<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2106 to 2120.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/section-66-it-act.txt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/section-43-it-act.txt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/geo-politics-of-information-controls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/may-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance">
    <title>India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis — It is Now Officially Confirmed</title>
    <link>https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance</link>
    <description>
        &lt;b&gt;As of last week, it is officially confirmed that the metadata of everyone´s communications is under the NSA´s microscope. In fact, the leaked data shows that India is one of the countries which is under NSA surveillance the most! &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC. This blog was &lt;a class="external-link" href="http://www.medianama.com/2013/06/223-what-does-nsa-prism-program-mean-to-india-cis-india/"&gt;cross-posted in Medianama&lt;/a&gt; on 24th June 2013. &lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-5905db2c-6115-80fb-3332-1eaa5155c762"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;¨Does the NSA collect any type of data at all on millions or hundreds of millions of  Americans?”, the democratic senator, &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;Ron Wyden, asked James Clapper&lt;/a&gt;&lt;span&gt;, the director of national intelligence a few months ago. “No sir”, replied Clapper.&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;True, the National Security Agency (NSA) does not collect data on millions of Americans. Instead, it collects data on billions of &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Americans, Indians, Egyptians, Iranians, Pakistanis and others&lt;/span&gt;&lt;/a&gt;&lt;span&gt; all around the world.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Leaked NSA surveillance&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Verizon Court Order&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recently, the &lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;Guardian released&lt;/a&gt; a top secret order of the secret Foreign Intelligence Surveillance Court (FISA) requiring Verizon on an “ongoing, daily basis” to hand over information to the NSA on all telephone calls in its systems, both within the US and between the US and other countries. Verizon is one of America's largest telecoms providers and under a top secret court order issued on 25 April 2013, the communications records of millions of US citizens are being collected indiscriminately and in bulk supposedly until 19 July 2013. In other words, data collection has nothing to do with whether an individual has been involved in a criminal or terrorist activity or not. Literally everyone is potentially subject to the same type of surveillance.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://yahoo.usatoday.com/news/washington/2006-05-10-nsa_x.htm"&gt;&lt;span&gt;USA Today reported in 2006&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that the NSA had been secretly collecting the phone call records of millions of Americans from various telecom providers. However, the &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;&lt;span&gt;April 25 top secret order&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is proof that the Obama administration is continuing the data mining programme begun by the Bush administration in the aftermath of the 09/11 terrorist attacks. While content data may not be collected, this dragnet surveillance includes &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt;metadata &lt;/span&gt;&lt;/a&gt;&lt;span&gt;such as the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number and the time and duration of all calls.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Content data may not be collected, but metadata can also be adequate to discover an individual's network of associations and communications patterns. &lt;/span&gt;&lt;a href="https://www.privacyinternational.org/blog/top-secret-nsa-program-spying-on-millions-of-us-citizens"&gt;&lt;span&gt;Privacy and human rights concerns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; rise from the fact that the collection of metadata can result in a highly invasive form of surveillance of citizens´ communications and lives.&lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt; Metadata records can enable the US government to know the identity of every person with whom an individual communicates electronically&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, as well as the time, duration and location of the communication. In other words, metadata is aggregate data and it is enough to spy on citizens and to potentially violate their right to privacy and other human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;PRISM&lt;/span&gt;&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;Recently, a secret NSA surveillance programme, code-named PRISM, was leaked by &lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;The Washington Post&lt;/a&gt;. Apparently, not only is the NSA gaining access to the meta data of all phone calls through the Verizon court order, but it is also tapping directly into the servers of nine leading Internet companies: Microsoft, Skype, Google, Facebook, YouTube, Yahoo, PalTalk, AOL and Apple. However, following these allegations, Google, Microsoft and Facebook recently asked the U.S. government to allow them to &lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;disclose the security requests&lt;/a&gt; they receive for handing over user data. It remains unclear to what extent the U.S. government is tapping into these servers.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Yet it appears that the &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;PRISM online surveillance programme&lt;/span&gt;&lt;/a&gt;&lt;span&gt; enables the NSA to extract personal material, such as audio and video chats, photographs, emails and documents. The &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/prism-gchq-william-hague-statement"&gt;&lt;span&gt;Guardian reported&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that PRISM appears to allow GCHQ, Britain's equivalent of the NSA, to secretly gather intelligence from the same internet companies. Following allegations that GCHQ tried to circumvent UK law by using the PRISM computer network in the US, the British foreign secretary, William Hague, stated that it is “fanciful nonsense” to suggest that GCHQ would work with an agency in another country to circumvent the law. Most notably, William Hague emphasized that reports that GCHQ are gathering intelligence from photos and online sites should not concern people who have nothing to hide! However, this implies that everyone is guilty until proven innocent...when actually, democracy mandates the opposite.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;James R. Clapper, the US Director of National Intelligence, &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;stated&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;“&lt;/span&gt;&lt;span&gt;Information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats. The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;So essentially, Clapper stated that in the name of US national security, the personal data of billions of citizens around the world is being collected. By having access to data stored in the servers of some of the biggest Internet companies in the world, the NSA ultimately has access to the private data of almost all the Internet users in the world. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;And once the NSA has access to tons of data through the Verizon court order and the PRISM surveillance programme, how does it create patterns of intelligence and generally mine huge volumes of data? &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The Guardian released top secret documents about the NSA data mining tool, called &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt;; this tool is used to detail and map by country the volumes of information collected from telephone and computer networks. The focus of the Boundless Informant is to count and categorise the records of communication, known as metadata, and to record and analyse where its intelligence comes from. One of the leaked documents states that the tool is designed to give NSA officials answers to questions like: “What type of coverage do we have on country X”. According to the Boundless Informant documents, the NSA has been collecting 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. During the same month, 97 billion pieces of intelligence from computer networks were collected worldwide. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The following &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;“global heat map”&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reveals how much data is being collected by the NSA from around the world:&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/BoundlessInformantmap.jpg" alt="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" class="image-inline" title="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;The colour scheme of the above map ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). India is notably orange and is thus subject to some of the highest levels of surveillance by the NSA in the world.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;During a mere 30-day period, the largest amount of intelligence was gathered from Iran with more than 14 billion reports, while Pakistan, Jordan and Egypt were next in line in terms of intelligence gathering. Unfortunately, India ranks 5th worldwide in terms of intelligence gathering by the NSA. According to the map above, 6.3 billion pieces of intelligence were collected from India by the NSA from February to March 2013. In other words, India is currently one of the top countries worldwide which is under the US microscope, with &lt;/span&gt;&lt;a href="http://epaper.timesofindia.com/Default/Scripting/ArticleWin.asp?From=Archive&amp;amp;Source=Page&amp;amp;Skin=ETNEW&amp;amp;BaseHref=ETBG/2013/06/12&amp;amp;PageLabel=20&amp;amp;ForceGif=true&amp;amp;EntityId=Ar02002&amp;amp;ViewMode=HTML"&gt;&lt;span&gt;15% of all information&lt;/span&gt;&lt;/a&gt;&lt;span&gt; being tapped by the NSA coming from India during February-March 2013. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance"&gt;&lt;span&gt;Edward Snowden&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is the 29-year-old man behind the NSA leaks...who is responsible for one of the most important leaks in US (and one may argue, global) history.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="350" width="425"&gt;
&lt;param name="src" value="http://www.youtube.com/v/5yB3n9fu-rM"&gt;&lt;embed height="350" width="425" src="http://www.youtube.com/v/5yB3n9fu-rM" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;So what does this all mean for India?&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In his &lt;/span&gt;&lt;a href="http://www.youtube.com/watch?v=Wl5OQz0Ko8c"&gt;&lt;span&gt;keynote speech at the 29th Chaos Communications Congress&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Jacob Appelbaum stated that surveillance should be an issue which concerns “everyone´s department”, especially in light of the NSA spying on citizens all over the world. True, the U.S. appears to have &lt;/span&gt;&lt;a href="http://space.jpl.nasa.gov/msl/Programs/corona.html"&gt;&lt;span&gt;a history in spying on civilians&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and the Corona, Argon, and Lanyard satellites used by the U.S. for photographic surveillance from the late 1950s is proof of that. But how does all this affect India?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;By &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=1&amp;amp;"&gt;&lt;span&gt;tapping into the servers of some of the biggest Internet companies in the world,&lt;/span&gt;&lt;/a&gt;&lt;span&gt; such as Google, Facebook and Microsoft, the NSA does not only gain access to the data of American users, but also to that of Indian users. In fact, the “global heat map” of the controversial &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt; data mining tool clearly shows that India ranked 5th worldwide in terms of intelligence gathering, which means that not only is the NSA spying on Indians, but that it is also spying on India more than most countries in the world. Why is that a problem?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;India has no privacy law. India lacks privacy legislation which could safeguard citizens from potential abuse by different types of surveillance. But the worst part is that, even if India did have privacy laws, that would still not prevent the NSA from tapping into Indians´ data through the servers of Internet companies, such as Google. Moreover, the fact that India lacks a Privacy Commissioner means that the country lacks an expert authority who could address data breaches. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Recent reports that the NSA is tapping into these servers ultimately means that the U.S. government has access to the data of Indian internet users. However, it remains unclear how the U.S. government is handling Indian data, which other third parties may have access to it, how long it is being retained for, whether it is being shared with other third parties or to what extent U.S. intelligence agencies can predict the behaviour of Indian internet users through pattern matching and data mining. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Many questions remain vague, but one thing is clear: through the NSA´s total surveillance programme, the U.S. government can potentially control the data of billions of internet users around the world, and with this control arises the possibility of oppression. It´s not just about the U.S. government having access to Indians´ data, because access can lead to control and according to security expert, &lt;/span&gt;&lt;a href="http://www.wired.com/politics/security/commentary/securitymatters/2008/05/securitymatters_0515"&gt;&lt;span&gt;Bruce Schneier&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;span&gt; “Our data reflects our lives...and those who control our data, control our lives”. &lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How are Indians supposed to control their data, and thus their lives, when it is being stored in foreign servers and the U.S. has the “right” to tap into that data? The NSA leaks mark a significant point in our history, not only because they are resulting in &lt;/span&gt;&lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;&lt;span&gt;corporations seeking data request transparency&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, but also because they are unveiling a major global issue: surveillance is a fact and can no longer can be denied. The massive, indiscriminate collection of Indians´ data, without their prior knowledge or consent, and without the provision of guarantees in regards to how such data is being handled, poses major threats to their right to privacy and other human rights. The potential for abuse is real, especially since &lt;/span&gt;&lt;a href="http://www.statsoft.com/textbook/data-mining-techniques/"&gt;&lt;span&gt;the larger the database, the larger the probability for error&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Mining more data does not necessarily increase security; on the contrary, it increases the potential for abuse, especially since &lt;/span&gt;&lt;a href="http://dspace.flinders.edu.au/xmlui/bitstream/handle/2328/26269/wahlstrom%20on%20the%20impact.pdf;jsessionid=D948EDED21805D871C18E6E4B07DAE14?sequence=1"&gt;&lt;span&gt;technology is not infallible &lt;/span&gt;&lt;/a&gt;&lt;span&gt;and data trails are not always accurate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What does this mean? Well, probably the best case scenario is that an individual is targeted. The worst case scenario is that an individual is imprisoned (or maybe even &lt;/span&gt;&lt;a href="http://www.time.com/time/world/article/0,8599,2097899,00.html"&gt;&lt;span&gt;murdered - remember the drones&lt;/span&gt;&lt;/a&gt;&lt;span&gt;?) because his or her data “says” that he or she is guilty. Is that the type of world we want to live in?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;What can we do now?&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Let´s start from the basics. India needs privacy legislation. India needs privacy legislation now. India needs privacy legislation now, more than ever.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Privacy legislation would regulate the collection, access to, sharing of, retention and disclosure of all personal data within India. Such legislation could also regulate surveillance and the interception of communications, in compliance with the right to privacy and other human rights. A Privacy Commissioner would also be established through privacy legislation, and this expert authority would be responsible for overseeing the enforcement of the Privacy Act and addressing data breaches. But clearly, privacy legislation is not enough. The various privacy laws of European countries have not prevented the NSA from tapping into the servers of some of the biggest Internet companies in the world and from gaining access to the data of millions of citizens around the world. Yet, privacy legislation in India should be a basic prerequisite to ensure that data is not breached within India and by those who may potentially gain access to Indian national databases.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;As a next- but immediate- step, the Indian government should demand answers from the NSA to the following questions:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What type of data is collected from India and which parties have access to it?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How long is such data retained for? Can the retention period be renewed and if so, for how long?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Is data collected on Indian internet users shared with third parties? If so, which third parties can gain access to this data and under what conditions? Is a judicial warrant required?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In addition to the above questions, the Indian government should also request all other information relating to Indians´ data collected through the PRISM programme, as well as proceed with a dialogue on the matter. Governments are obliged to protect their citizens from the abuse of their human rights, especially in cases when such abuse may occur from foreign agencies. Thus, the Indian government should ensure that the future secret collection of Indians´ data is prevented and that Internet companies are transparent and accountable in regards to who has access to their servers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;On an individual level, Indians can protect their data by using encryption, such as &lt;/span&gt;&lt;a href="http://www.gnupg.org/"&gt;&lt;span&gt;GPG encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for their emails and &lt;/span&gt;&lt;a href="https://www.encrypteverything.ca/index.php/Setting_up_OTR_and_Pidgin"&gt;&lt;span&gt;OTR encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for instant messaging. &lt;/span&gt;&lt;a href="https://www.torproject.org/"&gt;&lt;span&gt;Tor&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is free software and an open network which enables online anonymity by bouncing communications around a distributed network of relays run by volunteers all around the world. Tor is originally short for “The Onion Router” and “onion routing” refers to the layers of encryption used. In particular, data is encrypted and re-encrypted multiple times and is sent to randomly selected Tor relays. Each relay decrypts a “layer” of encryption to reveal it only to the next relay in the circuit and the final relay decrypts the last “layer” of encryption. Essentially, Tor reduces the possibility of original data being understood in transit and conceals the routing of it.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;To avoid surveillance, the use of &lt;/span&gt;&lt;a href="https://www.eff.org/https-everywhere"&gt;&lt;span&gt;HTTPS-Everywhere&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the &lt;/span&gt;&lt;a href="https://www.torproject.org/download/download-easy.html"&gt;&lt;span&gt;Tor Browser&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is recommended, as well as the use of combinations of additional software, such as &lt;/span&gt;&lt;a href="https://addons.mozilla.org/en-us/thunderbird/addon/torbirdy/"&gt;&lt;span&gt;TorBirdy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.enigmail.net/home/index.php"&gt;&lt;span&gt;Enigmail&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, OTR and &lt;/span&gt;&lt;a href="https://joindiaspora.com/"&gt;&lt;span&gt;Diaspora&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;a href="https://blog.torproject.org/blog/prism-vs-tor"&gt;&lt;span&gt;Tor hidden services are communication endpoints &lt;/span&gt;&lt;/a&gt;&lt;span&gt;that are resistant to both metadata analysis and surveillance, which is why they are highly recommended in light of the NSA´s surveillance. An XMPP client that ships with an XMPP server and a Tor hidden service is a good example of how to avoid surveillance.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Protecting our data is more important now than ever. Why? Because global, indiscriminate, mass data collection is no longer a hypothesis: it´s a fact. And why is it vital to protect our data? Because if we don´t, we are ultimately sleepwalking into our control and oppression where basic human rights, such as freedom, would be a myth of the past.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; formulated by the Electronic Frontier Foundation and Privacy International on communication surveillance should be taken into consideration by governments and law enforcement agencies around the world. In short, these &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Limitations to the right to privacy must be prescribed by law&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legitimate purpose&lt;/b&gt;: Access to communications or communications metadata should be restricted to authorised public authorities for investigative purposes and in pursuit of a legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Access to communications or communications metadata by authorised public authorities should be restricted to strictly and demonstrably necessary cases&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should be restricted from adopting or implementing measures that allow access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Competent authority&lt;/b&gt;: Authorities must be competent when making determinations relating to communications or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments must respect and guarantee an individual's human rights, that may interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: Service providers are responsible for the secure transmission and retention of communications data or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: Mutual legal assistance processes between countries and how they are used should be clearly documented and open to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should ensure that authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Applying these above principles is a prerequisite, but may not be enough. Now is the time to resist unlawful and non-transparent surveillance. Now is the time for &lt;/span&gt;&lt;span&gt;everyone &lt;/span&gt;&lt;span&gt;to fight for their right to be free.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Is a world without freedom worth living in?&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance'&gt;https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-06T10:20:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook">
    <title>Govt mulls advisory on privacy issues related to Google, Facebook</title>
    <link>https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook</link>
    <description>
        &lt;b&gt;The Government is set to harden its stand against foreign Internet firms in asking them to comply with Indian laws. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by Thomas K Thomas was &lt;a class="external-link" href="http://www.thehindubusinessline.com/industry-and-economy/info-tech/govt-mulls-advisory-on-privacy-issues-related-to-google-facebook/article4800901.ece?ref=wl_industry-and-economy"&gt;published in the Hindu Business Line&lt;/a&gt; on June 10, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to a top Government source, an advisory may be issued in the  interest of general public to make them aware of the privacy issued  while using services offered by foreign Internet companies such as  Google and Facebook.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This follows an international media expose on how US agencies were  getting access to user data from Internet companies such as Google and  Facebook.&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Final Strategy Soon&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Top official in the Ministry of Telecom and IT told &lt;i&gt;Business Line&lt;/i&gt; that the National Security Advisor, under the Prime Minister’s Officer,  is discussing the issue and will outline the final strategy on  Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key concern is that the US security agencies may have collected data  from key Indian accounts using services from any of the Internet  companies. A number of Government officials also use email service from  Google and MS Outlook, which may have been accessed by the US agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other major concern is that Indian security agencies have also been  seeking access to data from these foreign companies but so far they have  not obliged on grounds that they do not come under the purview of  Indian laws.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“If the US Government can get access to data from these companies, why  can’t the Indian Government be given access,” posed a top functionary of  the telecom ministry.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While Google and other companies have denied knowledge to how the US  agencies got access to their networks, industry experts said that it’s  time India starts taking concrete steps to address the issue.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;B.K. Syngal, Former Chairman, Videsh Sanchar Nigam Ltd, said, “If we  believed that our privacy is sacred then we would have taken effective  domestic measures, years ago, to ensure that the information of our  citizens remains private. To now say that multiple US companies have  betrayed our trust is meaningless.”&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Double Standards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Syngal said that there are double standards in the way organisations and  Government is handling the issue. “As a start, lets stop giving too  much time and space to the so called “Foreign Funded NGOs” teaching us  on privacy. Our problem is that we are not China. We are so ill equipped  that the third party interests aided and abetted by these NGOs would  prevail,” said Syngal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sunil Abraham, Executive Director, Centre for Internet and  Society, companies such as Google and Facebook are foes when it comes to  privacy issues and friends when it comes to freedom of speech. “An  Indian consumer using any of these foreign websites has no privacy  rights whatsoever. The Indian Government also cannot force these  companies to follow Indian laws,” said Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook'&gt;https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-02T14:31:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access">
    <title>Facebook, Google deny spying access</title>
    <link>https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access</link>
    <description>
        &lt;b&gt;The CEOs of Facebook and Google on Saturday categorically denied that the US National Security Agency had "direct access" to their company servers for snooping on Gmail and Facebook users. But both acknowledged that the companies complied with the 'lawful' requests made by the US government and shared user data with sleuths.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Javed Anwer was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-09/internet/39849496_1_facebook-ceo-mark-zuckerberg-user-data-ceo-larry-page"&gt;published in the Times of India&lt;/a&gt; on June 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a post titled "What the ...?" Google's official blog, CEO &lt;a href="http://timesofindia.indiatimes.com/topic/Larry-Page"&gt;Larry Page&lt;/a&gt; wrote, "We have not joined any program that would give the US  governmentâ€”or any other governmentâ€”direct access to our servers. We  had not heard of a program called PRISM until yesterday."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few hours later, Facebook CEO &lt;a href="http://timesofindia.indiatimes.com/topic/Mark-Zuckerberg"&gt;Mark Zuckerberg&lt;/a&gt; responded. "Facebook is not and has never been part of any program to  give the US or any other government direct access to our servers... We  hadn't even heard of PRISM before yesterday," he wrote on his page at  the social media site.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a few PowerPoint slides  allegedly leaked by an NSA official, nine technology companies - Google,  AOL, Apple, Yahoo, Microsoft, Skype, Facebook, YouTube and PalTalk -  are providing the US government easy access to user data. While all  companies have denied being part anything called PRISM, Facebook and  Google have been most vocal about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few hours after Facebook  and Google statements, the New York Times said in a report that  technology companies had "opened discussions with national security  officials about developing technical methods to more efficiently and  securely share the personal data of foreign users".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In some cases, they (companies) changed their computer systems to do so," noted the NYT report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statements by the CEOs have done little to allay privacy fears.  "The denials from the companies look highly coordinated, including  similar phrases in all their responses. I don't think they are lying  outright, though the NYT report suggests that they are telling a  half-truth. They may not provide the US government 'direct access' to  all their servers, but may be providing indirect access, or may just be  responding to very broad FISA orders," said Pranesh Prakash, a policy  director with Centre for Internet and Society in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Friday US president &lt;a href="http://timesofindia.indiatimes.com/topic/Barack-Obama"&gt;Barack Obama&lt;/a&gt; had tacitly acknowledged NSA surveillance programmes aimed at non-US  citizens. "You can't have a hundred per cent security and also then have  a hundred per cent privacy and zero inconvenience. You know, we're  going to have to make some choices as a society," he told reporters in  the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Page and Zuckerberg also called on the governments to be  more open about surveillance programmes. "The level of secrecy around  the current legal procedures undermines the freedoms we all cherish,"  wrote Page.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Added Zuckerberg, "We strongly encourage all  governments to be much more transparent about all programs aimed at  keeping the public safe. It's the only way to protect everyone's civil  liberties and create the safe and free society we all want over the long  term."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access'&gt;https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-07-02T10:18:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism">
    <title>Internet firms deny existence of PRISM</title>
    <link>https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism</link>
    <description>
        &lt;b&gt;Nothing is private anymore. According to a leak in the US, which revealed the wide reach of a mass surveillance programme by intelligence agencies, messages, posts, chats on your computer or phone are all vulnerable to interception, thanks to direct access to servers of major tech companies.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Javed Anwer and Ishan Srivastava was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-08/internet/39833419_1_assistance-treaty-user-data-personal-data"&gt;published in the Times of India&lt;/a&gt; on June 8, 2013. Sunil Abraham and Pranesh Prakash are quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The existence of the programme, called Prism, was first reported by the  Washington Post and the Guardian newspaper after they received a tip-off  from a whistleblower in &lt;a href="http://timesofindia.indiatimes.com/topic/National-Security-Agency"&gt;National Security Agency&lt;/a&gt; in the US. The whistleblower claimed that NSA has direct access to all  the data that flows through the servers of Google, Facebook, Microsoft,  Apple, Sykpe, &lt;a href="http://timesofindia.indiatimes.com/topic/YouTube"&gt;Youtube&lt;/a&gt;, AOL and Paltalk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Later, the NSA reportedly acknowledged the existence of the  programme but said that it collected data only from foreign nationals.  While it may come as a relief to the US citizens, it underscores the  fact that people not residing in the US, including Indians, are fair  game. What is even more alarming is the fact that US authorities are  using the technology companies headquartered in the country to spy on &lt;a href="http://timesofindia.indiatimes.com/topic/The-Rest-%28musician%29"&gt;the rest&lt;/a&gt; of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All companies named in the leaks have denied the existence of Prism. A  Yahoo spokesperson said on Friday, ""Yahoo! takes users' privacy very  seriously. We do not provide the government with direct access to our  servers, systems, or network."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy International, a privacy  watchdog organisation, said it is possible that companies would not be  aware of the government tapping into their servers. "Until we know  whether this information was obtained through filters, interception, or  some another method, it is difficult to know how the breadth of access  the NSA has."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Indian users would seem to have no way to defend themselves if the &lt;a href="http://timesofindia.indiatimes.com/topic/US-Government"&gt;US government&lt;/a&gt; wants to access their data. Pavan Duggal, a specialist in cyber law,  said, "Indian users don't have any protection against the US authorities  seeking their data from the US companies."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technology companies said they comply with local laws while dealing  with issues related to personal data of a user. In response to queries  from TOI, both Google and Facebook said that they used "mutual legal  assistance treaty" to handle international requests for data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mutual legal assistance treaty is understood to have governed by actual  treaties that two nations may have between them for sharing of user  data. A Facebook official said that if a US agency wanted to access the  data belonging to an Indian citizen, the sleuths would have to follow  the diplomatic channels and get the data only when Indian authorities  have approved it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google too talked "mutual legal assistance  treaty" but it didn't clarify how it worked. Google officials pointed  out the company guidelines which noted that any non-US government agency  would have to use mutual legal assistance treaty to access user data.  But the company public guidelines don't make any mention of the  procedure followed in the cases where a US agency requests data on  non-US users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft directed TOI to its official statement  denying the existence of Prism. It refused to discuss how it handled the  requests from US authorities seeking data of foreigners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a policy director with Centre for Internet and Society (CIS), said that it was high time the &lt;a href="http://timesofindia.indiatimes.com/topic/Indian-Government"&gt;Indian government&lt;/a&gt; stood up for its citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Indian government needs to come with a strong and clear law to protect  the privacy of Indian users. The law has to make it clear to companies  operating in India that they need to respect the privacy of Indian  users, even when they are dealing with the governments outside India,"  he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, providing direct access to servers to an agency like NSA  may not necessarily be a breach of agreement between the users of  websites like Google and Facebook and its owners. Sunil Abraham,  executive director at CIS said, "I have not studied end-user agreements  carefully, but usually they have provisions for communication  interception and data access in accordance with legal procedure."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"But more importantly, this is a violation of US data access and  interception law. The US government has been going around the world  preaching Internet freedom to authoritarian regimes. And now it turns  out that their practices are worse that many of the regimes they have  been criticizing. That is why it is a complete &lt;a href="http://timesofindia.indiatimes.com/topic/Scandal"&gt;scandal&lt;/a&gt;," Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, the surveillance may run contrary to a whole range of  international legal instruments. For example, the ICCPR, ratified by the  USA, says that "no one shall be subject to arbitrary or unlawful  interference with his private life, family, home or correspondence,"  said Joe McNamee, executive director of European Digital Rights, a  privacy watchdog based in Europe.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism'&gt;https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T07:47:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system">
    <title>Indian Government Quietly Brings In Its 'Central Monitoring System': Total Surveillance Of All Telecommunications</title>
    <link>https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system</link>
    <description>
        &lt;b&gt;There's a worrying trend around the world for governments to extend online surveillance capabilities to encompass all citizens -- often justified with the usual excuse of combatting terrorism and/or child pornography.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.techdirt.com/articles/20130508/09302923002/indian-government-quietly-brings-its-central-monitoring-system-total-surveillance-all-communications.shtml"&gt;published in &lt;b&gt;tech dirt&lt;/b&gt;&lt;/a&gt; on June 8, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The latest to join this unhappy club is India, which has put in place what sounds like &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms"&gt;a massively intrusive system&lt;/a&gt;, as this article from The Times of India makes clear:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;The government last month quietly began rolling out a  project that gives it access to everything that happens over India's  telecommunications network -- online activities, phone calls, text  messages and even social media conversations. Called the Central  Monitoring System, it will be the single window from where government  arms such as the National Investigation Agency or the tax authorities  will be able to monitor every byte of communication.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;This project has been under development for two years, but in almost total secrecy:  &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;"In the absence of a strong privacy law that promotes  transparency about surveillance and thus allows us to judge the utility  of the surveillance, this kind of development is very worrisome," warned  Pranesh Prakash, director of policy at the Centre for Internet and  Society. "Further, this has been done with neither public nor  parliamentary dialogue, making the government unaccountable to its  citizens."&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt; That combination of total surveillance and zero transparency is a  dangerous one, providing the perfect tool for monitoring and controlling  political and social dissent.  If India wishes to maintain its claim to  be "the world's largest democracy", its government would do well to  introduce some safeguards against abuse of the new system, such as  strong privacy laws, as well as engaging the Indian public in an open  debate about &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;what exactly such extraordinary surveillance powers might be used for&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system'&gt;https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-02T09:12:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta">
    <title>Governance in the Age of the Internet and Free Trade Agreements</title>
    <link>https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at this event organized by Thai Netizen Network on June 8, 2013 at Queen Sirikit National Convention Center. The Ministry of Information and Communication  and the National Science and Technology Development Agency were co-hosts for the event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://internetsociety.org/inet-bangkok/"&gt;Click to read the details of the event published on Internet Society website&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the age of accelerated international trade and the promotion of free  flowing cross-border data transactions, countries and regions are  working towards forming a commonly agreed modus operandi and protocols.  These protocols seek to facilitate the growth of e-trade, ensure a  secure data flow(economic transactions) and protection of its data in  the network. In the recent, there has been strong attention by consumers  and businesses with the growing scope and content of these agreements  addressing Intellectual Property (IP). Emerging trend studies show that  there is a growing practices to incorporate mutually exclusive  arrangements without involving other stakeholders which happens in  closed door negotiations i.e. government to government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the European’s Anti-Counterfeiting Trade Agreement  (ACTA) proposal and the U.S. Trans-Pacific Partnership Agreement (TPP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bigger concern raised by other stakeholders has been the secrecy  of these arrangements and the insufficient protection of consumers and  citizens rights in its consideration. So far, the lack of legitimacy and  proportionality of legal policy measures has created unintended  consequences and collateral damages in far reaching manners whether  socially, economically or technologically. Citing practices of filtering  technology, deep packet inspection, and Internet cut-off, are  introduced by internet service providers to meet legal requirements.  Activities in question may vary from country to country, some focus on  violations of intellectual property, some on the control of political  voices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notably, list of concerns have been raised explicitly by UN Special  Rapporteur to adhere to the promotion and protection of the right to  freedom of opinion and expression were recommended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This workshop is aim to create discussion on the related topics among  stakeholders both in Thailand and in the region of the direct and  indirect implications of various developments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Target:&lt;/b&gt; Regulators, consumer rights, human rights activities, Lawyers&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Expected Outcomes&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Understanding the dynamics of free trade agreements (i.e. APEC, TPP,  and    ACTA) and its implications on Internet regulations, national  sovereignty, and civil rights from various perspectives. (Big picture)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Basic understanding of how various policy and technology related  measures or solutions (i.e. digital rights management technology and  deep-packet inspection) are used to address Intellectual Property (IP)  and how it directly impacts freedom of expression and individual  privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Looking Ahead: The developments and upcoming legislations/regulation  challenges in both Thailand and the region i.e. new draft of  Computer-related Crime Act, new draft of Copyright Act, and the Personal  Data Protection Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li&gt;Konstantinos Komaitis, Policy Advisor, Internet Society, Geneva&lt;/li&gt;
&lt;li&gt;Nakorn Serirak, Policy Advisor, Thai Netizen Network, Bangkok&lt;/li&gt;
&lt;li&gt;Sawatree Suksri, Lecturer, Faculty of Law, Thammasat University, Bangkok&lt;/li&gt;
&lt;li&gt;Lokman Tsui, Policy Advisor, Google Asia Pacific, Hong Kong&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Moderator&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Mike Hayes, Chair, International MA Program in Human Rights, Mahidol University&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click the PDFs below to download the full details and the presentation:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/governance-in-the-age-of-internet-and-fta.pdf" class="internal-link"&gt;Governance in the Age of the Internet and Free Trade Agreements&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/internet-and-open-public-data-ppp.pdf" class="internal-link"&gt;Internet and Open Public Data&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta'&gt;https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-07-03T05:04:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/section-66-it-act.txt">
    <title>Computer Related Offences</title>
    <link>https://cis-india.org/internet-governance/resources/section-66-it-act.txt</link>
    <description>
        &lt;b&gt;If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Explanation&lt;br /&gt;&lt;/b&gt;For the purposes of this section,&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;the word “dishonestly” shall have the meaning assigned to it in section 24 of the Indian Penal Code;&lt;/li&gt;
&lt;li&gt;the word “fraudulently” shall have the meaning assigned to it in section 25 of the Indian Penal Code.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/section-66-it-act.txt'&gt;https://cis-india.org/internet-governance/resources/section-66-it-act.txt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-07T10:47:36Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/section-43-it-act.txt">
    <title>Section 43 of the Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/resources/section-43-it-act.txt</link>
    <description>
        &lt;b&gt;Given below is the text of section 43 of the IT Act:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;43. &lt;b&gt;Penalty and compensation for damage to computer, computer system, etc&lt;/b&gt;.&lt;br /&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network, or computer resource —&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;accesses or secures access to such computer, computer system or computer network; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;disrupts or causes disruption of any computer, computer system or computer network; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, he shall be liable to pay damages by way of compensation to the person so affected. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;steel, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;i&gt;Explanation&lt;/i&gt;.&lt;br /&gt;For the purposes of this section:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;"computer contaminant" means any set of computer instructions that are designed —&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or&lt;/li&gt;
&lt;li&gt;by any means to usurp the normal operation of the computer, computer system, or computer network;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"computer data base" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, daia or instruction is executed or some other event takes place in that computer resource;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"computer source code" means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/section-43-it-act.txt'&gt;https://cis-india.org/internet-governance/resources/section-43-it-act.txt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-07T10:37:04Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation">
    <title>‘Hacking’ sparks row over exam evaluation</title>
    <link>https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation</link>
    <description>
        &lt;b&gt;Over the past two days, Cornell University student Debarghya Das’ blog post on ‘Hacking the Indian Education System’ has kicked off a debate across the country over the security of data published online and the practice of moderation of marks obtained by school students in board examinations. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Vasudha Venugopal and Karthik Subramanian was &lt;a class="external-link" href="http://www.thehindu.com/news/national/hacking-sparks-row-over-exam-evaluation/article4788750.ece"&gt;published in the Hindu&lt;/a&gt; on June 7, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The 20-year-old Cornell student extracted large amounts of class X and  XII student results from a website that hosted the ICSE results using an  automated program. Over 1,760 schools are affiliated to the ICSE and  more than 1.2 lakh students took the board exams. Based on  interpretation of the data sets, he raised allegations of large-scale  “tampering” of marks by the authorities, ostensibly to maintain a  healthy graph on the results.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Information Security experts said what the student did could not be  viewed as a major security breach as much as it was exploiting a  loophole. “Anyone with basic programming skills will be able to pull it  off,” said Pranesh Prakash, policy director at the Bangalore-based  Center for Internet and Society. “There are add-ons available on popular  internet browers that allow users to read the embedded codes on a  website and run programs to mine data.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Government websites are most susceptible to loopholes because too many  people use them, says Nitesh Betala, Chennai coordinator of Null, a  community of programmers that meets regularly to explore these loopholes  in public domain websites. “We inform the system administrators  directly hoping that they would plug loopholes before others exploit  them.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Debarghya too explained on his blog (deedy.quora.com) on Thursday that  what he did was not illegal. “I did not illegally access any database  system. All I did was access information that was available to any  person who entered a number into the website could access. I simply  mined the data.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The ICSE council, on its part, said it does not publish the examination  results in an online manner on its website. Instead, hard copies of  results are despatched to schools. But the results are disseminated to  third parties such as media organisations.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Krupakar Manukonda, who runs a blog on education for the not-for-profit  organisation Takshashila, said: “The online results of all the boards  have serious privacy problems. I think the respective boards should  issue a passcode along with a hall ticket or entering Date of Birth,  First name and Last name should be made mandatory to access marks.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Das deduced after much data crunching and statistical analysis that the  “marks had been tampered with”. His claim is supported by graphs  purporting to show that nearly 33 scores, such as 91, 92, 86 and so on,  were never awarded to any student.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, teachers deny the allegation. “The word tampering is wrong.  There is moderation that happens across education boards,” explained a  teacher, who has worked with ICSE schools in Hyderabad and Chennai.  “After the first round of corrections, raw data is given to officials  and head examiners who analyse how students have performed. They try to  ensure the bell curve of the results does not look awkward. If it does,  the implication is that the checking has been either too liberal or very  strict.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;After the first moderation, there is a final moderation which is often  done by a different set of teachers. “There are some instructions given  to us earlier, and some changes made later, depending on analysis by the  board,” said a teacher. Teachers are not told about moderation methods  in both CBSE and ICSE boards.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The ICSE council says that it does follow the practice of moderation.  “In keeping with the practice followed by examination conducting bodies,  a process of standardisation is applied to the results, so as to take  into account the variations in difficulty level of questions over the  years (which may occur despite applying various norms and yardsticks),  as well as the marginal variations in evaluation of answer scripts by  hundreds of examiners (inter-examiner variability), for each subject.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Some teachers are however puzzled by the findings. “It is understandable  that there are many 35s because a student on the verge of passing, is  often pushed to the mark. But I don’t understand why there are no 85,  87, 89, 91 and 93. And, with cut throat competition for every single  mark in colleges, teachers are very careful, especially with top scoring  papers,” said another senior teacher.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation'&gt;https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T08:58:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas">
    <title>Indian student in Cornell University hacks into ICSE, ISC database</title>
    <link>https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas</link>
    <description>
        &lt;b&gt;A 20-year-old Indian student from Cornell University hacked into the database of ICSE (Class X) and ISC (Class XII) school exam results, exposed glaring anomalies in the marking system and went on to merrily write about his exploits in an online post.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Kim Arora was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-06/security/39787770_1_cisce-icse-gerry-arathoon"&gt;published in the Times of India&lt;/a&gt; on June 6, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Kolkata-born Debarghya Das, majoring in computer science, says that all  he had to do was run a simple program that entered all roll numbers  after defining a range to get access to all the results. "It is shocking  they haven't implemented a more secure system," Das told TOI on phone  from New York.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the result's data was crunched, analysed and plotted in  graphs, Das discovered an interesting incongruity in the marking system:  there are 33 different scores unattained between the passing mark of 35  and the maximum of 100 by the nearly 1,50,000 who appeared for the ICSE  (Class X) exam. According to Das' findings, not a single student got  the following marks: 36, 37, 39, 41, 43, 45, 47, 49, 51, 53, 55, 56, 57,  59, 61, 63, 65, 67, 68, 70, 71, 73, 75, 77, 79, 81, 82, 84, 85, 87, 89,  91, 93. Similarly, in the case of ISC (Class XII exam) a set of 24  marks between 40 and 100 were found to be unattained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  contacted, chairperson of the CI SCE (Council for the Indian School  Certificate Examinations) Gerry Arathoon, refused to comment on both  data security and the unattained marks. "I can't say anything until I  have had a look at things myself," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Das says that the  missing marks indicate that perhaps they were tampered with. He offers  mathematical and statistical arguments to defend his position in his  online post. He says that the ISC anomaly appears to be a case of  awarding "grace marks" and writes -- "Everything from 35 onwards, and  most things from 23 onward seem blindly promoted to a pass mark."&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/VirtualReality.png" alt="Virtual Reality" class="image-inline" title="Virtual Reality" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Pranesh Prakash, policy director at the Center for Internet and Society,  says one needn't even be a techie to execute such a hack. "You don't  need real technical skills to do this. You just need to figure out the  ranges and feed them in. It is an interesting revelation that the  website does nothing to obfuscate the javascript for security, but one  can still retrieve data without that information. Once you have the  data, it requires two minutes of programming to get it in a spreadsheet," says Prakash. In his post, titled "Hacking into the Indian Education System", Das wrote that he was doing this to "demonstrate how few measures our education board takes to hide such sensitive information". &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The student also told the TOI that it wasn't possible to change any values in marks and upload fudged data again, and that he made any significant progress in this direction only about 3-4 days after the results were announced. His online post says he also has the data for CBSE class XII. Though he hasn't yet made it public, he does admit it was harder to crack than CISCE, though not altogether difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Schooled in Kolkata, Das is curren tly interning at Google, working on  YouTube's captioning system. He is also working on a tongue-controlled  game and has earlier been active in game and applet design. The idea to  hack the results came to him fo llowing a desire to help two close &lt;a href="http://timesofindia.speakingtree.in/topics/life/friends"&gt;friends&lt;/a&gt; who had recently taken the exams.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Das, nicknamed Deedy, told ToI that he worked on the ICSE and ISC  results off and on for a week, but it essentially took about 4-5 hours  to get all the data."It took me more time to write the blog post," says  Das, referring to his 19-page post with all the graphs, data and  explanations that is currently online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For Das, there was only one other takeaway from the whole exercise.  "Regardless of any tampering, it would be nice to see a transparent exam  scheme. SAT (Scholastic Assessment Test) publishes everything related  to the exam results every year. It is inconceivable that a national  level exam board doesn't do that," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas'&gt;https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T07:39:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/geo-politics-of-information-controls">
    <title>The Geopolitics of Information Controls: A Presentation by Masashi Crete-Nishihata</title>
    <link>https://cis-india.org/internet-governance/events/geo-politics-of-information-controls</link>
    <description>
        &lt;b&gt;Masashi Crete-Nishihata will give a talk on Citizen Lab's activities and present its approach to the study of information controls through recent research and case studies. The talk will be held on June 19, 2013 at TERI Auditorium in Bangalore, 5 p.m. to 7.30 p.m.&lt;/b&gt;
        &lt;h2&gt;The Citizen Lab&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Citizen Lab is an interdisciplinary research group based at the University of Toronto. It explores the intersection of&lt;br /&gt;information technology, global security, and human rights through technical, policy, and legal research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A central focus of Citizen Lab's research analyzes the prevalence, operation, and impact of information controls. Information controls can be conceptualized as actions conducted in and through the Internet and other information and communication technologies. Such controls seek to deny (as with Internet filtering), disrupt (as in denial-of-service&lt;br /&gt; attacks), or monitor (such as passive or targeted surveillance) information for political ends.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Masashi Crete-Nishihata&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Masashi is &lt;span style="text-align: -webkit-auto; "&gt;the  research manager of the Citizen Lab at the Munk School of Global  Affairs, University of Toronto. He has published work on information  controls during the 2008 Russia-Georgia conflict, cyber security  research ethics, cyber attacks against Burmese media groups, and the  psychosocial impacts of lifelogging technologies. His research interests  include technology policy, information controls, and human computer  interaction.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: -webkit-auto; "&gt;&lt;span style="text-align: -webkit-auto; "&gt;Relevant Links&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;&lt;span style="text-align: -webkit-auto; "&gt;&lt;a href="http://citizenlab.org/" target="_blank"&gt;http://citizenlab.org&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: -webkit-auto; "&gt;&lt;a href="http://citizenlab.org/publications/" target="_blank"&gt;http://citizenlab.org/publications/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: -webkit-auto; "&gt;&lt;a href="https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/" target="_blank"&gt;https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: -webkit-auto; "&gt;Please RSVP as seats are limited. &lt;br /&gt;RSVP: Purba Sarkar (&lt;a class="mail-link" href="mailto:purba@cis-india.org"&gt;purba@cis-india.org&lt;/a&gt;)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;span style="text-align: -webkit-auto; "&gt;&lt;b&gt;Video&lt;/b&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/FEwPtSYdm4Q" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/geo-politics-of-information-controls'&gt;https://cis-india.org/internet-governance/events/geo-politics-of-information-controls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-26T09:56:01Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/may-2013-bulletin">
    <title>May 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/may-2013-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) welcomes you to the fifth issue of its newsletter for 2013. We bring you an overview of our research, report of events held by us and announcement of upcoming ones, events we participated in, and recent media coverage.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis"&gt;Celebrating 5 Years of CIS&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;CIS is now 5 years old and we just celebrated this by holding an open exhibition in our offices in Bangalore and Delhi from May 20 to 23, showcasing our work and accomplishments over the period. We had about 170 visitors from the general public coming in to our office. Renowned artists like Tara Kelton, Kiran Subbaiah, Navin Thomas, Abhishek Hazra and Sharath Chandra Ram exhibited their work. The four day event attracted press coverage: &lt;a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts"&gt;Bangalore Mirror&lt;/a&gt; (May 18, 2013), &lt;a href="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet"&gt;DNA&lt;/a&gt; (May 19, 2013), &lt;a href="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"&gt;Hindu&lt;/a&gt; (May 22, 2013), &lt;a href="https://cis-india.org/news/prajavani-may-24-2013-report-on-pavanaja-talk-at-cis"&gt;Prajavani&lt;/a&gt; (May 23, 2013), &lt;a href="https://cis-india.org/news/udayavani-may-25-2013-report-on-cis-5-years-celebration"&gt;Udayavani&lt;/a&gt; (May 25, 2013) and &lt;a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die"&gt;Bangalore Mirror&lt;/a&gt; (May 31, 2013). &lt;a href="https://cis-india.org/internet-governance/blog/cis-5-years-all-posters.zip"&gt;Download all posters that were part of the exhibition here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013"&gt;&lt;b&gt;Google Policy Fellowship&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;CIS is inviting applications for the Google Policy Fellowship programme. Google is providing a USD 7,500 stipend to the India fellow who will be selected by July 1, 2013. The Fellowship focus areas include Access to Knowledge, Openness in India, Freedom of Expression, Privacy, and Telecom. Send in your applications for the position by June 15, 2013.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt; CIS invites applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project), and &lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. One is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another for developing a screen reader and text-to- speech synthesizer for Indian languages. CIS is also working with the World Blind Union and other similar organisations to develop a Treaty for the Visually Impaired helped by the WIPO:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;br /&gt;&lt;/b&gt;Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapters on Sikkim and Odisha:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-sikkim-chapter-call-for-comments"&gt;The Sikkim Chapter&lt;/a&gt; (by Manojna Yeluri, May 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-odisha-call-for-comments"&gt;The Odisha Chapter&lt;/a&gt; (by Anandhi Viswanathan, May 31, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: &lt;i&gt;All of these are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Banking Accessibility&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/survey-on-banking-accessibility"&gt;Survey on Banking Accessibility&lt;/a&gt; (by Vrinda Maheshwari, May 30, 2013). G3ict is a survey on accessibility of financial services in banks for persons with disabilities around the world. The survey is available &lt;a href="http://www.surveygizmo.com/s3/1187917/Survey-on-Banking-Accessibility"&gt;here&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/global-accessibility-awareness-day-event"&gt;Global Accessibility Awareness Day&lt;/a&gt; (May 9, 2013, TERI, Southern Regional Centre, Domlur, Bangalore).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two year grant of INR 26,000,000 to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to Knowledge (Wikipedia)&lt;/b&gt;&lt;br /&gt;Beginning from September 1, 2012, Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of three members based in Bangalore: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and one team member &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt; who is working from Delhi office. &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;, Programme Officer has left the organisation. April 24, 2013 was her last working day.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/resources/access-to-knowledge-work-plan"&gt;Access to Knowledge Work Plan&lt;/a&gt; (April 2013 - June 2014): CIS has announced its detailed plan detailed plan with projection of outcomes and expected impact of the A2K programme activities. The document has been made in consultation with various stakeholders and keeping in mind the objectives, opportunities and challenges faced by each of the Indian language Wikimedia projects. Feel free to share any feedback.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;WMF-A2K Revised Budget (draft) and Utilization (Sept 2012 - Feb 2013): In our effort to increase transparency with the working of CIS-A2K programme, we are &lt;a href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Grant_Budget_and_Utilization_Sept12_-Feb13.pdf"&gt;sharing&lt;/a&gt; with you the A2K Programme Budget along with the Utilization for the period Sept. 2012 to February 2013. The proposed revisions to the budget along with some notes are &lt;a href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Revised_Budget_%28draft%29_and_Utilization_Sept_12-Feb_13.pdf"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Grant_Budget_and_Utilization_Sept12_-Feb13.pdf"&gt;WMF-A2K Grant Budget and Utilization&lt;/a&gt; (Sept 2012 – February 2013): CIS has given an open disclosure of the Access to Knowledge budget to Wikimedia India and the global community.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/cis-signs-mou-with-tiss"&gt;CIS Signs MOU with TISS, Mumbai&lt;/a&gt;: has signed a MoU with TISS as part of which we will collaboratively work towards building Digital Knowledge Partnerships with select higher education institutions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;India Access to Knowledge IRC can be accessed here: &lt;a href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/IRC/13th_May"&gt;May 13, 2013&lt;/a&gt; (All Language Discussion) and &lt;a href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/IRC/26th_May"&gt;May 26, 2013&lt;/a&gt; (Odia Language Discussion). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-needs-assessment"&gt;Odia Wikipedia: Needs Assessment&lt;/a&gt; (by Subhashish Panigrahi, May 11, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/access-to-knowledge-work-plan-synopsis-of-feedback-by-wikipedians"&gt;Access to Knowledge Work Plan: Synopsis of Feedback by Wikipedians&lt;/a&gt; (by Nitika Tandon, May 20, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-introductory-session"&gt;Wikipedia Introductory Session organized for Data and India portal consultants&lt;/a&gt; (by Subhashish Panigrahi, May 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop-udupi-april-29-2013"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (April 29, 2013, Govinda Pai Research Centre, MGM College Udupi). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/kannada-irc-meet-may-7-2013"&gt;Kannada IRC Meet&lt;/a&gt; (organised by the Wikipedia Community, May 7, 2013). Dr. U.B. Pavanaja participated in this.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/digital-humanities-for-indian-higher-education"&gt;Digital Humanities for Indian Higher Education&lt;/a&gt; (co-organised in collaboration with HEIRA-CSCS, Tumkur University, CILHE-TISS and CCS (IISc), Indian Institute of Science, Bangalore, July 13, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Press Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/prajavani-may-24-2013-report-on-cis-celebrates-5-years"&gt;CIS Celebrates 5 Years: A Report in Prajavani&lt;/a&gt; (Prajavani, May 23, 2013). Prajavani published a report of Dr. U.B. Pavanja’s talk “From Palm Leaf to Tablet – Journey of Kannada”.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/udayavani-may-25-2013-cis-celebrates-5-years"&gt;CIS Celebrates 5 Years: A Report in Udayavani&lt;/a&gt; (Udayavani, May 25, 2013). Udayavani published a report of the evening programme hosted as part of the Centre for Internet and Society's 5 year celebrations in its Bangalore edition.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Access to Knowledge (Previously IP Reforms)&lt;/span&gt;&lt;br /&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/unfortunate-rise-of-india-slapp-suit"&gt;On the Unfortunate Rise of the Indian SLAPP Suit&lt;/a&gt; (by Ujwala Uppaluri, May 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;Research Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/current-science-vol-101-10-1287-s-gunasekharan-s-arunachalam-use-of-open-access-journals-by-indian-researchers"&gt;Use of Open Access Journals by Indian Researchers&lt;/a&gt; (by Subbiah Gunasekharan and Prof. Subbiah Arunachalam, May 27, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/use-made-of-open-access-journals-by-indian-researchers-to-publish-their-findings"&gt;Use made of Open Access Journals by Indian Researchers to Publish their Findings&lt;/a&gt; (by Madhan Muthu and Prof. Subbiah Arunachalam, May 28, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Comments&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/comments-on-draft-icar-open-access-policy"&gt;Draft ICAR Open Access Policy&lt;/a&gt; (by Nehaa Chaudhari, May 28, 2013). The comments were submitted to the Indian Council for Agricultural Research.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Hosted&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/rhok-bangalore-2013"&gt;RHoK Global Event&lt;/a&gt; (Centre for Internet and Society, Bangalore, June 1 – 2, 2013). A report of the event would be published soon.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes. We began two new projects earlier this year. The first one, with Privacy International, London to facilitate research and events around surveillance, and freedom of speech and expression and the second one with Citizen Lab, Munk School of Global Affairs, University of Toronto on mapping of cyber security actors in South Asia and South East Asia:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cyber Stewards Project&lt;/b&gt;&lt;br /&gt;Laird Brown, a strategic planner and writer with core competencies on brand analysis, public relations and resource management and Purba Sarkar who in the past worked as a strategic advisor in the field of SAP Retail are working in this project.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Video Interview&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian"&gt;An Interview with Christopher Soghoian&lt;/a&gt; (May 28, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/events/geo-politics-of-information-controls"&gt;The Geopolitics of Information Controls: A Presentation by Masashi Crete-Nishihata&lt;/a&gt; (TERI, Bangalore, June 19, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world"&gt;Comparative Analysis of DNA Profiling Legislations from Across the World&lt;/a&gt; (by Srinivas Atreya, May 23, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting"&gt;3rd Privacy Round Table meeting&lt;/a&gt; (co-organised with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India, Chennai, May 18, 2013). Maria Xynou participated in this event and gives an overview of the discussions and recommendations.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore"&gt;Consilience – 2013&lt;/a&gt; (co-organised with the Law and Technology Committee of National Law School of India University, Bangalore, May 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/towards-a-global-network-of-internet-and-society-cultures"&gt;ICT, Law and Innovation: Recent Developments, Challenges and Lessons Learned&lt;/a&gt; (organised by Bilgi University, Istanbul, May 2013). Chinmayi Arun was a speaker on the Internet Governance panel at Towards a Global Network of Internet and Society Centres.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;India’s Politics of Free Expression (co-sponsored by the Asian Studies Centre, Free Speech Debate, the Oxford India Society and Ideas for India Oxbridge Exchange, May 31, 2013 at Nissan Lecture Theatre, St. Antony’s College, Oxford). Chinmayi Arun was a speaker at the &lt;a href="https://cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures"&gt;Bapsybanoo Marchioness of Winchester Lectures&lt;/a&gt; on 'India's Politics of Free Expression'.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table-mumbai"&gt;Privacy Round Table, Mumbai&lt;/a&gt; (Mayfair Banquets, Mumbai, June 15, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers!&lt;/a&gt; (by Maria Xynou, May 2, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go"&gt;Sex on-the-go&lt;/a&gt; (by Anand Holla, Mumbai Mirror, May 4, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary"&gt;CIS anniversary&lt;/a&gt; (Hindu Business Line, May 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations"&gt;Central Monitoring System to make government privy to phone calls, text messages and social media conversations&lt;/a&gt; (by Indu Nandakumar, May 7, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator"&gt;Messaging apps find another foe in India’s market regulator&lt;/a&gt; (Quartz, May 8, 2013). Elonnai Hickok is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication"&gt;India's Rs 400-crore Central Monitoring System to snoop on all communication&lt;/a&gt; (Tech 2, May 9, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother"&gt;Is India's government becoming Big Brother?&lt;/a&gt; (by Talia Ralph and Jason Overdorf, May 9, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground"&gt;Worldwide Playground&lt;/a&gt; (Telegraph, May 15, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts"&gt;NGO invites public to peruse its accounts&lt;/a&gt; (by Vandana Kamath, May 18, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security"&gt;Online privacy should not come at the cost of security: Sunil Abraham&lt;/a&gt; (by Anirban Sen, May 19, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet"&gt;A lifetime of five years on the internet&lt;/a&gt; (by Subir Ghosh, DNA, May 19, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"&gt;CIS highlights changes ushered in by the Internet&lt;/a&gt; (Hindu, May 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/asian-correspondent-chan-myae-khine-may-22-2013-burma-to-host-internet-freedom-forum"&gt;Burma to host first Internet freedom forum&lt;/a&gt; (by Chan Myae Khine, Asian Correspondent, May 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/businesswire-may-30-2013-inet-bangkok-to-explore-internet-impact-on-thailand-economy-and-society"&gt;INET Bangkok to Explore Internet’s Impact on Thailand’s Economy and Society&lt;/a&gt; (BusinessWire, May 30, 2013). Sunil Abraham is participating in this conference. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die"&gt;Shooting cyber cafes before they die&lt;/a&gt; (by Bangalore Mirror, May 31, 2013). CIS’s film on Cyber Cafes is mentioned in this article.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;CIS in partnership with the Ford Foundation is executing a project on Internet Access. It covers the history of the internet, technologies involved, principle and values of internet access, broadband market and universal access and will touch upon various polices and regulations which has an impact on internet access and bodies and mechanism which are responsible for formulation policies related to internet access. The blog posts and modules will be published in a new website: &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Ongoing Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society"&gt;Institute on Internet and Society&lt;/a&gt; (supported by Ford Foundation, Golden Palms Resort, Bangalore, June 8 – 14, 2013). The &lt;a href="http://internet-institute.in/repository/agenda-revised-by-sv"&gt;agenda&lt;/a&gt; for the event has been finalised.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The following unit was published recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/network-connections-modes-of-access"&gt;Network Connections and Modes of Access&lt;/a&gt; (by Srividya Vaidyanathan, May 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility of telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/business-standard-may-9-2013-shyam-ponappa-configuring-a-non-toothless-trai"&gt;Configuring a 'Non-Toothless' Regulator&lt;/a&gt; (TRAI) (by Shyam Ponappa, Business Standard, May 9, 2013 and Organizing India Blogspot, May 10, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;br /&gt; &lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/may-2013-bulletin'&gt;https://cis-india.org/about/newsletters/may-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-08-13T11:51:46Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die">
    <title>Shooting cyber cafes before they die</title>
    <link>https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die</link>
    <description>
        &lt;b&gt;Working for an NGO, Christy Raj cans the history of city internet parlours through the eyes of a transgender. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Vandana Kamath's article was published in the &lt;a class="external-link" href="http://epaper.timesofindia.com/Default/Scripting/ArticleWin.asp?From=Archive&amp;amp;Source=Page&amp;amp;Skin=MIRRORNEW&amp;amp;BaseHref=BGMIR/2013/05/31&amp;amp;PageLabel=8&amp;amp;EntityId=Ar00800&amp;amp;ViewMode=HTML"&gt;Bangalore Mirror&lt;/a&gt; on May 31, 2013. The Centre for Internet and Society's film on Cyber Cafes is mentioned in this article.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At the turn of the century, when dotcoms were booming, cyber cafes were ubiquitous. But just as video killed the radio star, smartphones have been the slow death of cyber cafes. They may soon be history, but before internet parlours are wiped off the face of the city, Christy Raj, 26, a transgender, has ‘captured’ them for posterity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raj (female to male transgender) has single-handedly shot a film on cyber cafes, viewed from the eyes of a transgender. The film is part of a project by Video Volunteers,an NGO that promotes community media. Raj is a correspondent for the NGO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I wanted to capture what happens in a cyber café, especially from the point of view of a transgender,” Raj said. “I’ve captured why a transgender would go to a cyber café. It could be for various reasons like applying for a job. The film captures the difficulties a transgender faces etc. It’s a short film, but conveys a lot, especially for a viewer who sees it after cyber cafes have gone extinct in the city!”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raj admits that he had a tough time while shooting the movie. “We (actor and I) went to several cyber cafes to shoot the film,” Raj said. “Since my actor and I are both transgender, many gave us suspicious looks. Most refused to allow us to even enter the place, forget about shooting the film. We had to show our identity cards at several places and finally we got the opportunity to shoot in a cyber cafe.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The film, a joint venture of Centre for Internet and Society (CIS) and Video Volunteers, was completed in two weeks and the raw footage was sent to Video Volunteers based in Goa. The film was screened at their fifth anniversary celebrations recently. Raj, who has basic knowledge of camera handling, has been with the NGO since 2010 and has shot various short films on subjects like sexual minorities, the recent eviction of people in Ejipura and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Being a correspondent with Video Volunteers has given me an opportunity to work on mainstream issues and work with people from the mainstream. Prior to joining Video Volunteers, I was associated with NGOs like Samara and Sangama. We were given training in camera handling. They give us an opportunity to work on several issues based on the community.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raj was born and brought up in Bangalore. His parents abandoned him after they learnt of his transsexual tendencies and he had to drop out of school in the ninth standard. He lives with his partner in Sanjay Nagar.When he left his home, Raj decided he had to make a name in the community.“Today,Icanhandleacamera with confidence and conceptualise and make the films on issues pertaining not only to sexual minorities but also on several other issues,” says Raj.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die'&gt;https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-31T06:32:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures">
    <title>The Bapsybanoo Marchioness of Winchester Lectures</title>
    <link>https://cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures</link>
    <description>
        &lt;b&gt;Chinmayi Arun was a speaker at the Bapsybanoo Marchioness of Winchester Lectures on 'India's Politics of Free Expression' in the University of Oxford on May 31 2013, in the session on 'media and security'. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Asian Studies Centre, Free Speech Debate, the Oxford India Society and Ideas for India Oxbridge Exchange were the co-sponsors for this event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Theme: India's Politics of Free Expression&lt;br /&gt;Date: May 31, 2013&lt;br /&gt;Time: 10.00 a.m. to 6.15 p.m.&lt;br /&gt;Venue: Nissan Lecture Theatre, St. Antony's College, Oxford&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;More details can be found &lt;a class="external-link" href="http://www.sant.ox.ac.uk/asian/indlects.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures'&gt;https://cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-09T03:35:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security">
    <title>Online privacy should not come at the cost of security: Sunil Abraham</title>
    <link>https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security</link>
    <description>
        &lt;b&gt;Sunil Abraham, Centre for Internet and Society’s executive director, on privacy laws and Internet penetration.&lt;/b&gt;
        &lt;p&gt;Anirban Sen's article was &lt;a class="external-link" href="http://www.livemint.com/Industry/xcmVySyl90ivZknOK9YIBI/Online-privacy-should-not-come-at-the-cost-of-security-Suni.html"&gt;published in LiveMint &lt;/a&gt;on May 19, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;div class="text" id="U191282072761AmC"&gt;
&lt;hr /&gt;
&lt;p class="text" style="text-align: justify; "&gt;The Centre for Internet and Society (CIS), a research thinktank that primarily focuses on issues of Internet governance, is pushing to revise the provisions of the Information Technology (IT) Act and make a stronger case for privacy laws and free speech in India, an issue that has caused widespread concern after the government tried to restrict access to more than a 100 websites last year with little justification.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We want to revise the IT Act...that’s the toughest one and that’s not going to happen very soon because the government is treating it like an ego battle now. They no longer listen to the others,” said &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Sunil Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of CIS.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The IT Act has been at the centre of debate, with some of its provisions such as Section 66A, which criminalizes “causing annoyance or inconvenience” online or electronically, coming under criticism from rights advocates for being too vague and subject to interpretation.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;CIS, which will complete five years on Monday and is organizing a four-day event focusing on issues such as cyber security, surveillance in India and privacy, said it also was working towards creating a privacy law for India within the next 3-4 years. India, which is estimated to have Internet penetration of just 10%, is the third-largest Internet market in the world.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re getting closer and closer to that (privacy law),” said Abraham, adding that privacy should not come at the cost of security.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;Over the past five years, Bangalore-based CIS has also been part of some government committees such as the Justice AP Shah Committee, which focused on privacy laws in India, and is also currently working on the country’s telecom policy. The non-government organization, which receives grants from international bodies such as the Wikimedia Foundation, has also worked on policies for the government of Iraq and is currently also doing policy work for the government of Burma.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“Five years ago we were making noise from outside the room, we were not inside any policy making space. That has also changed. From an organization that was mostly outside the room, we’re increasingly being trusted by our own government,” said Abraham, who was one of the most vocal critics of the government’s unique identification (UID) project when it was first launched. Abraham had raised concerns over its overtly broad scope and issues over privacy in the project.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;For CIS, one of the biggest achievements over the past five years was being part of the policy framework for the government of India’s draft national policy on open standards for e-governance, said Abraham, adding that the organization was working towards increasing Internet penetration in the country, especially in rural areas.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re hoping that every single mobile phone user in the country will become an Internet user. We’re planning for that future,” he said.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The CIS event starting on Monday will include speakers such as legal researcher and advocate &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Lawrence Liang"&gt;Lawrence Liang&lt;/a&gt;&lt;/span&gt; and &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Vibodh Parthasarathi"&gt;Vibodh Parthasarathi&lt;/a&gt;&lt;/span&gt;, an associate professor at the Centre for Culture, Media and Governance at the Jamia Millia Islamia university. Both Liang and Parthasarathi are members of the board at CIS.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security'&gt;https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-02T02:27:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
