – communications surveillance, biometrics and DNA databases, and identity cards – mirror those being adopted in the global North. Policy laundering and modelling, such as that witnessed with respect to counter-terrorism policies in the aftermath of 9/11 is taking hold in the context of communications surveillance laws and national ID databases. Such phenomena raise concerns not only as to the spread of practices that threaten to undermine privacy, but also with respect to the stifling of national policy discourses and legislative processes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conceptual framework&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This projects sets out to isolate and understand the challenges to privacy in the developing world. In order to ensure that the research developed is sufficiently targeted to influence policy debates, we have identified a set of themes that cover the range of privacy-related issues and that together will give a comprehensive picture of the difficult relationship between privacy and technology. This set of themes has been developed in collaboration with our partners, who have identified those discussions around which there is perfect storm of advancing surveillance policies and technologies, poor legal and technical safeguards, and a scarcity of research and understanding. We have designed our conceptual framework accordingly.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;&lt;img src="https://cis-india.org/PI.png" alt="Human Rights &amp;amp; Privacy Laws" class="image-inline" title="Human Rights &amp;amp; Privacy Laws" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Research questions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The legal and constitutional landscape&lt;/b&gt;: What laws and constitutional provisions exist to protect privacy, how are they implemented and monitored, and where are the legal and policy gaps?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data protection&lt;/b&gt;: What is the state of data protection in partner countries, and what are the local and  regional regulatory standards and good practices?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications surveillance&lt;/b&gt;: What communications surveillance regimes are in  place, how are they designed in law and how do they operate in practice?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adoption of surveillance technologies&lt;/b&gt;: Where are governments buying surveillance technologies, and how are they using them? What legal regimes are in place to establish safeguards over the use of advanced surveillance technologies? What is the state of the art in legal protections?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Political intelligence oversight&lt;/b&gt;: What is the nature and operation of local intelligence services, what oversight mechanisms are in place, and how can these mechanisms be implemented or enforced?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Politics, Identity, sexual and reproductive health and social sorting&lt;/b&gt;: To what the extent do governments misuse personal information to pursue social sorting practices?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Delivery of public services&lt;/b&gt;: What is the state of privacy protections in public service delivery, particularly those related to e-health systems and social protection programmes, and how can protections be improved?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ID, DNA and biometrics&lt;/b&gt;: What privacy risks are associated with the collection and use of personal information for ID and biometric systems?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Partners&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;span&gt;Africa&lt;/span&gt;&lt;/th&gt;&lt;th&gt;&lt;span&gt;Latin America&lt;/span&gt;&lt;/th&gt;&lt;th&gt;&lt;span&gt;Asia&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Zimbabwe Human Rights Forum, Zimbabwe&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Kenyan Ethical and Legal Issues Network, Kenya&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Media Institute of Southern Africa, Namibia&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Jonction, Senegal &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Centre for Social Sciences Research, University of Cape Town&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;African Platform for Social Protection, Kenya&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Dejusticia, Columbia&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Asociacion por los Derechos Civiles, Argentina&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Autonomous University of Mexico State, Mexico&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Centro de Tecnologia y Sociedad, Universidad San Andres, Argentina, in collaboration with the Centro de Tecnologica da Escola de Direito da Fundacao Getulio Vargas, Brasil&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Instituto NUPEF, Brazil&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Derechos Digitales, Chile&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;VOICE, Bangladesh&lt;/li&gt;
&lt;li&gt;University of Hong Kong, Hong Kong&lt;/li&gt;
&lt;li&gt;Centre for Internet and Society, India&lt;/li&gt;
&lt;li&gt;Thai Netizen Network, Thailand&lt;/li&gt;
&lt;li&gt;Thai Media Policy Center, Thailand&lt;/li&gt;
&lt;li&gt;Bytes For All, Pakistan&lt;/li&gt;
&lt;li&gt;Centre for Cyber Law Studies, Indonesia&lt;/li&gt;
&lt;li&gt;Foundation for Media Alternatives, Philippines&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Participants&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Ababacar Diop&lt;/li&gt;
&lt;li&gt;Allan Maleche&lt;/li&gt;
&lt;li&gt;Anna Fielder&lt;/li&gt;
&lt;li&gt;Anthony Jackson&lt;/li&gt;
&lt;li&gt;Arthit Suriyawongkul&lt;/li&gt;
&lt;li&gt;Arthur Gwagwa&lt;/li&gt;
&lt;li&gt;Ben Hayes&lt;/li&gt;
&lt;li&gt;Ben Wagner&lt;/li&gt;
&lt;li&gt;Benjamin Barretto&lt;/li&gt;
&lt;li&gt;Carly Nyst&lt;/li&gt;
&lt;li&gt;Carolin Moeller&lt;/li&gt;
&lt;li&gt;Charles Dhewa&lt;/li&gt;
&lt;li&gt;Claudio Ruiz&lt;/li&gt;
&lt;li&gt;Clement Chen&lt;/li&gt;
&lt;li&gt;Danilo Doneda&lt;/li&gt;
&lt;li&gt;Eric King&lt;/li&gt;
&lt;li&gt;Farjana Akter&lt;/li&gt;
&lt;li&gt;Fieke Jansen&lt;/li&gt;
&lt;li&gt;Graciela Sulamein&lt;/li&gt;
&lt;li&gt;Gus Hosein&lt;/li&gt;
&lt;li&gt;Helen Wallace&lt;/li&gt;
&lt;li&gt;Juan Camilo Rivera&lt;/li&gt;
&lt;li&gt;Karelle Dagon&lt;/li&gt;
&lt;li&gt;Katitza Rodriguez&lt;/li&gt;
&lt;li&gt;Kevin Donovan&lt;/li&gt;
&lt;li&gt;Levinson Kabwato&lt;/li&gt;
&lt;li&gt;Malavika Jayaram&lt;/li&gt;
&lt;li&gt;Mathias Vermeulen&lt;/li&gt;
&lt;li&gt;Michael Rispoli&lt;/li&gt;
&lt;li&gt;Nelson Arteaga Botello&lt;/li&gt;
&lt;li&gt;Pablo Palazzi&lt;/li&gt;
&lt;li&gt;Pirongrong Ramasoota&lt;/li&gt;
&lt;li&gt;Ramiro Alvarez Ugarte&lt;/li&gt;
&lt;li&gt;Richie Tynan&lt;/li&gt;
&lt;li&gt;Sam Smith&lt;/li&gt;
&lt;li&gt;Sinta Dewi Rosadi&lt;/li&gt;
&lt;li&gt;Shahzad Ahmed&lt;/li&gt;
&lt;li&gt;Sinta Dewi Rosadi&lt;/li&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;li&gt;Stephanie Perrin&lt;/li&gt;
&lt;li&gt;Tavengwa Nhongo&lt;/li&gt;
&lt;li&gt;Vera Franz&lt;/li&gt;
&lt;li&gt;Vicky Nida&lt;/li&gt;
&lt;li&gt;Vivian Newman Pont&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;Friday, March 22, 2013: Reception&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Meet with Privacy International staff members and advisors, and workshop participants from more than 20 countries in Latin America, Asia, Africa, Europe and Central Asia. Food and drinks will be provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Time: 6.00 p.m.&lt;br /&gt;Location: 2nd Floor, 46 Bedford Row, London WC1R 4LR&lt;br /&gt;Contact: 0207 242 2836&lt;br /&gt;Getting there: Our office is a short walk 10 minute from your hotel. See &lt;b&gt;Map 1&lt;/b&gt; below for directions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Saturday, March 23, 2013: Day 1 (Objectives and Reviewing the Landscape)&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;10:00 a.m. - Welcome Breakfast: Setting The Scene&lt;/b&gt;&lt;br /&gt;Location: Mercure London Bloomsbury restaurant&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Welcome and introduction&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Overview of PI’s work in developing countries&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Participant introductions&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Setting the agenda&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12:30 p.m. - Session 1: Reviewing The Landscape&lt;br /&gt;&lt;/b&gt;Location: Old Building, Room 3.21, London School of Economics and Political Science, Houghton Street, London WC2A 2AE&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mapping privacy in constitutions&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 1: communications surveillance laws around the world&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Break-out groups on assigned topics, and reporting back&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;2:30 p.m. - Afternoon tea&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Privacy quiz&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 2: SIM card registration&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Building a network: how can PI facilitate your work?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 3: Oversight of intelligence agencies&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;6:00 p.m. - Drinks&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;7:00 p.m. - Dinner&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Location: Tohbang, 164 Clerkenwell Road&lt;br /&gt;&lt;a class="external-link" href="http://www.tohbang.com/sub_eng/main.php"&gt;http://www.tohbang.com/sub_eng/main.php&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Sunday, March 24: Day 2 (Research Topics and Strategies)&lt;/h3&gt;
&lt;p&gt;Location: Old Building, Room 3.21, London School of Economics and Political Science, Houghton Street, London WC2A 2AE&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10:00 a.m. - Recap of day one&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 4 - The UN Universal Periodic Review&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Open-space - research and policy priorities&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;1:00 p.m. - Lunch&lt;br /&gt;&lt;/b&gt;Location: Ship Tavern, Holborn&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2:30 p.m. - Reconvene&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Open space - research, dissemination and communication strategies&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Wrapping up and going forward&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;6:00 p.m. - Dinner&lt;br /&gt;&lt;/b&gt;Location: Wahaca, Charlotte St, &lt;a class="external-link" href="http://www.wahaca.co.uk/"&gt;http://www.wahaca.co.uk/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-partners-meeting-london'&gt;https://cis-india.org/news/global-partners-meeting-london&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-20T06:37:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights">
    <title>Global Networks, Individual Freedoms: A Peer Forum on Internet Freedom and Human Rights</title>
    <link>https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights</link>
    <description>
        &lt;b&gt;In Connection with the 2012 Internet Freedom Fellows Program, the United States Mission to the United Nations in Geneva is pleased to invite Pranesh Prakash to a peer forum at the United States Mission to the United Nations on Thursday, June 21, 2012, from 9 a.m. to 3 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Join the Internet Freedom Fellows, diplomats, UN representatives, civil society, technologists and social media experts, Geneva media and other professionals engaged in the intersection of human rights, internet freedom and technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This peer forum is part of the Internet Freedom Fellows program, which brings human rights activists from across the globe to Geneva, Washington, and Silicon Valley to meet with fellow activists, U.S. and international government leaders, and members of civil society and the private sector engaged in technology and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s Internet Freedom Fellows, all human rights activists and active practitioners of digital media, are from Syria, India, Burkina Faso, Cambodia, Venezuela and Azerbaijan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For additional information on the program, please visit &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://geneva.usmission.gov/us-hrc/internet-freedom-fellows-2012/"&gt;Internet Freedom Fellows&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;h3 id="_mcePaste"&gt;Program&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;9:00 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Welcome and introduction&lt;/strong&gt;&lt;br /&gt;David Kennedy / John Horniblow&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:15 - 10:15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Freedom to Connect and Freedom from Fear: The problem of surveillance in a networked world&lt;/strong&gt;. &lt;br /&gt;&lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://consentofthenetworked.com/author/"&gt;Rebecca MacKinnon&lt;/a&gt;&lt;/span&gt; – Co Founder Global Voices Online, Author “Consent of  the Networked”, Boards of Directors of the Committee to Protect Journalists and the Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:15 - 10:45&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Developing Networked Voices and Promoting the protection of Human Rights &lt;/strong&gt;&lt;br /&gt;Andreas Harsono, blogger and human rights activist (Indonesia), and Rosebell Kagumire, multimedia journalist working on peace and conflict issues in the Eastern Africa region (Uganda)  &lt;br /&gt;2011 Internet Freedom Fellows and journalists (via Skype)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:45 - 11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Coffee break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 12:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Moderated Panel Discussion – How Do we Protect Human Rights in a world of global networks? How do the needs of the grassroots, civil society and business inform the process of upholding the UDHR and IHL in networks and technologies?&lt;/strong&gt;&lt;br /&gt;Dr. Robert Whelan (ICRC), Pranesh Prakash, Salil Trepathi (IHRB), Nicolas Seidler (ISOC), Emin Milli  Moderated Panel Discussion followed by Q &amp;amp;A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00 - 13:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Buffet Luncheon&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00 - 13:30&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;The Open Internet - Empowering Digital Humanitarianism&lt;/strong&gt;&lt;br /&gt;Paul Conneally - Head of Communications for ITU and a former Red Cross delegate (in various positions, locations and with IFRC plus ICRC and the Irish Red Cross).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:40 - 14:10&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Global Network Initiative and the multistakeholder approach ensuring an Open Internet&lt;br /&gt;David Sullivan -Policy and Communications Director &lt;br /&gt;Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left; "&gt;14.15 &lt;span style="text-align: left; "&gt;- &lt;/span&gt;14.40&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;The Silicon Valley Standard and implications for technology companies in the protection of Human Rights and other freedoms &lt;/strong&gt;&lt;br /&gt;Brett Solomon -Exec Director Access Now  (via Skype)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left; "&gt;15:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Twiplomacy &lt;/strong&gt;&lt;br /&gt;Matthias Luefkins  &lt;i&gt;Managing Director, Digital, EMEA&lt;/i&gt;– Burson Marstellar&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div style="text-align: justify; "&gt;Participation is limited.  Please RSVP by noon on Friday, June 15 to &lt;span class="visualHighlight"&gt;&lt;a class="mail-link" href="mailto:iff@usmission.ch"&gt;iff@usmission.ch&lt;/a&gt;. &lt;/span&gt;When responding, please indicate whether you will also join us for the luncheon buffet.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights'&gt;https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-28T09:12:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi">
    <title>Global Governance Futures 2027 - Session 3, New Delhi</title>
    <link>https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi</link>
    <description>
        &lt;b&gt;The Global Governance Futures program (GGF) initiated by Global Public Policy Institute and supported by Robert Bosch Stiftung brings together young professionals to look ahead ten years and recommend ways to address global challenges. Sumandro Chattapadhyay will join Ankhi Das (Facebook) and Arun Mohan Sukumar (Observer Research Foundation) on Tuesday, January 17, to discuss the "data governance" scenarios developed by the GGF 2027 Fellows.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;About the Programme: &lt;a href="http://www.ggfutures.net/about/ggf-program/"&gt;External Link&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;GGF 2027 Fellows: &lt;a href="http://www.ggfutures.net/current-fellows/"&gt;External Link&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;GGF 2027 Session 3, New Delhi - Agenda: &lt;a href="http://cis-india.org/internet-governance/files/ggf-2027-session-3-new-delhi-agenda/at_download/file"&gt;Download&lt;/a&gt; (PDF).&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi'&gt;https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2017-01-15T11:46:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc">
    <title>Global Commission on the Stability of Cyberspace (GCSC)</title>
    <link>https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc</link>
    <description>
        &lt;b&gt;The Global Commission on the Stability of Cyberspace organized a meeting on November 21, 2017 in New Delhi. The meeting took place at Taj Diplomatic Enclave Hotel on the sidelines of the 5th Global Conference on Cyberspace. Pranesh Prakash participated in the event.&lt;/b&gt;
        &lt;p&gt;GSC commissioners engaged in discussions with leading experts on cyber diplomacy, cyber norms and counter-proliferation. See the Draft Agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyber-security-hearings-gsc"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc'&gt;https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T14:38:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/global-freedom-expression">
    <title>Global Challenges to Freedom of Expression</title>
    <link>https://cis-india.org/events/global-freedom-expression</link>
    <description>
        &lt;b&gt;The Centre for Culture, Media &amp; Governance, Jamia Millia Islamia, Delhi, Human Rights Law Network, Delhi and the Centre  for Internet &amp; Society, Bangalore are pleased to invite you to a public lecture by Mr. Frank La Rue, President of the Central American Institute for Studies of Social Democracy  and UN Special Rapporteur on Freedom of Expression on March 4, 2011, 6 pm at the Constitutional Club in New Delhi.
&lt;/b&gt;
        
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/frank_la_rue_121.jpg/image_preview" alt="Frank La Rue" class="image-inline" title="Frank La Rue" /&gt;&lt;/p&gt;
&lt;h3&gt;Frank La Rue&lt;/h3&gt;
&lt;p&gt;Mr. La Rue is the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression for the Office of the United Nations High Commissioner for Human Rights. &amp;nbsp;He has worked on human rights for the past 25 years. &amp;nbsp;He is the founder of the Centre for Legal Action for Human Rights (CALDH), both in Washington DC and Guatemala, which became the first Guatemalan NGO to bring cases of human rights violations to the Inter-American System. &amp;nbsp;CALDH was also the first Guatemalan NGO to promote economic, social and cultural rights. &amp;nbsp;Mr. La Rue also brought the first genocide case against the military dictatorship in Guatemala. &amp;nbsp;As a human rights activist, his name was presented to the Nobel Peace Prize committee in 2004.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;La Rue has previously served as a Presidential Commissioner for Human Rights in Guatemala, as a Human Rights Adviser to the Minister of Foreign Affairs of Guatemala and as a consultant to the Office of the High Commissioner for Human Rights. &amp;nbsp;He is President of Instituto Demos in Guatemala City. La Rue holds a BA in Legal and Social Sciences from the University of San Carlos, Guatemala and a postgraduate degree in U.S. foreign policy from Johns Hopkins University.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The entrance is free. Refreshments will be served from 5.30 pm onwards.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/global-freedom-expression'&gt;https://cis-india.org/events/global-freedom-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:17:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/global-censorship-conference">
    <title>Global Censorship Conference</title>
    <link>https://cis-india.org/internet-governance/global-censorship-conference</link>
    <description>
        &lt;b&gt;The Abrams Institute for Freedom of Expression at Yale Law School is holding a conference on global censorship from March 30 to April 1, 2012, at Yale Law School. The programme is sponsored by the Information Society Project at Yale Law School and Thomson Reuters. &lt;/b&gt;
        
&lt;p&gt;"This conference is the first major event for the Abrams Institute 
for Freedom of Expression, and it brings together an exciting group of 
thinkers from law, political science, computer science, business and the
 non-profit sector to discuss the lessons of the past few years,” 
explained Yale Law Professor Jack Balkin, director of the Abrams 
Institute and the Information Society Project. “We think the study of 
free expression in the digital age should be international and 
interdisciplinary."&lt;a href="https://cis-india.org/internet-governance/global-censorship-conference#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rishabh Dara, Google Policy Fellow who worked at CIS office in 
Bangalore on freedom of expression and internet-related policy issues is
 participating in the event as a speaker in the panel on Case Studies of
 Censorship. The panel will explore recent instances of censorship in 
the United States, Egypt, Syria, Brazil, and India and the common themes
 and important differences that emerged.&lt;/p&gt;
&lt;p&gt;This conference will consider how censorship has changed in a networked world, exploring how networks have altered the practices of both governments and their citizens. Panels will include discussions of how governments can and do censor and how speakers can command technical and legal tools to preserve their ability to speak.&amp;nbsp; The conference will conclude with a discussion of new controversies in censorship, including laws designed to prevent online bullying and intellectual property infringement.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Friday March 30, 2012 &lt;/strong&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;2:00&lt;/td&gt;
&lt;td&gt;Begin Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:15 – 4:45&lt;/td&gt;
&lt;td&gt;The Means of Change, Familiar and New&lt;br /&gt;
(&lt;em&gt;co-sponsored by Sponsored by the Orville H. Schell, Jr. Center for International Human Rights&lt;/em&gt;) &lt;br /&gt;
In the popular story of the political upheavals in the Middle East and 
North Africa, information technology stands out as the new factor that 
was critical to rapid mass mobilization for demanding change. The media 
have been credited with making popular demands for change contagious. 
Enthusiasts for the potential of technology to foster progressive change
 have labeled these apparently sudden developments a Facebook 
revolution. Governments responded by seeking to curtail the use of 
mobile phones and the Internet. What role has technology played in 
igniting, sustaining and shaping recent political changes in the Arab 
world? &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Anupam Chander, Professor of Law, University of California, Davis and Director, California International Law Center&lt;/li&gt;&lt;li&gt;Rebecca MacKinnon, Bernard L. Schwartz Senior Fellow, New America Foundation&amp;nbsp;&lt;/li&gt;&lt;li&gt;John Pollock, journalist &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5:00–&lt;br /&gt;
6:30&lt;/td&gt;
&lt;td&gt;Keynote Lecture &lt;br /&gt;

(&lt;em&gt;co-sponsored by Sponsored by the Orville H. Schell, Jr. Center for International Human Rights&lt;/em&gt;)&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Irwin Cotler, Canadian Parliament, former Attorney General of Canada &lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6:30– 9:00&lt;/td&gt;
&lt;td&gt;Reception for Panelists of the Global Censorship Conference &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Saturday March 31, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00 – 10:00&lt;/td&gt;
&lt;td&gt;&amp;nbsp;Registration and Breakfast&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00–&lt;br /&gt;
11:30&lt;/td&gt;
&lt;td&gt;Panel One: Old and New Forms of Censorship &lt;br /&gt;
Years ago, activists met in person to plan protests and quietly shared 
subversive texts. Now, events can be planned over social networking 
sites, and arguments for change are posted online. How have governments 
responded to these changes? How have activist practices and governments’
 reactions changed the way we conceptualize censorship? &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Jack Balkin, Yale Law School&lt;/li&gt;&lt;li&gt;Yochai Benkler, Harvard Law School&amp;nbsp;&lt;/li&gt;&lt;li&gt;Navid Hassanpour, Yale Political Science Deptartment&amp;nbsp;&lt;/li&gt;&lt;li&gt;Rebecca MacKinnon, Bernard L. Schwartz Senior Fellow, New America Foundation &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:45 – 1:15&lt;/td&gt;
&lt;td&gt;Panel Two: Technical Architectures of Censorship&lt;br /&gt;
There are a number of choke points across the Internet and a number of 
different censorship mechanisms that can be deployed at various points 
across the network. Censorship can be executed at the router level, the 
Internet Service Provider (ISP) level, the Internet Content Provider 
(ICP) level, or the device level. Additionally, countries can employ a 
number of different technologies at each level. This panel will explore 
the many technical options for censorship and the strategic value of 
different choices. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Laura DeNardis, Associate Professor of Communication at American 
University, and Affiliated Fellow, Information Society Project at Yale 
Law School&lt;/li&gt;&lt;li&gt;Nagla Rizk, American University in Cairo&amp;nbsp;&lt;/li&gt;&lt;li&gt;Hal Roberts, Fellow at Berkman Center for Internet &amp;amp; Technology&amp;nbsp;&lt;/li&gt;&lt;li&gt;Ashkan Soltani, Independent Researcher and Consultant on Privacy and Security &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:15 – 2:15&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:15 – 3:45&lt;/td&gt;
&lt;td&gt;Panel Three: Case Studies of Censorship &lt;br /&gt;

In the wake of censorship both domestically and abroad, many questions 
emerged about how the censorship was executed, what effects it had, if 
and how activists were able to route around the it, and how, if it all, 
it was eventually stopped. This panel will explore recent instances of 
censorship in the United States, Egypt, Syria, Brazil, and India and the
 common themes and important differences that emerged. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Sherwin Siy, Deputy Legal Director and the Kahle/Austin Promise Fellow at Public Knowledge&lt;/li&gt;&lt;li&gt;Lina Attalah, Journalist, Managing Editor of Al-Masry Al-Youm&amp;nbsp;&lt;/li&gt;&lt;li&gt;Anas Qtiesh, Blogger, Editor of Global Voices&amp;nbsp;&lt;/li&gt;&lt;li&gt;Carlos Affonso Pereira de Souza, Vice-Coordinator of the Center for 
Technology &amp;amp; Society (CTS) at the Fundação Getulio Vargas (FGV) Law 
School&lt;/li&gt;&lt;li&gt;Rishabh Dara, Researcher at Indian Institute of Management, Ahmedabad &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:00 –&lt;br /&gt;
5:30&lt;/td&gt;
&lt;td&gt;&amp;nbsp;Panel Four: Technical Methods of Circumventing Censorship &lt;br /&gt;

New technology may provide governments with new tools to censor, but it 
also creates opportunities for speakers and “hactivists” everywhere. How
 can individuals evade identification online and access blocked content?
 Can activists circumvent attempts to shut down the internet during 
periods of political unrest? What new methods are being developed to 
preserve free speech online?&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Roger Dingledine, The Tor Project&lt;/li&gt;&lt;li&gt;Peter Fein, Telecomix&lt;/li&gt;&lt;li&gt;Alex Halderman, University of Michigan, Dept. of Computer Science&lt;/li&gt;&lt;li&gt;Sascha Meinrath, Open Technology Initiative Director, New America Foundation&lt;/li&gt;&lt;li&gt;Wendy Seltzer, Senior Fellow, Information Society Project at Yale Law School &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6:00 – 9:00&lt;/td&gt;
&lt;td&gt;Dinner for Speakers &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Sunday, April 1, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00 – 9:30&lt;/td&gt;
&lt;td&gt;&amp;nbsp;Breakfast&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30 – 11:00&lt;/td&gt;
&lt;td&gt;Panel Five: Legal Solutions to Censorship &lt;br /&gt;

Given the way censorship technologies have slowly crept into acceptable 
use because of concerns like piracy, child pornography, or national 
security, there is much debate about the role and capacity of law in 
combatting these new, digital forms of government censorship, 
domestically and internationally. This panel will discuss if and how 
legal solutions to censorship can be deployed most effectively.&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Derek Bambauer, Brooklyn Law School&lt;/li&gt;&lt;li&gt;Jim Dempsey, Vice President of Public Policy at the Center for Democracy and Technology&amp;nbsp;&lt;/li&gt;&lt;li&gt;Molly Land, New York Law School&amp;nbsp;&lt;/li&gt;&lt;li&gt;Linda Lye, ACLU Northern California&amp;nbsp;&lt;/li&gt;&lt;li&gt;Jillian York, Director for International Freedom of Expression at the Electronic Frontier Foundation &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15 – 12:45&lt;/td&gt;
&lt;td&gt;Panel Six: New Controversies in Censorship &lt;br /&gt;

Does new technology change the appropriate scope of free expression 
rights? Can policing intellectual property infringement burden free 
speech interests? Does surveillance ever have a censoring effect? This 
panel will wrestle with whether a variety of government activities 
constitutes inappropriate censorship or necessary actions to protect the
 public interest. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Rebecca Bolin, Fellow at Information Society Project, Yale Law School&lt;/li&gt;&lt;li&gt;Mark MacCarthy, Vice President for Public Policy, Software and 
Information Industry Association; Adjunct Professor, Communication, 
Culture and Technology Program, Georgetown University&amp;nbsp;&lt;/li&gt;&lt;li&gt;Preston Padden, Senior Fellow at the Silicon Flatirons Center and an
 Adjunct Professor at the University Of Colorado's Law School and 
Interdisciplinary Telecommunications Program&amp;nbsp;&lt;/li&gt;&lt;li&gt;David Post, Temple University, Beasley School of Law&amp;nbsp;&lt;/li&gt;&lt;li&gt;Christopher Soghoian, Graduate Fellow, Center for Applied Cybersecurity Research, Indiana University &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:45&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&amp;nbsp; Bagged Lunch Available&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
[&lt;a href="https://cis-india.org/internet-governance/global-censorship-conference#fr1" name="fn1"&gt;1&lt;/a&gt;].Global
 Censorship Conference to be Held March 30-April 1 at Yale Law School | 
Yale Law School, last accessed on March 30, 2012, &lt;a class="external-link" href="http://www.law.yale.edu/news/15140.htm"&gt;http://www.law.yale.edu/news/15140.htm&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.law.yale.edu/intellectuallife/censorship12.htm"&gt;Read the original posted in Yale Law School website&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/global-censorship-conference'&gt;https://cis-india.org/internet-governance/global-censorship-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-30T11:34:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw">
    <title>Glaring Errors in UIDAI's Rebuttal</title>
    <link>https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw</link>
    <description>
        &lt;b&gt;This response note by Pranesh Prakash questions Unique Identification Authority of India’s reply to Hans Verghese Mathews' article titled “Flaws in the UIDAI Process” (EPW, March 12, 2016), which found “serious mathematical errors” in the article.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;published in Economic &amp;amp; Political Weekly&lt;/a&gt; Vol. 51, Issue No. 36, September 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;While I am not a statistician, I have followed the technical debate between Hans Verghese Mathews and the UIDAI closely, and see a number of glaring errors in the latter’s so-called rebuttal in EPW (March 12, 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UIDAI alleges Mathews to have ignored the evidence that the Receiver Operating Characteristic (ROC) "flattens" with more factors. However, Mathews cannot be accused of ignorance if the flattening of the ROC is not relevant to his argument. To explain this in simple terms, the ROC curve is used to choose the appropriate "threshold distance" which determines false positives and false negatives, and belongs to a stage which precedes the estimation of the false positive identification rates (FPIR).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, Mathews has used the FPIR estimates provided by the UIDAI (based on evidence from the enrolment of 84 million persons), and calculated how the FPIR changes when extrapolated for a population of 1.2 billion persons. In other words, he did not need to look at the ROC curve as that factor is not relevant to his argument, since he has used UIDAI data (which has presumably been estimated on the basis of all 12 factors : 10 fingerprints and 2 irises). &lt;br /&gt;&lt;br /&gt;Further, UIDAI asks why Mathews has assumed a linear curve for his extrapolation. Mathews has done no such thing. In fact, in their paper "Role of Biometric Technology in Aadhaar Enrollment," the UIDAI states: "FPIR rate grows linearly with the database size" (nd, 19). Thus, this is an assumption formerly made by them (without providing rationale for it to be a linear curve as opposed to anything else).&amp;nbsp; Mathews mathematically derives bounds for the FPIR in his paper, that is, the range within which the FPIR lies. One gets a linear curve only if they use the upper bound and not on the usage of anything else. So while Mathews does, as he explains, provide the results of the calculation based on the upper bound for the sake of simplicity, he nowhere asserts nor assumes a linear curve.&lt;br /&gt;&lt;br /&gt;If, as the UIDAI claims, one cannot perform such an extrapolation and needs to depend on “empirical evidence” instead, the question arises as to how the UIDAI decided to scale up the programme to 1.3 billion people given the error rates. One could also ask if the machines being used to capture biometrics are good enough for the enlargement. Surely they would have performed some extrapolations to decide this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In their paper they note that "although it [FPIR] is expected to grow as the database size increases, it is not expected to exceed manageable values even at full enrolment of 120 crores" (UIDAI nd, 13). They do not illustrate the extent to which the FPIR is expected to grow—neither in their initial paper, nor in their rebuttal to Mathews—whereas Mathews provides a method of estimating the increase of FPIR. Even if UIDAI is correct in its appraisal of FPIR and that it will not exceed "manageable values," they need to either exemplify their calculations or release the latest data. They have done neither, and that is quite unfortunate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify;"&gt;UIDAI  (nd): “Role of Biometric Technology in Aadhaar Enrollment,” Unique  Identification Authority of India, Government of India, New Delhi,  viewed on 18 August 2016,  &lt;a class="external-link" href="https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology"&gt;https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Related Links&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div id="stcpDiv"&gt;
&lt;ol&gt;
&lt;li&gt;Flaws in the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Erring on Aadhaar &lt;a href="http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html"&gt;http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Request for Specifics &lt;a href="http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-uidai.html"&gt;http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-u...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Glaring Errors in UIDAI's Rebuttal &lt;a href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebutt...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Overlooking the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathews-and-pranesh-prakashs-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathe...&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw'&gt;https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-18T03:22:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password">
    <title>Giving out your fingerprint for Aadhar payments is as bad as telling the seller your banking password</title>
    <link>https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password</link>
    <description>
        &lt;b&gt;PRS India recently released a report card enlisting the status of all the major policy announcements made by the President on India in his address to the Parliament on 23 February 2016. The policies cover all the major sectors including economy and finance, industry and manufacturing, governance and legal reform, skill development, science and innovation among others.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nimish Sawant was published by &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password-360658.html"&gt;First Post Tech 2&lt;/a&gt; on February 3, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ever since the current government has come into power, there has     been a concerted effort to take India on the information highway     with technology-backed initiatives. Projects such as Digital India,     Smart City Project, Startup India to the latest policy announcements     post the demonetisation on 8 November 2016, a lot of has been said     about technology.&lt;br /&gt; &lt;br /&gt; But there are still areas of improvement, for instance we are yet to     have a privacy and data protection law, there is an alarming     shortage of cybersecurity experts and we have seen our fair share of     government as well as personal data being under jeopardy in the     years gone by.&lt;br /&gt; &lt;br /&gt; Pranesh Prakash, policy director of the Centre for Internet and     Society, has his reservations against the speed at which we are     moving towards the dream of a digitised India, without covering the     core policies on security, legal frameworks and more. Here is what     Prakash has to say.&lt;br /&gt; &lt;br /&gt; “All in all, we in India are in a really precarious situation when     it comes to Digital India, especially from a legal and regulatory     perspective. While the push for digitisation is to be welcome, it     should make this more convenient for citizens and that can’t be     accomplished by forcing digitisation on people without giving them     options.&lt;br /&gt; &lt;img src="https://cis-india.org/home-images/copy_of_Tweet.jpg" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Planning Commission put together a group of experts chaired by     Justice AP Shah, which came out with a report on privacy principles     which were to inform a privacy and data protection law that the     government was to introduce in Parliament. That report came out in     2012. In 2017, we are no closer to a privacy and data protection     law. The data security practices at the levels of the government and     of the private sector are very worrying.&lt;br /&gt; &lt;br /&gt; For instance, the Narendra Modi app, which is operated by the BJP,     for many months was leaking the personal details of more than 7     million users.&lt;br /&gt; &lt;br /&gt; Another example: the government, as per press reports, is going     ahead with using fingerprints for authentication of Aadhaar Enabled     Payment Systems (AEPS) transactions. While the security architecture     of AEPS might in itself be good, the idea of providing your     fingerprints to merchants for financial transactions is a terrible     idea since that is like asking you to give your bank password to a     merchant, and the merchant can reuse that password, and you can’t     ever change the password.&lt;br /&gt; &lt;br /&gt; Last year Symantec revealed that for more than two years a     cyberespionage project (that Symantec called “SuckFly“) had     penetrated deep into Indian systems, including Indian government and     banking systems.  Yet, the government didn’t conduct an enquiry     about this and reassure the public on actions being taken to     mitigate this.&lt;br /&gt; &lt;br /&gt; So while digitisation initiatives are great, there also needs to be     a concerted effort to have a secure framework, and there has to be     an ease in onboarding the non tech-savvy population as well.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password'&gt;https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-07T16:09:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me">
    <title>Girls' schools, women's PGs: The shocking results when you Google 'bitches near me'</title>
    <link>https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me</link>
    <description>
        &lt;b&gt; Considering the monopoly and clout that Google enjoys, it must be held accountable for promoting such stereotypes and values, experts say.
&lt;/b&gt;
        &lt;p&gt;The blog post by Geetika Mantri was published in &lt;a class="external-link" href="https://www.thenewsminute.com/article/girls-schools-women-s-pgs-shocking-results-when-you-google-bitches-near-me-92244"&gt;News Minute&lt;/a&gt; on November 26, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If there’s a question you don’t know the answer to, more often than  not, you’ll turn to Google. The search engine’s monopoly over the  market, and data pool at hand, are almost unparalleled in public  perception – which makes it all the more alarming when it tends to feed  into dangerous and misogynistic values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is what seems to have happened, as pointed out by Twitter user  @AHappyChipmunk, when someone opened Google Maps and typed “bitches near  me.” The results show up addresses of girls’ schools, women’s and  girls’ hostels and PGs, and women’s clothing shops. Not only is this  shocking because ‘bitches’ is often used as a derogatory phrase for  women, but also these Google search results of schools put minors at  risk.&lt;/p&gt;
&lt;p&gt;The tweet caused much outrage and alarm among people, who did the  search themselves and posted screenshots of the real time results that  they got.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Why would Google show these results?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a fellow at the Centre for Internet and Society,  points out that this was telling of the fact that Google knows that  ‘bitches’ can be a slang for women. “For many years now, Google has been  trying to understand and search for what you meant, than what you may  have typed,” he explains. “However, if you enclose this search phrase in  quotes, you will not get the same results, because then it will look  for the phrase.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also notes that if you were to look for “girls near me”, you would  get similar search results on Google Maps, though more specific to  women’s accommodations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, it you were to Google, “bitch near me”, you would not get  Google Map results. “I think that’s because Google understands that  ‘bitches’ is more likely to mean women, than singular ‘bitch’,” Pranesh  says.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Tech giants need to be held accountable&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Pranesh thinks that the search results are not ‘dangerous’ per  se in the sense that a potential abuser was more likely to Google ‘girls  schools’ than ‘bitches near me’, he agrees that these search results  are telling of the misogynistic language in use online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, is it okay for tech giants to wash the responsibility off  their hands because this is the language that their algorithm picked up?  Nayantara R, who works with the Internet Democracy Project in  Bengaluru, says, “This reminds me of the book &lt;i&gt;Algorithms of Oppression: How Search Engines Reinforce Racism&lt;/i&gt;."  The book challenges the idea that platforms like Google are level  playing fields for different ideas and ideologies. Author Safiya Umoja  Noble argues that due to data discrimination, private interests in  promoting certain sites, as well as the monopoly of a few online search  engines, results in biased search algorithms which discriminate against  women of colour while painting favourable portraits of whiteness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One such bias came to light in July last year where many people,  including Congress MP Shashi Tharoor pointed out how a Google search for  ‘south Indian masala’ led to a pictures of skimpily clad women, while  ‘north Indian masala’ led to photos of spices and dishes. At the time,  Google had maintained that this wasn’t its fault and that Google’s  search worked by learning from the keywords people use and the results  they click on to predict just what people are searching for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Nayantara asserts that considering the monopoly and clout  that Google enjoys, it must be held accountable for promoting such  stereotypes and values. “The Google page ranking is one of the most  protected patents. No one knows how or why certain pages come before the  others. In this case, certain search results coming first does not mean  that Google is misogynistic. But the algorithmic decision that is taken  by someone at Google to rank certain pages which promote certain values  before others does have a social impact. All technology is a result of  how it is used. Accountability is required there,” she argues.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A conversation about what search results mean&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nayantara also points out that apart from accountability, there needs  to be a conversation about what these search results mean. “Search  results do embed political values. However, people need to understand  that if they Google something and some pages are ranked before the  others, it is not reflective of the truth or right or wrong, but  reflection of an opinion,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We need popular perception to wrap its head around what a search  engine is, and that there are alternatives to Google. We also need more  algorithmic diversity in search results,” she adds.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me'&gt;https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-28T01:34:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice">
    <title>Girls just wanna have... a voice </title>
    <link>https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice</link>
    <description>
        &lt;b&gt;Many Indian women have taken to Twitter, the micro-blogging site, to air their views. And some of them have become social media celebrities by virtue of their wise and witty tweets. Prasun Chaudhuri looks at the women who matter in India’s Twitterverse.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.telegraphindia.com/1140308/jsp/calcutta/story_18064724.jsp"&gt;published in the Telegraph&lt;/a&gt; on March 8, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Everyone knows that movie stars like Priyanka Chopra and Deepika Padukone, media celebs like Barkha Dutt and Sagarika Ghose have hundreds of thousands of followers on social media who hang on to their every word. But Malini Agarwal, Priyanka Sachar? Vidyut Kale? You may not have heard of them otherwise, but these women are rockstars of India’s Twitterverse too — not because they are famous in their day jobs, but because their tweets have that special something that keeps the followers coming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take Malini Agarwal (@MissMalini), a former radio jockey and head of digital content for Channel V in India, who has over 2,00,000 followers on Twitter. In fact, she has a larger-than-life presence on virtually all social media platforms. Agarwal tweets about Bollywood, the fashion world and the Page 3 circuit. Her Twitter bio says: “She who controls the spice, controls the universe. Bollywood, Fashion &amp;amp; Lifestyle with a Desi Girl Twist.” This “desi girl” with the insider’s take on the glamour world is now an industry of sorts. She has her own website called missmalini.com in which she has employed nine enthusiastic young bloggers — “a happy mix of Bollywood Junkies, Fashionistas and Party Animals” representing “the young, modern (and pretty!) face of India”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Far removed from the glamour circuit is Vidyut Kale (@Vidyut), a stay-at-home mom raising an infant with cerebral palsy. She has over 14,000 followers for her unusual takes on “issues of socio-political interest”. Says Kale, who describes herself as an “intellectual anarchist”, “Twitter is just amazing because I can actually comment on something and get instant replies. I think I get followed mainly because I say what many will tiptoe around, and that can feel like a big relief when an issue is bugging you badly.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Her “firebrand” tweeting — on women’s issues, politics, and indeed, pretty much everything under the sun — has turned her into quite a celebrity and she often gets invited to speak at events. Even though she avoids most of these “real-life” gatherings, sometimes her fans force her to attend them. She says, “I have been paid travel expenses to attend an event when I said I couldn’t afford the travel. I have been interviewed, I have had people make an effort to understand a [social] cause if I bring it up.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clearly, a social media platform like Twitter has become a fantastic forum for women — a section of society that has traditionally been voiceless. Those who shine on it, says Sunil Abraham, Centre for Internet and Society (a Bangalore-based organisation that researches the impact of digital media), do so by virtue of their “authentic voice”. He adds, “Unlike in the traditional media, there’s no editor to moderate their views and they don’t have any guidelines to follow.” In other words, what their fans get to read or see are unfiltered views — something that’s often missing in mainstream media. Besides, their tweets are often edgy and politically incorrect. And men — and women — fed on the traditional image of women propagated by the mainstream media, find that refreshing and engaging.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Adds social media enthusiast and avid blogger Harsh Ajmera, “People appreciate the bold and politically incorrect approach of these Twitter stars, as opposed to the sugar-coated comments aired in news channels and various other media outlets.” Agrees Kale, “Unlike in lengthy blog posts or newspaper columns, it is easier to make comments on news or challenge views through Twitter. It also enables direct interaction with readers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ask Chinmayi Sripada (@chinmayi), a Chennai-based singer whose bold and frank tweets have earned her more than 2,40,000 Twitter followers. And a fair number of trolls and abusive enemies too. When she spoke out in support of Tamil Nadu fishermen who were attacked by the Sri Lankan Navy, she was flooded with abusive tweets that were tantamount to sexual harassment. But she took on her abusers (one of them was a professor at a top fashion institute) head on. “I filed a case under Section 66A of the IT Act and they were in jail for about two weeks. That was when I saw the full extent of cyber bullying on the basis of caste and community.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, Sripada doesn’t owe her fame to Twitter alone. She is a popular playback singer in south India and got famous across India for her recent Bollywood hit in Chennai Express. “I haven’t become famous because of social media. I am recognised primarily as a singer.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Actress and former Miss India Gul Panag (@GulPanag) is yet another Twitter star who was already a celebrity. But with a staggering 7,84,000 followers, and with tweets that are unfailingly sharp and intelligent, maybe her Twitter stardom outshines her Bollywood one. A recent survey by an agency named her as one of the most influential persons on the micro-blogging site. News anchor Barkha Dutt — one of the country’s top media celebrities — also boasts a whopping 12.3 lakh followers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Kaveri Ahuja (@ikaveri) is a regular wife and mom who has gone on to become a Twitter celeb. A cancer survivor, her takes on everyday life and the stories of her battle against colorectal cancer (“I love a good fight. How else would I have kicked the big C’s butt?”) attract over 25,000 followers. She even runs a separate Twitter handle for her fan club (@ikaverifc). “Being recognised on Twitter has expanded my offline social circle as well. I can count many online friends as my real-life friends now,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of India’s earliest Twitter stars was Priyanka Sachar. If her real name doesn’t ring a bell, her Twitter handle, @TwilightFairy, might. This erstwhile IT professional and part-time wedding photographer left her day job riding on the fame earned by her 140-character tweets. Her quirky takes on a wide range of topics — ranging from everyday outrages (“Bought passionfruit cake for parents’ anniversary from jaypeehotels and got long human hair baked in it for free. Never again!”) to instant reaction to news (“Sahara boss gets ink on his face. Reminds me of school time ink pen wars!”) — are lapped up by her 21,000+ followers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thanks to her fame on Twitter, she is often recognised by strangers. “It is a strange experience and I really don’t know how to react, except to say ‘yes, that’s me, how did you know!’… Twitter has made sure that so many interesting (and seemingly inaccessible) people are accessible instantly.” Apart from these “life-altering changes”, she keeps getting invited to some activity or the other, organised by brands that regularly invite “influencers”. “The recognition on Twitter/social media has affected me in massive ways. I left my IT industry job in order to figure out if I can take up a different profession and be a freelancer. And the moment I left my job, an opportunity landed straight in my lap, simply because of my Twitter id! I got offered a job as a social media consultant at a digital media agency,” she says.&lt;br /&gt;So have social media platforms such as Twitter really done wonders for women’s empowerment? Yes and no.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sachar, Twitter did offer unprecedented freedom of speech in its early days. But now that a lot of politicians and political parties have come on board and the Indian IT laws are being tweaked, tweets can be misused by anyone in power. “Even though one can say what one wants, people do tread a tad more cautiously compared to, let’s say, two year back,” says Sachar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi agrees. “There is nothing called total freedom of speech. Even if one chooses that path, the trolls are waiting to see who can be cut to size. I am guarded about what I write on social media.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice'&gt;https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-01T11:21:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
