<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2136 to 2150.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-chennai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-together-april-27-2013-satarupa-sen-bhattacharya-is-free-speech-an-indian-value"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations">
    <title>Central Monitoring System to make government privy to phone calls, text messages and social media conversations</title>
    <link>https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations</link>
    <description>
        &lt;b&gt;The government last month quietly began rolling out a project that gives it access to everything that happens over India's telecommunications network—online activities, phone calls, text messages and even social media conversations. Called the Central Monitoring System, it will be the single window from where government arms such as the National Investigation Agency or the tax authorities will be able to monitor every byte of communication. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Indu Nandakumar was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/Business/India-Business/Central-Monitoring-System-to-make-government-privy-to-phone-calls-text-messages-and-social-media-conversations/articleshow/19927923.cms"&gt;published in the Times of India&lt;/a&gt; on May 7, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But privacy and Internet  freedom advocates are worried that in the name of security, the  government could end up snooping on people, possibly abusing a system  that does not have enough safeguards to protect ordinary citizens. &lt;br /&gt;&lt;br /&gt; "In the absence of a strong privacy law that promotes transparency  about surveillance and thus allows us to judge the utility of the  surveillance, this kind of development is very worrisome," warned  Pranesh Prakash, director of policy at the Centre for Internet and  Society. "Further, this has been done with neither public nor  parliamentary dialogue, making the government unaccountable to its  citizens." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;span id="advenueINTEXT"&gt;After the Mumbai blasts in  November 2008, the government has been arming itself with powers and  technology to help it eavesdrop on digital communications. The  information technology law, enacted in 2000 and amended twice in 2008  and 2011, gives designated government officials the authority to listen  in on phone calls, read SMSes, emails, and monitor websites. &lt;br /&gt;&lt;br /&gt; Such access is allowed for purposes of "reasonable security practices and procedures". &lt;br /&gt;&lt;br /&gt; However, Pavan Duggal, a Supreme Court advocate specialising in cyber  law, said the government has given itself unprecedented powers to  monitor private Internet records of citizens. "This system is capable of  tremendous abuse," he said. The Central Monitoring System, being set up  by the Centre for Development of Telematics, plugs into telecom gear  and gives central and state investigative agencies a single point of  access to call records, text messages and emails as well as the  geographical location of individuals. &lt;br /&gt;&lt;br /&gt; Duggal, who closely  follows New Delhi's battle with Internet firms, said there hasn't been  much details from the government on what exactly the system intends to  monitor and under what conditions. &lt;br /&gt;&lt;br /&gt; In December 2012, the then  information technology minister Milind Deora told Parliament that the  monitoring system, on which the government is spending Rs 400 crore,  will "lawfully intercept Internet and telephone services". &lt;br /&gt;&lt;br /&gt; Work  on the system has been kept under wraps for nearly two years. Several  government agencies have issued tenders seeking specialised equipment  and systems for such monitoring. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;span id="advenueINTEXT"&gt;As part of modernisation,  the home ministry is updating all its offices in state capitals with  such gear. C-DOT group head Shikha Srivastava declined comment.  Information technology ministry spokeswoman Mamta Verma redirected the  queries to Gulshan Rai, director of India's Cyber Emergency Response  Team, but Rai declined comment. &lt;br /&gt;&lt;br /&gt; With over 100 million users,  India is one of the fastest-growing Internet markets in the world. The  government has come under criticism from activists for increased  censorship and tracking of user records. Internet activist group  Anonymous has started raising the pitch against the monitoring system,  claiming that security is just a pretext for spying on citizens. &lt;br /&gt;&lt;br /&gt; Disclosures by Google show that the number of requests from the  government seeking personal information has been on the rise. In the  second half of 2012, the government made nearly 2,500 requests, Google  said. &lt;br /&gt;&lt;br /&gt; "Even legitimate conversations could end up being tracked," cautioned Duggal, the Supreme Court lawyer. &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations'&gt;https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:17:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator">
    <title>Messaging apps find another foe in India’s market regulator</title>
    <link>https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator</link>
    <description>
        &lt;b&gt;Paranoid governments and mobile operators aren’t the only one that dislike messaging apps. Regulatory bodies aren’t crazy about them either. The Securities and Exchange Board of India (SEBI) is worried that attempts to pass on confidential information or manipulate markets are originating from within services like WhatsApp and Blackberry Messenger.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This &lt;a class="external-link" href="http://qz.com/82488/messaging-apps-find-another-foe-in-indias-market-regulator/"&gt;blog post was published in Quartz&lt;/a&gt; on May 8, 2013. Elonnai Hickok is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The regulator already analyzes data from trades for irregularities  through its “integrated market surveillance system”. That gives it an  idea of what stocks are being manipulated. Now it wants to expand its  horizons. The &lt;a href="http://www.thehindu.com/business/Industry/sebi-mulls-steps-to-check-manipulation-through-bbm-whatsapp/article4686269.ece"&gt;Press Trust of India&lt;/a&gt; reports that SEBI has looked into tracking Twitter and Facebook and is  grappling with messaging apps—though as yet it has no systems in place  for doing either, according to Elonnai Hickok of the Center for Internet  Studies in Bangalore. A SEBI spokesperson could not be reached for  comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if SEBI did start following you on Twitter, it  cannot snoop on your WhatsApp messages. That sort of power is the  preserve of intelligence and police authorities. And there is good  reason for SEBI’s restricted powers. Keeping the markets clean may be an  honorable pursuit, but the regulator hasn’t always used honorable  means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s finance minister last year said that SEBI would be allowed to &lt;a href="http://articles.economictimes.indiatimes.com/2012-11-19/news/35203786_1_sebi-data-records-securities-and-exchange-board"&gt;request call records&lt;/a&gt;,  which are the data kept by operators about who called whom, for how  long and from where. Such information can help investigators discover  sources of leaked information. It can also be used to figure out whether  traders are trying to influence other investigators. But a  freedom-of-information request &lt;a href="http://www.cobrapost.com/index.php/news-detail?nid=359&amp;amp;cid=23"&gt;recently revealed&lt;/a&gt; that SEBI had been requesting—and receiving—such data from carriers at  least since 2009, well before it was supposedly allowed to do so.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator'&gt;https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-05T10:46:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-chennai">
    <title>A Privacy Round Table in Chennai</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-chennai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Data Security Council of India and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at the Residency Towers in Chennai on Saturday, May 18, 2013, 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt;Click for the invite&lt;/a&gt;&lt;/li&gt;
&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt; 
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To discuss the "Report of the Group of Experts on Privacy" by the Justice AP Shah Committee, the text of the "Citizens' Privacy (Protection) Bill 2013", drafted by the Centre for Internet and Society, and "Strengthening Privacy Protection through Co-regulation" by DSCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published into a compilation, and presented at the Internet Governance meeting planned for October 2013.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Draft Agenda for the Roundtable Discussion&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 p.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.15 p.m.&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.15 p.m.&lt;/td&gt;
&lt;td&gt;In depth discussions: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Confirmations and RSVP&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the Chennai Privacy Roundtable on &lt;b&gt;May 18th, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Monday&lt;b&gt; May 13, 2013&lt;/b&gt;.  As the conference is a roundtable dialogue, we request that attendees  submit a brief introduction about themselves and their interest in the  topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-chennai'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-chennai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-05-06T10:01:45Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary">
    <title>CIS anniversary</title>
    <link>https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society will celebrate five years of its existence with an exhibition showcasing its works and accomplishments. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This was published in &lt;a class="external-link" href="http://www.thehindubusinessline.com/news/cis-anniversary/article4686344.ece"&gt;Hindu Business Line&lt;/a&gt; on May 5, 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The exhibition will be held concurrently at both Bangalore and Delhi offices from May 20 to 24, 2013, said a press release.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“To promote transparency, we're getting the general public to be our  auditors by throwing open our account books and contracts which show how  we have spent the Rs 8.3 crore received from our donors.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The exhibition will also see artists like Kiran Subbaiah, Tara Kelton,  Navin Thomas, Abhishek Hazra, among others exhibiting their works, as  well as lectures.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary'&gt;https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-05-06T07:28:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis">
    <title>Celebrating 5 Years of CIS</title>
    <link>https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is celebrating 5 years of its existence with an exhibition showcasing its activities and accomplishments. The exhibition will be held at its offices in Bangalore and Delhi from May 20 to 23, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-5-years-all-posters.zip" class="internal-link"&gt;Download all the posters exhibited during the recent exhibition here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;As a move to promote transparency, CIS is inviting the general public to be its auditors by throwing open its account books and contracts which show how it has spent the Rs. 13.13 crores received from its donors. The four-day event will see renowned artists like Kiran Subbaiah, Tara Kelton, Navin Thomas and Abhishek Hazra featuring their work and also giving live demonstrations.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;h2 align="JUSTIFY"&gt;Agenda&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;&lt;i&gt;Open exhibition on all the 4 days from 10.00 a.m. to &lt;/i&gt;&lt;i&gt;8&lt;/i&gt;&lt;i&gt;.00 p.m., in Bangalore and Delhi. The evening  programmes will be held in Bangalore&lt;/i&gt;. &lt;i&gt;Dinner will be served right afterwards.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Evening Programmes&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 align="JUSTIFY"&gt;May&lt;i&gt; &lt;/i&gt;20&lt;i&gt;, &lt;/i&gt;2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;19.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Why did I buy a set-top box?: What we know, don't know and need to know about Digitalisation &lt;/b&gt;&lt;b&gt;— A Talk by Vibodh Parthasarathi&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Why are we being asked to install set-top boxes? How will this change what we want, and pay for, on TV? Grappling with these questions, the talk will evaluate the rationale of the digital migration in cable currently underway, and the less talked about digital migration being planned for the public broadcaster. These scarcely debated and often contentious issues form the core of a recent &lt;a href="http://www.opensocietyfoundations.org/reports/mapping-digital-media-india"&gt;Country Report on the Media in India&lt;/a&gt;, anchored by the speaker. The India Country Report, the first inter-sectoral and policy oriented study of our electronic media landscape, finds the ongoing digitalisation of cable, the infusion of digital tools in the press and the proposed digital switchover of the public broadcaster, posing varied challenges not only to journalism but to public interest at large. This report is part of a global initiative, &lt;a href="http://www.opensocietyfoundations.org/projects/mapping-digital-media" target="_blank"&gt;Mapping Digital Media&lt;/a&gt;, examining opportunities and risks amidst the transitions to a digital media ecology across 50 countries.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/N8gCYiYS9VY" width="250"&gt;&lt;/iframe&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.00&lt;br /&gt;19.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Film Screening on Cyber Cafes of Rural India by Video Volunteers&lt;/b&gt;&lt;br /&gt;Video Volunteers in partnership with CIS have been documenting the cyber cafes of rural India. Kamini Menon and Christy Raj will do the screening of seven 2-minute films:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafe Trends Slowly Changing in Imphal&lt;/b&gt; by Achungmei Kamei (Manipur)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Transgender Interaction with Cyber Cafes &lt;/b&gt; by Christy Raj (Karnataka)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafes Prevail Over Mobile Phones in Nagaland&lt;/b&gt; by Meribeni Kikon (Nagaland)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Mobile Technology Threatens Cyber Cafes in HP&lt;/b&gt; by Avdhesh Negi (Himachal Pradesh)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafe Visit - A Day's Journey&lt;/b&gt; by Saroj Paraste (Madhya Pradesh)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Challenges of Establishing Cyber Cafes&lt;/b&gt; by Rohini Pawar (Maharashtra)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Community Service Centre - Myth or Reality?&lt;/b&gt; by Neeru Rathod (Gujarat)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Video&lt;/b&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2OxWtwIWNdc" width="250"&gt;&lt;/iframe&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.30&lt;br /&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Hindustani Classical Performance by Aditya Dipankar &lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 align="JUSTIFY"&gt;May 21, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;18.00&lt;br /&gt;19.00&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Screening of Sabaka &lt;br /&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;A young elephant trainer in India vows revenge against the cult that killed his family. He seeks help from the local Maharajah who refuses, and he sets out alone to battle the enemy... &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sabaka"&gt;Sabaka&lt;/a&gt; is a 1954 film produced and directed by Frank Ferrin starring Boris  Karloff, Reginald Denny, June Foray, et.al.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.00&lt;br /&gt;20.00&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Slouching towards Tlön: An Encyclopedia for the 2nd century of Indian cinema — A Talk by Lawrence Liang &lt;/b&gt;&lt;br /&gt;Ashish Rajadhyaksha and Paul Willemen’s Encyclopedia of Indian cinema (1994) marked an important moment for the study of Indian film history. In the two decades since its publication we have seen a rise in the academic community working on Indian film history along with the rise of various new archival initiatives online. Materials that were hitherto unavailable have also made their way into the public domain via the efforts of film historians, cinephiles and other enthusiasts. It is perhaps fitting to think about what a collaborative encyclopedia of Indian cinema for the 21st century may look like. Using Rajadhayksha and Willemen’s Encyclopedia as a base, Lawrence has been working on an online version that incorporates moving images, photographs and archival materials and his presentation will open up questions of how one thinks of an online encyclopedia as well as larger conceptual questions of the relationship between the encyclopedias, the internet and moving image archives.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2n5ZON8M_0E" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;May 22, 2013&lt;/h3&gt;
&lt;p&gt;Cybersecurity, Privacy and Surveillance&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;18.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;“&lt;b&gt;The Indian Surveillance State”&lt;/b&gt;&lt;b&gt;—&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;A Talk by Maria Xynou &lt;/b&gt;&lt;br /&gt;The Central Monitoring System confirms that, starting from last month ‘Big Brother’ is a reality in India. But how do authorities get the tech to spy on us? Maria has started investigating surveillance technology companies operating in India. So far, 76 companies have been detected which are producing and selling different types of surveillance gear to Indian law enforcement agencies. Join us to see India´s first investigation of who is aiding our watchers!&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/fshPBINoACs" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.30&lt;br /&gt;19.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Why Privacy and How?&lt;/b&gt; &lt;b&gt;A Talk &lt;/b&gt;&lt;b&gt;by Bernadette Langle &lt;/b&gt;&lt;br /&gt;"But I have nothing to hide!" That's what most people think. Are you sure? What about all the services you use for free, don't you think the service provider has to spend money on that, and that he needs to earn it somehow? Bernadette will show some alternatives and also how easy it can be, to put your messages in a virtual private envelope as you use to do with messages on paper.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/DVa8dkda1D0" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.00&lt;br /&gt;19.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Cyber Security Preview &lt;/b&gt;&lt;b&gt;—&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Presentation&lt;/b&gt;&lt;b&gt; by Laird Brown&lt;/b&gt; and&lt;b&gt; Purba Sarkar &lt;/b&gt;&lt;br /&gt;CIS in cooperation with Citizen Lab, Munk School of Global Affairs at the University of Toronto, is developing a film project on cyber security in India from a civil society perspective. Laird will show the preview of the project. The preview will include an overview of the project along with a video footage from the first series of interviews.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/moqgZ6tDl4g" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.45&lt;br /&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Faking of Fingerprints: &lt;/b&gt;&lt;b&gt;A Presentation by &lt;/b&gt;&lt;b&gt;Bernadette Langle &lt;/b&gt;&lt;br /&gt;Bernadette will give a brief presentation on how easy it is to fake a fingerprint. Afterwards you can get hands-on. Fake a fingerprint yourself and take it with you to your home.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/3q6UBK6lLRI" width="250"&gt;&lt;/iframe&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;May 23, 2013&lt;/h3&gt;
&lt;p&gt;Kannada Language and IT&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;18.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Kannada in Modern Era: A Guest Talk&lt;/b&gt;&lt;b&gt; by Dr. Chandrashekhara Kambara &lt;/b&gt;&lt;br /&gt;Dr. Chandrashekhara will be the chief guest for this session and will give a guest lecture.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/9bMUu08f_JU" width="250"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.15&lt;br /&gt;19.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;From Palm Leaf to Tablet – Journey of Kannada: A Talk by Dr. U.B. Pavanaja &lt;/b&gt;&lt;br /&gt;Kannada language which has a history of 2000 years and quite rich in literature started on palm leaves. Kannada advanced with modern times adopting the marvels of Information Technology. This is accomplished by successfully implementing Kannada in various facets of IT. It is being used everywhere from data driven applications to websites to hand held devices like tablets. These aspects will be brought out during the talk.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Summary in Kannada:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ತಾಳೆಗರಿಯಿಂದ ಟ್ಯಾಬ್ಲೆಟ್ ತನಕ ಕನ್ನಡದ ಪಯಣ&lt;br /&gt;ಸುಮಾರು ಎರಡು ಸಾವಿರ ವರ್ಷಗಳ ಭವ್ಯ ಇತಿಹಾಸವಿರುವ ಕನ್ನಡ ಸಾಹಿತ್ಯದ ಉಗಮ ತಾಳೆಗರಿಗಳ ಮೇಲೆ ಆಯಿತು. ಕನ್ನಡ ಭಾಷೆಯು ಆಧುನಿಕ ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಅದ್ಭುತ ಕೊಡುಗೆಗಳನ್ನು ತನ್ನದಾಗಿಸಿಕೊಂಡು ಬೆಳೆಯಿತು. ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಎಲ್ಲ ಅಂಗಗಳಲ್ಲಿ ಕನ್ನಡವನ್ನು ಅಳವಡಿಸಿ ಬಳಸಿಕೊಳ್ಳುವುದರ ಮೂಲಕ ಇದು ಸಾಧ್ಯವಾಯಿತು. ಆನ್ವಯಿಕ ತಂತ್ರಾಂಶವಿರಲಿ, ಪ್ರತಿಸ್ಪಂದನಾತ್ಮಕ ಜಾಲತಾಣವಿರಲಿ, ಕೈಯಲ್ಲಿ ಹಿಡಿದು ಕೆಲಸ ಮಾಡುವ ಟ್ಯಾಬ್ಲೆಟ್ ಇರಲಿ –ಎಲ್ಲ ಕಡೆ ಕನ್ನಡದ ಬಳಕೆ ಆಗುತ್ತಿದೆ. ಈ ಎಲ್ಲ ವಿಷಯಗಳ ಕಡೆ ಒಂದು ಪಕ್ಷಿನೋಟವನ್ನು ಈ ಭಾಷಣದಲ್ಲಿ ನೀಡಲಾಗುವುದು.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/w4CiHwpX9X0" width="250"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.30&lt;br /&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Carnatic Music Performance by Nirmita Narasimhan&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Video&lt;br /&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="255" src="http://www.youtube.com/embed/-P4v5u_Q34M" width="250"&gt;&lt;/iframe&gt; &lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Speakers&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/VPforblurb.jpg" alt="Vibodh" class="image-inline" title="Vibodh" /&gt;&lt;br /&gt;Vibodh Parthasarathi&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Vibodh Parthasarathi &lt;/b&gt;works with the Centre for Culture and Media Governance, Jamia Millia Islamia, New  Delhi. He is also a Board Member at the Centre for Internet and Society, Bangalore. He maintains a multidisciplinary interest in media and development policy, business history of creative industries, and governance of media infrastructure. At the Centre for Culture, Media &amp;amp; Governance, Jamia Millia Islamia, New Delhi, his ongoing research addresses media policy literacy, the TV news industry and the digital switchover in India. He is the co-editor of the critically acclaimed tri-series on Communication Process (Sage).&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Lawrence.png" alt="Lawrence" class="image-inline" title="Lawrence" /&gt;&lt;/p&gt;
&lt;p&gt;Lawrence Liang&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Lawrence Liang&lt;/b&gt; is the Chairman of the Board at the Centre for Internet and Society. He is a  graduate of the National Law School. He subsequently pursued his Masters degree in Law and Development at Warwick, on a Chevening Scholarship. His key areas of interest are law, technology and culture, the politics of copyright and he has been working closely with Sarai, New Delhi on a joint research project Intellectual Property and the Knowledge/Culture Commons. A keen follower of the open source movement in software, Lawrence has been working on ways of translating the open source ideas into the cultural domain. He has written extensively on these issues and is the author of &lt;i&gt;The Public is Watching: Sex, Laws and Videotape&lt;/i&gt; and &lt;i&gt;A Guide to Open Content Licenses&lt;/i&gt;. Lawrence has taught at NLS, the Asian College of Journalism, NALSAR, etc., and is currently working on a Ph.D. on the idea of cinematic justice at Jawaharlal Nehru University.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_maria.jpg" alt="Maria" class="image-inline" title="Maria" /&gt;&lt;br /&gt;Maria Xynou&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Maria Xynou&lt;/b&gt; is a Policy Associate on the Privacy Project at the CIS. She has previously interned with Privacy International and with the Parliament of Greece. Maria holds a Master of Science in Security Studies from the University College London (UCL). &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Bernadette.jpg" alt="Bernadette" class="image-inline" title="Bernadette" /&gt;
&lt;p&gt;Bernadette Langle&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Bernadette Längle &lt;/b&gt;recently graduated in social and cultural anthropology, philosophy and computer science. She is also a so-called hacktivist together with one of the oldest hacker associations of the world, the Chaos Computer Club, having a lot of influence in German politics. As one of the core-team organizer of Chaos Communication Congress in Germany she also has a lot of experience in organizing events.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Laird.png" alt="Laird Brown" class="image-inline" title="Laird Brown" /&gt;&lt;br /&gt;Laird Brown&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Laird Brown&lt;/b&gt; is a strategic planner and writer. His core competencies are brand analysis, public relations, and resource management. Laird has worked at the United Nations in New York; high-tech ventures in North America, Europe, and India; and, is a guest speaker at ICT conferences internationally. He is currently working on a film project for CIS on cyber security in India with Purba Sarkar.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/purba.jpg" alt="Purba" class="image-inline" title="Purba" /&gt;&lt;br /&gt;Purba Sarkar&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Purba Sarkar&lt;/b&gt; is an associate producer with the cyber security film project. She holds a Bachelor in Technology degree from West Bengal University of Technology. Purba worked as a strategic advisor in the field of SAP Retail for 4 years before joining CIS in January, 2013.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Kambara.png" alt="Kambara" class="image-inline" title="Kambara" /&gt;Dr.Chandrashekhara Kambara&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Chandrashekhara Kambara&lt;/b&gt; is a prominent poet, playwriter, folklorist, film director in Kannada language. He is also the founder-vice-chancellor of Kannada University in Hampi. He is known for his effective usage of North Karnataka dialect of Kannada language in his plays and poems and is often compared with D.R. Bendre. He has been conferred with many prestigious awards including the Jnanpith Award (the highest literary honour conferred in India) in 2011 for the year 2010, the Sahitya Akademi Award, the Padma Shri by Government of India, Kabir Samman, Kalidas Samman and Pampa Award. After his retirement, Kambara was nominated Member of Karnataka Legislative Council, to which he made significant contributions through his interventions. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_Pavanaja.png" alt="Pavanaja" class="image-inline" title="Pavanaja" /&gt;&lt;br /&gt;Dr. U.B. Pavanaja&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr U B Pavanaja&lt;/b&gt; holds a Master’s degree from Mysore University and Ph.D. from Mumbai University. He was a scientist at the Bhabha Atomic Research Centre, Mumbai, for about 15 years. He has done advanced research in Taiwan. He resigned from BARC in 1997 and dedicated himself fully for the cause of Computer and Indian languages. He has to his credit many firsts, viz., first Kannada website, first Kannada online magazine, first Indian language (Kannada) website to receive Golden Web Award, first Indian language (Kannada) editor for Palm OS, first Indian language (Kannada) editor for WinCE device (HP Jornado 720), first Indian language version (Kannada) of universally popular Logo (programming language for children) software, etc. His Kannada logo won the Manthan Award for the year 2006. He was a member of the technical advisory committee setup by the Govt. of Karnataka for Standardization of Kannada on Computers (2000). He is also a member of the Kannada Software Committee of Govt. of Karnataka (2008-current). &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;The Artists&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Kiran.png" alt="Kiran Subbaiah" class="image-inline" title="Kiran Subbaiah" /&gt;&lt;br /&gt;Kiran Subbaiah&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Kiran Subbaiah&lt;/b&gt; studied sculpture at Santiniketan, MSU Baroda and the RCA London. He was an artist in residence at the Rijksakademie Amsterdam where he worked on art that incorporated informatics and electro-mechanics. He is also known for making videos using custom-built tools that enable him to perform multi-person film-making tasks single-handed. His art is shown extensively in India and abroad. Subbaiah is based in Bangalore and is represented by the Chatterjee and Lal gallery in Mumbai. Kiran will present the Spectator, a robot that can sense the presence of human beings around it. It tries to appreciate them as works of art.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Tara.png" alt="Tara Kelton" class="image-inline" title="Tara Kelton" /&gt;&lt;br /&gt;Tara Kelton&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Tara Kelton&lt;/b&gt; is an artist and designer. She has been living in Brooklyn, USA and Bangalore, India for the last three years. She received her MFA from the Yale School of Art in 2009. Kelton’s video, print, and web-based works investigate moments in which technology alters our perception of the physical world. Kelton has taught at the Srishti School of Art, Design, and Technology and has recently exhibited her work at Vox Populi (USA), Franklin Street Works (USA), GALLERYSKE (Bangalore) and the India Design Forum (Mumbai). Tara will present &lt;i&gt;Trace&lt;/i&gt;, a surveillance camera feed drawn in real-time by anonymous online workers.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Navin.png" alt="Navin Thomas" class="image-inline" title="Navin Thomas" /&gt;&lt;br /&gt;Navin Thomas&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Navin Thomas&lt;/b&gt; is a multimedia artist and a professional scrap market junkie, he spends a good quality of his precious time looking for obscure cultural misfits... after destroying most of himself in the 90's, he now spends his time restoring your mother's brother’s tin space toys and other unusual situations.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Abhishek.png" alt="Abhishek Hazra" class="image-inline" title="Abhishek Hazra" /&gt;Abhishek Hazra&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Abhishek Hazra&lt;/b&gt; approaches his art with a particular emphasis on the study of the historiography of science. He uses videos and prints that often integrate textual fragments drawn from real and fictional scenarios. He has previously exhibited and performed at Science Gallery, Dublin, HEART Herning Museum of Contemporary Art, Denmark, Astrup Fearnley Museum of Modern Art, Oslo, Casino Luxembourg Forum d’art Contemporain, Experiment Marathon Reykjavik, Reykjavik Art Museum and Kunstmuseum Bern. Abhishek was most recently an artist in residence at SymbioticA, the Centre for Excellence in Biological Arts, University of Western Australia, Perth. It was first  performed as part of Beam Me Up, curated by Reinhard Storz and Gitanjali Dang, which was acknowledged by Pro Helvetia, New Delhi and German Book Office, New Delhi. Abhishek will be presenting #cloudrumble56 (attempted to re-animate sections of the Indian parliamentary archives — specifically, the transcripts of the scientist M.N. Saha's (1893-1956) interventions — through a performance that was transmitted only through live tweets on Twitter).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Aditya.png" alt="Aditya Dipankar" class="image-inline" title="Aditya Dipankar" /&gt;Aditya Dipankar&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Aditya Dipankar &lt;/b&gt;started fiddling with music at the age of 4 when he started learning the &lt;i&gt;tabla&lt;/i&gt; and then went on to play it for a long time. Years later, he discovered his strong inclination towards singing. Now, under the noble guidance of Pandit Vijay Sardeshmukh (Senior disciple of Pandit Kumar Gandharva), he is trying to understand the simplicity and spontaneity in the rich tradition of Hindustani classical music.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Nirmita.png" alt="Nirmita Narasimhan" class="image-inline" title="Nirmita Narasimhan" /&gt;Nirmita Narasimhan&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Nirmita Narasimhan&lt;/b&gt; is a Policy Director at CIS and works on accessibility for persons with disabilities. She was awarded the national award for empowerment of persons with disabilities by the President of India and also received the NIVH Excellence Award. Nirmita Narasimhan is a disciple of Dr. Radha Venkatachalam and renowned maestro Prof. T.R. Subramanyam. She began learning music at the age of 5 and went on to complete her Ph.D. in this subject from the Delhi University. Nirmita has been performing since 1995 and received several accolades such as the Sahitya Kala Parishad Scholarship and prizes in several competitions. She received the Gold medal in MA for standing first in the University and also stood first in MPhil. She has released a CD on Ponnayya Pillai compositions and also sung in an album of &lt;i&gt;varnams&lt;/i&gt;. Nirmita has performed in different places in India such as Delhi, Chennai, Tirupathi and Bangalore as well as in Singapore and has also given several thematic concerts such as &lt;i&gt;Eka Raga Sandhya&lt;/i&gt; and &lt;i&gt;Pallavi&lt;/i&gt; concerts. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/sharathcopy.jpg" alt="Sharath Chandra Ram" class="image-inline" title="Sharath Chandra Ram" /&gt;&lt;/p&gt;
&lt;p&gt;Sharath Chandra Ram&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Sharath Chandra Ram (Sharathchandra Ramakrishnan) has interests in multimodal art, cognitive science, accessibility, digital humanities and network cultures. He is a faculty at the Centre for Experimental Media Arts at the Srishti School of Art Design and Technology. At the Centre for Internet and Society he helped set up and manage activities at the Metaculture Media Lab : an open hackerspace and alternative platform for research and exchange. His writings and musings at CIS maybe found here: &lt;a href="https://cis-india.org/author/sharath"&gt;http://cis-india.org/author/sharath&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He graduated from the University of Edinburgh with a degree in Artificial Intelligence specializing in interactive virtual environments. Previously as a Research Associate at the National Institute of Mental Health and Neurosciences he received a special mention award at the International Conference on Consciousness (2012) held at the National Institute of Advanced Studies for his work on ‘Cross modal Integration’. As an amateur radio broadcaster, he is a proponent of the free use of airwaves for relief work, education and transmission art. He has also been a development related radio journalist (PANOS @ Nepal, Voices UNDP@Bangalore), speaker at the International Ham Radio Convention (Port Blair, 2006) and as a film enthusiast has been a Press Reviewer for the Edinburgh International Film Festival.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;span class="author-g-ecflmmhkz122zm34g8fj"&gt;Locations&lt;/span&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;span class="author-g-ecflmmhkz122zm34g8fj"&gt;Bangalore&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society&lt;br /&gt;No. 194, Second 'C' Cross, Domlur,&lt;br /&gt;2nd Stage, Bangalore - 560071,&lt;br /&gt;Karnataka, India &lt;br /&gt;Ph: +91 80 4092 6283                 &lt;br /&gt; Fax: +91 80 2535 0955&lt;/p&gt;
&lt;h3&gt;Delhi&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society&lt;br /&gt;G 15, Top floor&lt;br /&gt;Behind Hauz Khas, G Block Market&lt;br /&gt;Hauz Khas,&lt;br /&gt;New Delhi 110016&lt;br /&gt;Ph: + 91 011 40503285&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Event Brochure&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-celebrates-5-years.pdf" class="internal-link"&gt;Event Flier&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Event Posters/Banners and Videos&lt;/h2&gt;
&lt;hr /&gt;
&lt;h3&gt;Accessibility&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;National Resource Kit (&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;NVDA E-Speak (&lt;a href="https://cis-india.org/accessibility/blog/nvda-espeak.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/nvda-espeak" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;International Collaborations (&lt;a href="https://cis-india.org/accessibility/blog/international-collaborations.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/international-collaborations" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Partners (&lt;a href="https://cis-india.org/accessibility/blog/partners.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/partners" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Publications (&lt;a href="https://cis-india.org/accessibility/blog/publications.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/publications" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Timeline (&lt;a href="https://cis-india.org/accessibility/blog/timeline.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/timeline" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Inclusive Planet (PDF, &lt;a href="https://cis-india.org/accessibility/blog/inclusive-planet" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;In the below video Anandhi Viswanathan gives a demo of the National Resource Kit project  and Rameshwar Nagar gives a demo of the NVDA and ESpeak (Text-to-Speech)  project during the exhibition.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2Z1xfwvkFoQ" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;Access to Knowledge&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Broadcast Treaty (&lt;a href="https://cis-india.org/a2k/blogs/broadcast-treaty.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/broadcast-treaty" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Copyright (&lt;a href="https://cis-india.org/a2k/blogs/copyright-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/copyright" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software Patent 1 (&lt;a href="https://cis-india.org/a2k/blogs/software-patent-1.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/software-patent-1" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software Patent 2 (&lt;a href="https://cis-india.org/a2k/blogs/software-patent-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/software-patent-2" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Pervasive Technologies (&lt;a href="https://cis-india.org/a2k/blogs/pervasive-technologies-exhibition-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/pervasive-technologies-poster.pdf" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Access to Knowledge (Wikipedia)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Factsheet (&lt;a href="https://cis-india.org/openness/blog-old/indian-language-factsheet.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/indian-language-wikipedia-factsheet" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Reaching Out (&lt;a href="https://cis-india.org/openness/blog-old/reaching-out.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/reaching-out-to-participants" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Outreach (&lt;a href="https://cis-india.org/openness/blog-old/outreach.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/outreach" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Bridging Gender Gap (&lt;a href="https://cis-india.org/openness/blog-old/bridging-gender-gap.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/bridging-the-gender-gap" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Press Coverage (&lt;a href="https://cis-india.org/openness/blog-old/press-coverage.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/wikipedia-press-coverage" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Education Programmes (&lt;a href="https://cis-india.org/openness/blog-old/education-programmes.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/wiki-education-programs" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Team Achievements (&lt;a href="https://cis-india.org/openness/blog-old/achievements.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/access-to-knowledge-team-achievements" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Visualization (&lt;a href="https://cis-india.org/openness/blog-old/visualization.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/indic-wikipedia-project-visualization" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Open Access to Scholarly Literature (&lt;a href="https://cis-india.org/openness/blog-old/open-access-to-scholarly-literature.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-access-2-scholarly-literature" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Open Access to Law (&lt;a href="https://cis-india.org/openness/blog-old/open-access-to-law-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-access-2-law" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Open Standards (&lt;a href="https://cis-india.org/openness/blog-old/open-standards-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-standards" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Free/Open Source Software (&lt;a href="https://cis-india.org/openness/blog-old/foss-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/foss" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;Internet Governance (Free Speech)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Blocking of Websites (&lt;a href="https://cis-india.org/internet-governance/blog/blocking-websites.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/blocking-websites" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Freedom of Speech  (&lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-speech.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/free-speech" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Intermediary Liability (&lt;a href="https://cis-india.org/internet-governance/blog/intermediary-liability-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/intermediary" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Internet Governance Forum (&lt;a href="https://cis-india.org/internet-governance/blog/internet-governance-forum.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/igf" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Internet Governance (Privacy)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Privacy Events (&lt;a href="https://cis-india.org/internet-governance/blog/privacy-events.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/events" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Timeline (&lt;a href="https://cis-india.org/internet-governance/blog/privacy-timeline.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/events" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;UID (1) (&lt;a href="https://cis-india.org/internet-governance/blog/uid" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/uid" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unique-identity" class="internal-link"&gt;&lt;/a&gt;UID (2) (&lt;a href="https://cis-india.org/internet-governance/blog/uid-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/unique-identity" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;DNA (1) (&lt;a href="https://cis-india.org/internet-governance/blog/dna-1.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-1" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;DNA (2) (&lt;a href="https://cis-india.org/internet-governance/blog/dna-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-2" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Telecom&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Institutional Framework for Indian Telecommunication (&lt;a href="https://cis-india.org/telecom/blog/institutional-framework-for-indian-telecommunication.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/institutional-framework" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Growth of Telecom Industry in India (&lt;a href="https://cis-india.org/telecom/blog/growth-of-telecom-industry-in-india.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/growth-of-telecom" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Delicensed Spectrum (&lt;a href="https://cis-india.org/telecom/blog/delicensed-spectrum.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/delicensed" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Spectrum Sharing (&lt;a href="https://cis-india.org/telecom/blog/spectrum-sharing.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/spectrum" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;RAW Monographs&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Archives and Access (&lt;a href="https://cis-india.org/raw/archives-and-access.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/archives-access" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Internet, Society and Space in Indian Cities (&lt;a href="https://cis-india.org/raw/internet-society-and-space.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/internet-society-space" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;The Last Cultural Mile (&lt;a href="https://cis-india.org/raw/last-cultural-mile.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/last-cultural-mile" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Porn, Law, Video Technology (&lt;a href="https://cis-india.org/raw/porn-law-video-technology.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/porn-law-video-technology" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Re:Wiring Bodies (&lt;a href="https://cis-india.org/raw/rewiring-bodies.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/re-wiring-bodies" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Community Informatics and Open Government Data (Special Issue) (&lt;a href="https://cis-india.org/raw/community-informatics-open-govt-data.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/spl-issue-community-informatics-and-ogd" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;News and Media&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Media Coverage (&lt;a href="https://cis-india.org/internet-governance/blog/media-coverage.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/home-images/MC.png/view" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Organizational Chart (&lt;a href="https://cis-india.org/internet-governance/blog/organizational-chart.pdf" class="internal-link"&gt;PDF&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis'&gt;https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2014-02-25T09:15:58Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore">
    <title>Consilience – 2013</title>
    <link>https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore</link>
    <description>
        &lt;b&gt;The Law and Technology Committee of National Law School of India University, Bangalore is organising ‘Consilience – 2013′, an annual conference on law and technology, to be held on May 25 and 26, 2013. The Centre for Internet and Society is a co-partner for this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Theme: Data Protection and Cyber Security in India. Click to read the &lt;a href="https://cis-india.org/internet-governance/blog/consilience-2013.pdf" class="internal-link"&gt;report here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Topics:&lt;br /&gt;Frameworks for Data Protection in India: The J. A.P. Shah “Report of the Group of Experts on Privacy”&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       What is the scope of the principles/framework?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      What could be the strengths and limitation of their application?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       How does Report define privacy for India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      Would an alternative framework for privacy in India be better? If so, what would this framework look like?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India and the EU: The Privacy Debate&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How does the Indian data protection regime differ from the EU regime?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Was the EU is justified in not accepting India as a data secure country? Reason for or against.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.      In what way does the Indian regime on data protection not meet the requirements of EU’s data protection directive?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      What changes need to be made in the Indian regime to become  EU compliant? Are these changes feasible? Should India make these  changes?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Governmental Schemes, Data Protection, and Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. In India, do private public partnerships between government  and the private sector adequately incorporate data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. What have been concerns related to data protection and  security that have arisen from government schemes? (Please use two  governmental schemes as case studies)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Are these concerns related to the policy associated with the  project – the architecture of the project as well as the implementation?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Should the larger question of data protection for governmental  schemes be incorporated into a privacy legislation? If yes, how so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contracts and Data Protection in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How are contracts used to ensure data protection in India? What actors use contracts?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Are there weaknesses in using contracts to ensure data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       Do contracts address questions brought about from technology like the cloud?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cyber security in India&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;a.      What are the perceived challenges and threats to cyber security in India?&lt;/p&gt;
&lt;p&gt;b.      Are these currently being addressed through policy/projects? If yes, how so?&lt;/p&gt;
&lt;p&gt;c.      How does India’s cyber security regime compare to other countries?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance and Cyber Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.      Does policy in India enable the Government of India to surveil individuals for reasons related to cyber security?&lt;/p&gt;
&lt;p&gt;b.      If so – through what policy, projects, legislation?&lt;/p&gt;
&lt;p&gt;c.      Do the relevant policies, projects, and legislation impact privacy? How so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Draft National Cyber Security Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.   What is the scope of the National Cyber Security Policy of  India? Does the draft policy adequately address all of the concerns  within the ambit of cyber security?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.   Would the Draft National Cyber Security Policy of India be  effective in meeting the goal of enhancing cyber security levels in  India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.    How does the Draft National Cyber Security Policy compare to other countries cyber security policies?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Word Limit&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;Abstract:              750-800 words&lt;/p&gt;
&lt;p&gt;Paper:                   2,500 words&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Deadlines:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Abstract Submission:     April 30, 2013&lt;/p&gt;
&lt;p&gt;Paper Submission:        May 15, 2013&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contact Details&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;consilience2013[at]gmail[dot]com&lt;/p&gt;
&lt;p&gt;Mohak Arora:  +91-90359-21926&lt;/p&gt;
&lt;p&gt;Shivam Singla: +91-99167-08701&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each participant is required to submit an abstract on &lt;b&gt;any one&lt;/b&gt; of the seven topics above and can choose the specific issue within the selected topic to discuss.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For additional details, click&lt;b&gt; &lt;a href="http://consilience.co.in/index.php/component/content/article/20-frontpage/310-call-for-papers"&gt;here&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore'&gt;https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-20T06:15:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers">
    <title>The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers!</title>
    <link>https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers</link>
    <description>
        &lt;b&gt;Maria Xynou is conducting research on surveillance technology companies operating in India. So far, 76 companies have been detected which are currently producing and selling different types of surveillance technology. This post entails primary data on the first ever investigation of the surveillance industry in India. Check it out! &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post has been &lt;a class="external-link" href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;cross-posted&lt;/a&gt; in Medianama on May 8, 2013. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;So yes, we live in an &lt;a href="http://www.schneier.com/blog/archives/2013/03/our_internet_su.html"&gt;Internet Surveillance State&lt;/a&gt;. And yes, we are constantly under the microscope. But how are law enforcement agencies even equipped with such advanced technology to surveille us in the first place?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Surveillance exists because certain companies produce and sell products and solutions which enable mass surveillance. Law enforcement agencies would not be capable of mining our data, of intercepting our communications and of tracking our every move if they did not have the technology to do so. Thus an investigation of the surveillance industry should be an integral part of research for any privacy advocate, which is why I started looking at surveillance technology companies. India is a very interesting case not only because it&lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting"&gt; lacks privacy legislation &lt;/a&gt;&lt;span&gt;which could safeguard us from the use of intrusive technologies, but also because no thorough investigation of the surveillance industry in the country has been carried out to date.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The investigation of the Indian surveillance industry has only just begun and so far, 76 surveillance technology companies have been detected. No privacy legislation...and a large surveillance industry. What does this mean?&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;A glimpse of the surveillance industry in India&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In light of the &lt;/span&gt;&lt;a href="http://uidai.gov.in/"&gt;UID scheme&lt;/a&gt;&lt;span&gt;, the &lt;/span&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;National Intelligence Grid&lt;/a&gt;&lt;span&gt; (NATGRID), the &lt;/span&gt;&lt;a href="http://ncrb.nic.in/cctns.htm"&gt;Crime and Criminal Tracking Network System&lt;/a&gt;&lt;span&gt; (CCTNS) and the &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System&lt;/a&gt;&lt;span&gt; (CMS), who supplies law enforcement agencies the technology to surveille us?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In an attempt to answer this question and to uncover the surveillance industry in India, I randomly selected a sample of 100 companies which appeared to produce and sell surveillance technology. This sample consisted of companies producing technology ranging from internet and phone monitoring software to  biometrics, CCTV cameras, GPS tracking and access control systems. The reason why these companies were randomly selected was to reduce the probability of research bias and out of the 100 companies initially selected, 76 of them turned out to sell surveillance technology. These companies vary in the types of surveillance technology they produce and it should be noted that most of them are not restricted to surveillance technologies, but also produce other non-surveillance technologies. Paradoxically enough, some of these companies &lt;/span&gt;&lt;a href="http://www.infoserveindia.com/products/26/Internet-Monitoring-System.html"&gt;simultaneously produce internet monitoring software and encryption tools&lt;/a&gt;&lt;span&gt;! Thus it would probably not be fair to label companies as ´surveillance technology companies´ per se, but rather to acknowledge the fact that, among their various products, they also sell surveillance technologies to law enforcement agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies selling surveillance technology in India are listed in &lt;a href="https://cis-india.org/internet-governance/blog/table-1.pdf" class="internal-link"&gt;Table 1&lt;/a&gt;. Some of these companies are Indian, whilst others have international headquarters and offices in India. Not surprisingly, the majority of these companies are based in India's IT hub, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/table-2.pdf" class="internal-link"&gt;Table 2&lt;/a&gt; shows the types of surveillance technology produced and sold by these 76 companies.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The graph below is based on &lt;a href="https://cis-india.org/internet-governance/blog/table-2.pdf" class="internal-link"&gt;Table 2&lt;/a&gt; and shows which types of surveillance are produced the most by the 76 companies.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Surveillancetechgraph.png" alt="Surveillance Graph" class="image-inline" title="Surveillance Graph" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Graph on types of surveillance sold to law enforcement agencies by 76 companies in India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Out of the 76 companies, the majority (32) sell surveillance cameras, whilst 31 companies sell biometric technology; this is not a surprise, given the &lt;/span&gt;&lt;a href="http://www.economist.com/node/21542814"&gt;UID scheme&lt;/a&gt;&lt;span&gt; which is rapidly expanding across India. Only &lt;/span&gt;&lt;a href="http://www.clear-trail.com/"&gt;one company&lt;/a&gt;&lt;span&gt; from the sample produces social network analysis software, but this is not to say that this type of technology is low in the Indian market, as this sample was randomly selected and many companies producing this type of software may have been excluded. Moreover, many companies (13) from the sample produce data mining and profiling technology, which could be used in social networking sites and which could have similar - if not the same - capabilities as social network analysis software. Such technology may potentially be aiding the &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System (CMS)&lt;/a&gt;&lt;span&gt;, especially since the project would have to monitor and mine Big Data.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On countless occasions I have been told that surveillance is an issue which concerns the elite and which does not affect the poorer classes, especially since &lt;/span&gt;&lt;a href="https://opennet.net/research/profiles/india"&gt;the majority of the population in India does not even have Internet access&lt;/a&gt;&lt;span&gt;. However, the data in the graph above falsifies this mainstream belief, as many companies operating in India produce and sell phone and SMS monitoring technology, while &lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/half-of-indias-homes-have-cellphones-but-not-toilets/article2992061.ece"&gt;more than half the population owns mobile phones&lt;/a&gt;&lt;span&gt;.  Seeing as companies, such as &lt;/span&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail Technologies&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.shoghicom.com/"&gt;Shoghi Communications&lt;/a&gt;&lt;span&gt;, sell phone monitoring equipment to law enforcement agencies and more than half the population in India has mobile phones, it is probably safe to say that surveillance is an issue which affects everyone, not just the elite.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Did you Know:&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/spywarepic.jpg" alt="Spyware" class="image-inline" title="Spyware" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CARLOS62 on flickr &lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;WSS Security Solutions Pvt. Ltd. is &lt;a href="http://www.wssgroup.in/aboutus.html"&gt;north India´s first CCTV zone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Speck Systems Limited was &lt;a href="http://www.specksystems.com/sub-links/Strengths/core-strengths-UAV.htm"&gt;the first Indian company to design, manufacture and fly a micro UAV indigenously&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Mobile Spy India (Retina-X Studios) has the following &lt;a href="http://www.mobilespy.co.in/"&gt;mobile spying features&lt;/a&gt;: &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;SniperSpy&lt;/i&gt;: remotely monitors smartphones and computers from any location&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;Mobile Spy: &lt;/i&gt;monitors up to three phones and uploads SMS data to a server using GPRS without leaving traces&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;4. Infoserve India Private Limited produces an&lt;a href="http://www.infoserveindia.com/products/26/Internet-Monitoring-System.html"&gt; Internet monitoring System&lt;/a&gt; with the following features:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Intelligence gathering for an entire state or a region&lt;/li&gt;
&lt;li&gt;Builds a chain of suspects from a single start point&lt;/li&gt;
&lt;li&gt;Data loss of less than 2%&lt;/li&gt;
&lt;li&gt;2nd Generation Interception System&lt;/li&gt;
&lt;li&gt;Advanced link analysis and pattern matching algorithms&lt;/li&gt;
&lt;li&gt;Completely Automated System&lt;/li&gt;
&lt;li&gt;Data Processing of up to 10 G/s&lt;/li&gt;
&lt;li&gt;Automated alerts on the capture of suspicious data (usually based on keywords)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;5.  ClearTrail Technologies&lt;b&gt; &lt;/b&gt;deploys &lt;a href="https://www.documentcloud.org/documents/409231-111-cleartrail.html#document/p3/a68269"&gt;spyware into a target´s machine&lt;/a&gt;&lt;br /&gt;6.  Spy Impex&lt;b&gt; &lt;/b&gt;sells &lt;a href="http://www.tradedir.in/s/coca-cola-tin-camera"&gt;Coca Cola Tin Cameras&lt;/a&gt;!&lt;br /&gt;7.  Nice Deal&lt;b&gt; &lt;/b&gt;also sells Coca Cola Spy Cameras, as well as Spy Pen Cameras, Wrist Watch Cameras and &lt;a href="http://www.indiamart.com/nicedeal/spy-hidden-cameras.html"&gt;Lighter Video Cameras&lt;/a&gt; to name a few...&lt;br /&gt;8. Raviraj Technologies&lt;b&gt; &lt;/b&gt;is an Indian company which supplies &lt;a href="http://www.ravirajtech.com/index.html"&gt;RFID and biometric technology&lt;/a&gt; to multiple countries all around the world... Countries served by Raviraj Technologies include non-democracies, such as Zimbabwe and Saudi Arabia...as well as post-revolutionary countries, such as Egypt and Tunisia... Why is this concerning?&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Non-democracies lack adequate privacy and human rights safeguards and by supplying such regimes with biometric and tracking technology, the probability is that this will lead to further &lt;a href="http://www.rogerclarke.com/DV/Biometrics.html"&gt;oppression&lt;/a&gt; within these countries &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Egypt and Tunisia had elections to transit to democracy and by providing them biometric technology, this could lead to further oppression and stifle efforts to increase human rights safeguards&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;“I´m not a terrorist, I have nothing to hide!”&lt;/b&gt;&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/surveillancetechpic.jpg" alt="Surveillance Tec" class="image-inline" title="Surveillance Tec" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/r1chard/"&gt;r1chardm&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It´s not a secret: Everyone knows we are being surveilled, more or less. Everyone is aware of the CCTV cameras (luckily there are public notices to warn us...for now). Most people are aware that the data they upload on Facebook is probably surveilled...one way or the other. Most people are aware that mobile phones can potentially be wiretapped or intercepted. Yet, that does not prevent us from using our smartphones and from disclosing our most intimate secrets to our friends, from uploading hundreds of photos on Facebook and on other social networking sites, or from generally disclosing our personal data on the Internet. The most mainstream argument in regards to surveillance and the disclosure of personal data today appears to be the following:&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;“I´m not a terrorist, I have nothing to hide!”&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Indeed. You may not be a terrorist...and you may &lt;/span&gt;&lt;i&gt;think &lt;/i&gt;&lt;span&gt;you have nothing to hide. But in a surveillance state, to what extent does it really matter if you are a terrorist? And how do we even define ´risky´ and ´non-risky´ information?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Last year at the &lt;/span&gt;&lt;a href="http://lcaunderthestars.org.au/programme/schedule"&gt;linux.conf.au&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://www.youtube.com/watch?v=GMN2360LM_U"&gt;Jacob Appelbaum&lt;/a&gt;&lt;span&gt; stated that in a surveillance state, everyone can potentially be a suspect. The argument “I´m not a terrorist, I have nothing to hide” is merely a psychological coping mechanism when dealing with surveillance and expresses a lack of agency. &lt;/span&gt;&lt;a href="http://www.schneier.com/essay-155.html"&gt;Bruce Schneier&lt;/a&gt;&lt;span&gt; has argued that the psychology of security does not necessarily reflect the reality of security. In other words, we may feel or think that our data is secure because we consider it to ential ´non-risky´ information, but the reality of security may indicate that our data may entail ´risky information´ depending on who is looking at it, when, how and why. I disagree with the distinction between ´risky´ and ´non-risky´ information, as any data can potentially be ´risky´ depending on the circumstances of its access.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;That being said, we do not necessarily need to disclose nude photos or be involved in some criminal organization in order to be tracked. In a surveillance society, &lt;/span&gt;&lt;a href="http://www.schneier.com/blog/archives/2013/03/our_internet_su.html"&gt;we are all potentially suspects&lt;/a&gt;&lt;span&gt;. The mining and profiling of our data may lead to us somehow being linked to someone who, for whatever reason, is a suspect (regardless of whether that person has committed an actual offence) and thus may ultimately end us up being suspects. Perhaps one of our interests (as displayed in our data), our publicly expressed ideas or even our browsing habits may fall under ´suspicious activity´. It´s not really an issue of whether we are involved in a criminal organisation per se or if we are disclosing so-called &lt;/span&gt;&lt;a href="http://www.computerworld.com/s/article/9176265/Half_of_social_networkers_post_risky_information_study_finds_"&gt;´risky information´&lt;/a&gt;&lt;span&gt;.  As long as our data is being surveilled, we are all suspects, which means that &lt;/span&gt;&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412"&gt;we can all potentially be arrested, interrogated and maybe even tortured&lt;/a&gt;&lt;span&gt;, just like any other criminal suspect.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;But what fuels a surveillance society? How can law enforcement agencies mine such huge volumes of data? Many companies, such as the 76 listed in this research, equip law enforcement agencies with the technology to monitor the Internet and our phones, to deploy malware to our computers, to mine and profile our data on social networking sites and to track our vehicles and movement. A main reason why we currently live in a Surveillance State is because the surveillance industry is blooming and currently equipping law enforcement agencies with the technology to watch our every move. Thus companies producing and selling surveillance technologies play an essential role in maintaining the surveillance state and should be accountable for the implications their products have on individuals´ right to privacy and other human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Surveillance technologies, however, are not the only factor which fuels a surveillance state. Companies produce technologies based on the market´s demand and without it, the surveillance industry would not exist. The &lt;/span&gt;&lt;a href="http://www.sourcesecurity.com/news/articles/co-1753-ga.4047.html"&gt;market appears to demand for surveillance technologies&lt;/a&gt;&lt;span&gt; because a pre-existing &lt;/span&gt;&lt;a href="http://www.abc.net.au/tv/bigideas/stories/2012/04/16/3476847.htm"&gt;surveillance culture&lt;/a&gt;&lt;span&gt; has been established which in turn may or may not have been created by political interests of public control. Nonetheless, surveillance appears to be socially integrated. The fact that some of the most profitable businesses in the world, such as &lt;/span&gt;&lt;a href="http://money.cnn.com/magazines/fortune/global500/2012/snapshots/284.html"&gt;3M&lt;/a&gt;&lt;span&gt;, produce and sell surveillance technologies, as well as the fact that, in most countries in the world, it is considered socially prestigious to work in such a company is minimum proof that &lt;/span&gt;&lt;a href="http://www.sscqueens.org/davidlyon/"&gt;surveillance is being socially integrated&lt;/a&gt;&lt;span&gt;. In other words, companies should be accountable in regards to the technologies they produce and who they sell them to, but we should also take into consideration that the only reason why these companies exist to begin with is because there is a demand for them.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;By not opposing to repressive surveillance laws, to the CCTV cameras in every corner, to surveillance schemes -such as &lt;/span&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;NATGRID &lt;/a&gt;&lt;span&gt;and the &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;span&gt; in India- or by handing over our data, &lt;/span&gt;&lt;a href="http://www.schneier.com/essay-167.html"&gt;&lt;i&gt;we &lt;/i&gt;&lt;/a&gt;&lt;a href="http://www.schneier.com/essay-167.html"&gt;are fuelling the surveillance state&lt;/a&gt;&lt;span&gt;. Unlike Orwell's totalitarian state described in 1984, surveillance today does not appear to be imposed in a top-down manner, but rather it appears to be a product of both the Information Revolution &lt;/span&gt;&lt;i&gt;and &lt;/i&gt;&lt;span&gt;of our illusionary sense of control over our personal data. Our ´apathy´ enables surveillance laws to be enacted and companies to produce the technology which will aid law enforcement agencies in putting us all under the microscope. As easy as it would be to blame companies for producing surveillance technologies, the reality of surveillance appears to be much more complicated than that, especially if surveillance is socially integrated.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Yet, the reality in India is that at least 76 companies are producing and selling surveillance technologies and equipping law enforcement agencies with them. This is extremely concerning because &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting"&gt;India lacks privacy legislation &lt;/a&gt;&lt;span&gt;which could safeguard individuals from potential abuse. The fact that India has not enacted a privacy law ultimately means that individuals are not informed when their data is collected, who has access to it, whether it is being processed, shared, disclosed and/or retained. Furthermore, the absence of privacy legislation in India also means that law enforcement agencies are not held liable and this has an impact on accountability and transparency, as it is not possible to determine whether surveillance is effective or not. In other words, there are currently absolutely no safeguards for the individual in India and simultaneously, the rapidly expanding surveillance industry poses major threats to human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Not only does India urgently need privacy legislation to be enacted to safeguard citizens from potential abuse, but the use of all surveillance technologies should be strictly regulated now. As previously mentioned, some companies, such as &lt;/span&gt;&lt;a href="http://www.ravirajtech.com/index.html"&gt;Raviraj Technologies&lt;/a&gt;&lt;span&gt;, are exporting biometric technology to non-democratic countries and to fragile states transitioning to democracy. This should be prevented, as equipping a country - which lacks adequate safeguards for its citizens - with the technology to ultimately control its citizens can potentially have severe effects on human rights within the country. Thus &lt;/span&gt;&lt;a href="https://www.privacyinternational.org/reports/our-response-to-eu-consultation-on-legality-of-exporting-surveillance-and-censorship-3"&gt;export controls&lt;/a&gt;&lt;span&gt; are necessary to prevent the expansion of surveillance technologies to countries which lack legal safeguards for their citizens. This also means that there should be some restrictions to international companies selling surveillance technologies from creating offices in India, since the country currently lacks privacy legislation.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Surveillance technologies can potentially have very severe effects, such as innocent people being arrested, interrogated, tortured...and maybe even &lt;/span&gt;&lt;a href="http://edition.cnn.com/2013/03/15/world/asia/u-n-drone-objections"&gt;murdered&lt;/a&gt;&lt;span&gt; in some states. Should they be treated as weapons? Should the same export restrictions that apply to arms apply to surveillance technologies? Sure, the threat posed by surveillance technologies appears to be indirect. But don't indirect threats usually have worse outcomes in the long run? We may not be terrorists and we may have nothing to hide...but we have no privacy safeguards and a massively expanding surveillance industry in India. We are exposed to danger...to say the least.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers'&gt;https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>surveillance technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T11:59:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-together-april-27-2013-satarupa-sen-bhattacharya-is-free-speech-an-indian-value">
    <title>Is free speech an Indian value?</title>
    <link>https://cis-india.org/news/india-together-april-27-2013-satarupa-sen-bhattacharya-is-free-speech-an-indian-value</link>
    <description>
        &lt;b&gt;Is freedom of speech and expression deeply accepted in Indian society? Or is it merely a European cultural import that made its way along with the English language and appeared in the Constitution because of the founding fathers' genius? Satarupa Sen Bhattacharya reviews Freedom Song, a film and connects the dots. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Satarupa Sen Bhattacharya's blog post was &lt;a class="external-link" href="http://www.indiatogether.org/2013/apr/hrt-freedom.htm"&gt;published in India Together&lt;/a&gt; on April 27, 2013. Snehashish Ghosh is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Debates on freedom of speech can be traced back  to the earliest evolutions of human society, but if there is a time  which could be considered most apposite for this debate to come to the  fore and dominate public thought and discourse, this surely would be it  for Indian society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the banishment of literary icons such as  Salman Rushdie to repeated assaults on artists and cartoonists seeking  to express their viewpoints through their art, and even the gag on the  common man’s voice in traditional and new media, freedom of speech and  expression has found itself under fire increasingly and in the most  alarming of ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is India as a nation becoming more intolerant of  contrarian perspectives, or is it merely that voices seeking to stifle  dissent are now amplified, thanks to a greater number, as well as newer  forms, of media covering this debate?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Can India really achieve free speech in the way that its founding fathers conceived of and constitutionalized it?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are the questions probed in Freedom Song –  a 52-minute documentary from the Public Services Broadcasting Trust,  co-directed by veteran journalist, author and academic Paranjoy Guha  Thakurta and Professor Subi Chaturvedi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Freedom Song, the film&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, since the time &lt;i&gt;Freedom Song&lt;/i&gt; was conceived of and filmed, the clamp-down or attacks on free speech  in India have only become more frequent and flagrant. This was made much  before the time that Salman Rushdie, in almost a repeat of the 2010  Jaipur Lit-fest incident, was stopped by the state from attending the  screening of &lt;i&gt;Midnight’s Children in Kolkata&lt;/i&gt;; or when two young  girls from Palghar in Maharashtra were arrested by the police merely  because one of them had questioned on Facebook the derailment of normal  life in Mumbai following Balasaheb Thackeray’s death and the other had  ‘liked’ it; or even before the long-awaited Kamal Hassan film &lt;i&gt;Vishwaroopam&lt;/i&gt; was banned for purportedly offending the sensibilities of a religious  community in a few scenes, which the director eventually had to agree to  censor in order to ensure that his creation could reach the audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom Song, the documentary, chronologically  precedes all of these as well as the debate and outrage over sociologist  Ashish Nandy’s remarks on corruption and backward castes; yet, when one  sees it now, recalls the numerous incidents highlighted in the film,  and hears the debates that rage on, the larger context and culture that  has facilitated the perpetuation of suppression become clearer. It also  drives home, disturbingly, the alarming regularity with which speech and  expression have been muffled. It can thus be seen as a commentary on  the gradual but consistent build-up to the current climate where there  is an almost systematic and continuous crackdown on free speech whenever  it inconveniences the powers-that-be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Gags on expression - recent incidents&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July 2010, when T.J. Joseph, a professor of  Malayalam at the Newman College in Thodupuzha (Ernakulam district) in  Kerala was arrested by police following a controversial examination  question set by him, allegedly containing disparaging remarks about the  Prophet Mohammad. He was released on bail but suspended from his post  following protests by Islamic organizations. But suspension wasn’t the  last of Joseph’s tribulations: he was brutally attacked by a gang of men  who chopped off his hand at the wrist with an axe. He was also stabbed  in the arms and legs. While Joseph’s hand was stitched back in a  16-hour-long operation, even as he was recuperating, his college  terminated his services on grounds that he had offended the religious  sentiments of students. He was also stripped of all benefits and  pension.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Curiously, Joseph himself distances the entire  incident from the issue of freedom of expression. In his conversation  with the film-makers he says that whatever happened could be interpreted  as attempts to meddle with and dilute academic independence in the  state. “The incident is not related to the issue of freedom of  expression...external attempts to break down communication between  students and their teacher was at the core of the entire episode,” says  Joseph. Even Union Minister for Human Resource Development Shashi  Tharoor, who hails from the state himself, attributes this incident to  the act of some anti-social fringe elements who masquerade as  representatives of a particular community. But these arguments from the  victim himself, and an eminent authority, cannot resolve the question of  his expulsion from service.    Nor can they address the fact that the atmosphere of tolerance in the  country is such that anti-socials can hijack as simple an academic  exercise as question-setting to their advantage and perpetrate such  atrocities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A more recent incident highlighted in the  documentary is the arrest and detention of Ambikesh Mahapatra, a  professor of Chemistry in Jadavpur University of West Bengal for  forwarding a set of cartoons that allegedly defamed Chief Minister  Mamata Banerjee. Shortly after the dismissal of Union Railway Minister,  Trinamool’s Dinesh Trivedi, and his replacement by Mukul Roy, the  widely-circulated cartoon showed Roy and the CM having a conversation  along the lines of one in a very popular Satyajit-Ray film, conspiring  to get rid of Trivedi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ambikesh was not the creator of this cartoon –  as he himself says, he received it on a forwarded email. Amused by it,  he wanted to share it with his friends. Thus he forwarded it again to  over 60 members of his housing co-operative society, some of whom  happened to have affiliations to the party in power. This action led to  the professor being arrested and charged under IPC Sections 509  (insulting the modesty of a woman), Section 500 (defamation) and Section  66 A of the IT Act (causing offence using a computer). He had to spend a  night in jail before he was released on bail the following afternoon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, charges against the professor have  since been dropped and the West Bengal Human Rights Commission (WBHRC)  ruled that the state police were indeed guilty of harassing the  professor (and one of his colleagues, who had also been arrested).&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Paranjoy.png/@@images/81bda2f8-971f-4c46-b7d4-157e5b9a216b.png" alt="Paranjoy Guha Thakurta" class="image-inline" title="Paranjoy Guha Thakurta" /&gt;&lt;/p&gt;
&lt;p&gt;Paranjoy Guha Thakurta, co-director of Freedom Song&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span class="contents2"&gt;&lt;b&gt;Muffling creativity&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="contents2"&gt;One thing that stands out pretty sharply in &lt;i&gt;Freedom Song&lt;/i&gt; is the deep angst shared by the creative fraternity in the country over  the assault on free speech. Perhaps, by dint of being that section of  society which is most inclined to spontaneous and non-conformist  expression, they also constitute one of the most vulnerable groups when  it &lt;/span&gt;&lt;span class="contents2"&gt;comes to being restrained or gagged. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;span class="contents2"&gt;One of the darkest chapters of suppression of  artistic expression in India relates to the forced exile of iconic  painter M F Hussain during the last days of his life, after being  targeted for his nudist depictions of Hindu Gods and Goddesses. Sadly,  as artist Arpana Caur points out, such waves of intolerance or  fanaticism fail to factor in either subjective value judgments (how  deeply Hussain must have loved Hindu culture and mythology to actually  apply his creative instincts to bring it alive) or objective facts (that  the nudist paintings were actually done in the ancient Khajuraho  tradition of figurative depiction, it was not something Hussain had  developed). &lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="contents2"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span class="contents2"&gt;Often, the gag on works by  artists and writers has transcended to direct discrimination against the  person himself. The state of West Bengal banned exiled Bangladeshi  author Taslima Nasreen’s book “Dwikhandito” in 2003 on fears that it  would stoke communal disharmony. When human rights activists challenged  the decision in Court and managed to win rulings on her behalf, the  writer herself was banished from public life in the state. She was  unceremoniously asked to leave the state in 2007, after violent protests  against her by fundamentalists. Much later in 2012, even after the  political reins in the state had changed hands, the launch of her book  at the Kolkata Book Fair was cancelled upon threats of protest. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="contents2"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;One of the most heart-rending is the story of  Pakistani singer Ali Haidar, who confesses to being almost brainwashed,  in one of his weakest moments, by radical elements into believing that  the loss of his child was in fact a retribution for him having taken up  music as a profession.&lt;/p&gt;
&lt;p align="justify"&gt;The feeling of anger, frustration and even a sense of  bewilderment among the artists, writers and performers interviewed in  the documentary is almost palpable. As Rajiv Lochan, Director of the  National Gallery of Modern Art, says, “Freedom of expression, creative  freedom…in simple words, that is the only freedom you are born with...”  The unuttered question of how anyone can take that away from you hangs  heavy in the silence.&lt;/p&gt;
&lt;p align="justify"&gt;If artists are the most vulnerable, they are also  perhaps the most resilient. In the context of the various cartoon  controversies that this nation has seen and the proscriptions of  cartoonists from Shankar to Aseem Trivedi, eminent political cartoonist  Sudhir Tailang says, “We cartoonists know only one way of protest, which  is the most peaceful, Gandhian way…you do what you want, we’ll draw a  cartoon…and more cartoons… we’ll flood you with cartoons.”&lt;/p&gt;
&lt;p align="justify"&gt;The defiance and rejection of censorship is also  strongly voiced by noted danseuse Mallika Sarabhai, who talks of the  various forms of attack and insult that she has been subjected to for  her unconventional presentations and activism, but asserts that despite  all of it, she feels it is her “dharma to go on.”&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span class="contents2"&gt;&lt;b&gt;The language barrier&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span class="contents2"&gt;Perhaps unwittingly, Freedom  Song tends to favour the premise that freedom of speech as a principle  in India is largely a preoccupation among the English-educated,  intellectual and creative segments of the populace. Even the musical  score that has played such a dominant part in invoking the spirit of  freedom throughout the film seems to underline that - from the refrains  of Bob Marley’s ‘Won't you help to sing these songs of freedom,’ to the  remixed pop version of ‘Raghupati Raghav Raja Ram’ that one hears in  parties and joints in India’s westernized urban landscape. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="contents2"&gt;
&lt;p align="justify"&gt;How attuned to the issue of free speech is the wide  majority of India, the section that still follows vernacular media and  are relatively distanced from the constructs of Anglo-Saxon influence?  The verdict on the linguistic divide does not emerge with clear  certainty when we talk to intellectuals or thought leaders from various  parts of the country.&lt;/p&gt;
&lt;p align="justify"&gt;In the words of academic Subhoranjan Dasgupta, a  professor at the Kolkata-based Institute of Development Studies,  mainstream Bengali media has played a big role in highlighting  transgressions of freedom of speech and expression every time it has  occurred, irrespective of the political regime in power at the time.&lt;/p&gt;
&lt;p align="justify"&gt;"Whether in the case of the ban on Taslima Nasreen or  the arrest of Professor Mahapatra, local media - and especially two  widely-followed dailies, the &lt;i&gt;Anandabazar Patrika and Ei Shomoy&lt;/i&gt; -  have been audibly vocal and consistent in their coverage of these  incidents," says Dasgupta. "Irrespective of political ideologies, the  common man in Bengal knows that Taslima Nasreen got a raw deal or that  what happened to the professor was not acceptable," he adds. Ostensibly,  the role of local media in such public consciousness cannot be written  off. In a way, it might not be an exaggeration to say that the voices of  these publications have been instrumental, to a large extent, in  ensuring that these issues grab the eyeballs of the largest number  possible, and hence gain traction.&lt;/p&gt;
&lt;p align="justify"&gt;And yet, a completely different picture emerges as  one reaches out to another part of the country. Badri Seshadri,  Publisher, New Horizon Media - a Chennai-based company that publishes  books in Tamil, and an active blogger, feels that notions of freedom, or  free speech, are essentially offshoots of the modern era which have  found a voice in our country primarily through English media.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span class="contents2"&gt;Seshadri goes back to the  freedom struggle in India when many among the noted thought leaders and  freedom exponents wrote both in English and the local language. In those  days, the discourse on freedom of thought and expression were perhaps  more at par across spheres. But with the dying trend of bilingual  writing, intellectual writing increasingly gravitated towards English.  Today, the gulf between English writers and regional writers has become  so huge in his state that even the most fundamental of issues are  discussed in vocabularies that cannot bridge the schism. Issues  pertaining to secularism and democracy are viewed with a completely  different lens in vernacular media, and those pertaining to liberalism,  not at all. &lt;/span&gt;&lt;/p&gt;
&lt;span class="contents2"&gt;
&lt;p align="justify"&gt;"Take the case of the most recent ban on Kamal  Hassan's Vishwaroopam," points out Seshadri; "this was not a film made  in Hindi or English that you could assume to be emotively disconnected  from the Tamil mindspace. It was a film that had been made by one of the  cult film personalities of the region, and yet even as the national  English media followed this issue and consistently questioned the  violation of an individual's right to creative freedom, deliberations in  local channels and publications were strangely muted and focused only  on whether or not the disputed scenes in the film could be considered to  be offensive to the Islamic community. The larger debate on whether one  has the right to offend, in an impersonal way, was completely missing."  Those who want to toe the line of liberalism either through their  writing or new media are dismissed as harbouring "fancy" ideals or  pandering to Western sensibilities.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span class="contents2"&gt;Guhathakurta, himself, disagrees with the claim  that free expression is essentially a Western construct or that debates  around it are restricted to the chattering classes in plush drawing  rooms. “It is something that concerns every common man,” he says,  referring to the case of Laxmi Oraon, the teenaged tribal girl who was  stripped, beaten and molested in the streets of Guwahati, where she had  been part of a peaceful protest rally, seeking the inclusion of 80 lakh  Adivasis living in Assam in the ST category. Traumatised and deeply  angered by the brutal injustice meted out to her and the lack of legal  redress, Laxmi eventually even contested the Lok Sabha elections, points  out the director in order to elucidate the struggle that even the most  marginalized take part in to press for their fundamental rights. &lt;/span&gt;&lt;/p&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/FreeSong.png" alt="Freedom Song Movie" class="image-inline" title="Freedom Song Movie" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;A still from the documentary Freedom Song. Pic: PSBT India via Youtube&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;span class="contents2"&gt;&lt;span class="contents2"&gt;&lt;span class="contents2"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span class="contents2"&gt;&lt;b&gt;"Reasonable” restrictions&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="contents2"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;Despite the continuous  infringements on artistic and even individual expression, what emerges  from the film is not a blanket wave of intolerance that is engulfing  society but rather certain powerful groups with vested interests who are  driven either by fanaticism for their ideologies or by the lure of  political mileage to raise voices against freedom. In the age of 24x7  channels, their voices gain in both volume and pitch and new media  enables greater visibility and debate around it.&lt;/p&gt;
&lt;p align="justify"&gt;As Tharoor says, “The government has the lowest level  of tolerance possible because it cannot be seen as offending anybody  who is held precious by any segments of Indian society.”&lt;/p&gt;
&lt;p align="justify"&gt;Veteran journalist Saeed Naqvi points out, “You have a  whole link between the politician, the vote bank and the proprietor.  Therefore, the freedom of the press, while this trio exists, is under  threat.”&lt;/p&gt;
&lt;p align="justify"&gt;But having said all of the above, it is also clear  that defining freedom, especially in an absolute sense, is in itself a  huge challenge that most of society acknowledges. More so, in the  context of Article 19 (2) of the Constitution which itself allows the  state to impose &lt;i&gt;“reasonable restrictions on the exercise of the  right...in the interests of the sovereignty and integrity of India, the  security of the State, friendly relations with foreign States, public  order, decency or morality or in relation to contempt of court,  defamation or incitement to an offence.”&lt;/i&gt;&lt;/p&gt;
&lt;p align="justify"&gt;Senior journalists such as  Rajdeep Sardesai are quoted in the documentary, expressing their support  for such ‘reasonable restrictions’ to combat the spread of expression  or opinion that fuels divisiveness or hatred in society. But the fact  remains that such restrictions not only add a qualifier to freedom as  enshrined in the founding principles, but also create the larger  question of ‘who decides?’&lt;/p&gt;
&lt;p align="justify"&gt;Young India however would prefer to see Article 19  (2) as an enabler rather than as a veto. As Apar Gupta, an advocate of  the Supreme Court says in the film, he would like to believe that the  incorporation of “reasonable restrictions” was done with a view to  ensuring that the Constitution does not remain a static document and  does not apply only to fixed definitions of facts and circumstances.  Certainly not with the objective of curbing any form of dissent or  deviation from convention.&lt;/p&gt;
&lt;p align="justify"&gt;Fali S. Nariman, senior advocate to the Supreme Court  and a constitutional jurist, also points out very pertinently that the  range of restrictions in 19(2) does not include public interest.&lt;/p&gt;
&lt;p align="justify"&gt;Reality does not bear that out though; especially  when one looks at the many recent instances of arbitrary impositions of  Sec 66A of the IT Act in booking individuals for expression of their  opinion and stances through channels offered by new media and Internet.  The documentary in itself does not delve deep into the challenges and  threats to freedom of expression that have emerged in the FB/Twitter  era, perhaps because many of the most volatile and controversial cases  surrounding freedom of speech on the Internet occurred after the film  was made. But a new debate is brewing in India, especially after the  Palghar incident or the arrest of a Puducherry businessman for allegedly  posting 'offensive' text on the micro-blogging site Twitter about the  son of an Union Minister.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span class="contents2"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;Snehashish Ghosh, a lawyer  and Policy Associate at the Centre for Internet and Society, Bangalore,  says, “Essentially, there are eight restrictions on freedom of speech  and expression as enumerated in Article 19(2) of the Constitution. The  Supreme Court in many cases has held that these reasonable restrictions  should be construed narrowly and with due regards to the value of  freedom of speech in a democratic society. Section 66A in its current  form goes well beyond the restrictions laid down under Article 19(2).  Therefore, it is liable to be struck down for being in violation of  Article 19(1)(a) of the Constitution.”&lt;/p&gt;
&lt;p align="justify"&gt;Snehashish also feels that technologically, in the  present time, it would be near-impossible to 'monitor' the Internet. As  far as regulations are concerned, there are laws already in place which  ensure the implementation of reasonable restrictions. For example, the  Indian Penal Code, 1860 already covers offenses such as incitement of  violence, obscenity, criminal intimidation and outraging religious  sentiments. The laws which are being applied offline are well equipped  to deal with offenses committed online. There is no need to have  extraordinary laws where ordinary laws suffice.&lt;/p&gt;
&lt;p align="justify"&gt;But in a country that appears to grow increasingly thin-skinned with time, the import of such logic could well be lost.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span class="contents2"&gt;&lt;b&gt;Access and freedom&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p align="justify"&gt;Interestingly, Freedom Song  begins with a series of frames capturing the widely different and  divergent faces of Indian society, fast moving scenes juxtaposing the  educated, affluent sections of urban India against the child who  performs on sidewalks to earn his bread or the old emaciated man getting  his night’s sleep on the pavement. The clear correlation between access  – to basic needs, education and media – and the very consciousness of  freedom is hard to ignore.&lt;/p&gt;
&lt;p align="justify"&gt;“Freedom to me is the ability to do what I want,  where no one tells me to do anything” says one child on screen,  evidently from an English-speaking, relatively privileged background;  but one cannot help feeling that his coherence and articulation on  freedom would be hard to come across in the children on the streets who  are filmed in some of the previous shots.&lt;/p&gt;
&lt;p align="justify"&gt;The point that access to the very basic necessities  of life is a necessary condition for freedom of expression is driven  home by social activist Ram Bhat in the documentary, who says that  despite the technologies aiding free expression, and the profusion of  players in this debate, talk of freedom of speech will be pointless  unless the problem of access is solved. In its absence, such freedom  will remain the privilege of a few.&lt;/p&gt;
&lt;p align="justify"&gt;On balance, in all the voices that emerge from our conversations, and the many more episodes that &lt;i&gt;Freedom Song&lt;/i&gt;,  the documentary narrates, the only thing that can be concluded without  doubt is the challenge of establishing freedom as a perennial or  permanent concept in a country as complex and diverse as India. A truly  effective and desirable state of free speech and expression can only  evolve out of a continuous, fearless, rational dialogue between society  and its stakeholders, in which all voices are expressed and heard.&lt;/p&gt;
&lt;p align="justify"&gt;Whether India, as a whole, can facilitate such a dialogue is going to be the moot question in the times to come.&lt;/p&gt;
&lt;p&gt;&lt;span class="contents2"&gt;&lt;span class="contents2"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;div id="_mcePaste"&gt;﻿&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-together-april-27-2013-satarupa-sen-bhattacharya-is-free-speech-an-indian-value'&gt;https://cis-india.org/news/india-together-april-27-2013-satarupa-sen-bhattacharya-is-free-speech-an-indian-value&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-30T07:18:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison">
    <title>IT (Amendment) Act, 2008, 69B Rules: Draft and Final Version Comparison</title>
    <link>https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of  the Draft 69B Rules and official 69B Rules under Section 69B in order to  better understand how the two are similar and how they differ. Notes have been included on some changes we deemed to be important.&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc6.png" alt="c6" class="image-inline" title="c6" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc7.png" alt="c7" class="image-inline" title="c7" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There has been a considerable amount of re-arrangement and re-structuring of the various clauses between the 69B Draft Rules and the official Rules, as can be seen in the comparison chart, but very little content has been changed. The majority of the changes made to the official Rules are changes in wording and language that serve to provide some much-needed clarification to the Draft Rules (see the differences between Clause (9) of the Draft Rules and sub-section (4) of Clause (3) of the official Rules as an example). Language redundancies, as well as full clauses (Clause [6] of the Draft Rules) have been thankfully removed in the official Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aside from the addition of four definitions, including a definition for a “security policy”, a phrase which appears in the Draft Rules without being defined, Clause (2) contains what is most likely one of the more noteable changes between the two definitions: under sub-section (g) in the 69 Rules, the words “or unauthorised use” have been added to the definition of “cyber security breaches”, which significantly increases the scope of what can be considered a cyber security breach under the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A significant change between the two sets of rules can be found in sub-section (2) of Clause (8) of the official rules, which states that, “&lt;i&gt;save as otherwise required for the purpose of any ongoing investigation, criminal complaint or legal proceedings &lt;/i&gt;the intermediary or the person in-charge of computer resource shall destroy records pertaining to directions for monitoring or collection of information”. The section in italics has been added to the original Clause (22) of the Draft Rules, meaning that when the Rules were originally drawn up, no exceptions were to be made for the destructions of the records for the issuing of directions for monitoring and/or the collected information. They would simply have to be destroyed within six months of the discontinuance of the monitoring/collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One change that may or may not be significant is the replacement of the words “established violations” in the Draft Rules to simply “violation” in the official Rules in Clauses (19)/(6), which deal with the responsibility of the intermediary. This could be taken to mean that suspected and/or perceived violations may also be punishable under this clause, but this is a hard stance to argue. Most likely the adjustment was made when those superfluous and/or convoluted parts of the Draft rules were being removed.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison'&gt;https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-04-30T09:47:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison">
    <title>IT (Amendment) Act, 2008, 69 Rules: Draft and Final Version Comparison</title>
    <link>https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of the Draft 69 Rules and official 69 Rules under Section 69B in order to better understand how the two are similar and how they differ. Very brief notes have been included on some changes we deemed to be important.
&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc6.png" alt="c6" class="image-inline" title="c6" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc7.png" alt="c7" class="image-inline" title="c7" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc8.png" alt="c8" class="image-inline" title="c8" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/pc9.png" alt="c9" class="image-inline" title="c9" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Similar to the other comparisons that I have done on the 69A and 69B Draft and official Rules, the majority of the changes between these two sets of rules serves to restructure and clarify various clauses in the Draft 69 Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three new definitions appear in the Clause (2) of the 69 Rules, including a definition for “communication”, which appears in the Draft Rules but has no associated definition under Clause (2) of the Draft Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (31) of the Draft Rules, which deals with the requirement of security agencies of the State and Union territories to share any information gathered through interception, monitoring and/or decryption with federal agencies, does not make an appearance in the official rules. Further, this necessity does not seem to be implied anywhere in the official 69 Rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison'&gt;https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-04-30T09:56:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2013-bulletin">
    <title>April 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2013-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) welcomes you to the fourth issue of its newsletter for the year 2013. In this issue we bring you an overview of our research programs, updates of events organised by us, events we participated in, news and media coverage, and videos of some of our recent events.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis"&gt;&lt;b&gt;Celebrating 5 Years of CIS&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;We at the Centre for Internet and Society celebrate 5 years of existence with an exhibition showcasing our work and accomplishments over this time. The exhibition will be held concurrently at both our Bangalore and Delhi offices from May 20 to 24, 2013, from 10 a.m. to 8 p.m.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013"&gt;Google Policy Fellowship&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;CIS is inviting applications for the Google Policy Fellowship programme. Google is providing a USD 7,500 stipend to the India fellow who will be selected by July 1, 2013. Fellowship focus areas include Access to Knowledge, Openness in India, Freedom of Expression, Privacy, and Telecom Send in your applications for the position by June 15, 2013.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt; CIS invites applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project), and &lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.  CIS also invites applications for the post of &lt;a href="https://cis-india.org/jobs/programme-officer-pilot-projects-access-to-knowledge"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge, Pilot Projects). To apply for this position send your resume to &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. One is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another is for developing a screen reader and text-to- speech synthesizer for Indian languages. CIS is also working with the World Blind Union and many other organisations to develop a Treaty for the Visually Impaired helped by the WIPO:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapters on Himachal Pradesh, Goa, Jammu and Kashmir and Rajasthan:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-himachal-pradesh-call-for-comments"&gt;The Himachal Pradesh Chapter&lt;/a&gt; (by Anandhi Viswanathan, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-goa-call-for-comments"&gt;Goa Chapter&lt;/a&gt; (by Anandhi Viswanathan, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-jammu-kashmir-call-for-comments"&gt;The Jammu &amp;amp; Kashmir Chapter&lt;/a&gt; (by Anandhi Viswanathan, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-rajasthan-call-for-comments"&gt;The Rajasthan Chapter&lt;/a&gt; (by Manojna Yeluri, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: &lt;i&gt;All of these are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/girls-in-ict-day-mithra-jyothi"&gt;Girls in ICT Day&lt;/a&gt; (April 25, 2013, Mitra Jyothi Auditorium, HSR Layout, Bangalore). Dr. U.B. Pavanaja gave a talk on Social Media and Kannada Language for Women with Disabilities. Sara Morais wrote an event report.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/events/global-accessibility-awareness-day-2013"&gt;Global Accessibility Awareness Day&lt;/a&gt; (May 9, 2013, TERI, Southern Regional Centre, Domlur, Bangalore).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/cis-itu-d-sector-membership"&gt;CIS Gets ITU-D Sector Membership&lt;/a&gt;: CIS has become a sector member of ITU-D.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two year grant of INR 26,000,000 to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;Beginning from September 1, 2012, Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of four members based in Delhi: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt;, and one team member &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; who is working from Bangalore office. &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;, Programme Officer has left the organisation. April 24, 2013 was her last working day.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Indic Wikipedia Visualisation Project&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages"&gt;Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/indian-wiki-women-history-month"&gt;Indian WikiWomen celebrate Women’s History Month&lt;/a&gt; (by Netha Hussain, April 29, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/konkani-wikipedia-analysis"&gt;Analysis of Konkani Wikipedia: Facts &amp;amp; Challenges&lt;/a&gt; (by Nitika Tandon, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-needs-assessment"&gt;Odia Wikipedia: Needs Assessment&lt;/a&gt; (by Subhashish Panigrahi, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop-udupi-april-29-2013"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (April 29, 2013, Govinda Pai Research Centre, MGM College Udupi). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;br /&gt;The following events were organised in the month of March but reports were written during the month of April. Vishnu Vardhan and Subhashish Panigrahi held meetings with wikipedians:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wiki-meet-up-kolkata"&gt;Kolkata Wiki Community Meetup&lt;/a&gt; (organised by CIS and Kolkata Wiki Community, March 14, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-cuttack-community-meetup-march-16-2013"&gt;Odia Wikipedia - Cuttack Community Meetup&lt;/a&gt; (organised by CIS and Odia Wiki Community, Cuttack, March 16, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-meet-up-bhubaneswar-march-17-2013"&gt;Odia Wikipedia – Bhubaneswar Community Meetup&lt;/a&gt; (organised by CIS and Odia Wiki Community, Bhubaneswar, March 17, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The following event was organised in the month of April. We will be publishing the report soon:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/telegu-wiki-mahotsavam-2013"&gt;Telugu Wiki Mahotsavam 2013&lt;/a&gt; (organised by Telugu Wikipedia Community and CIS, Hyderabad, April 9 – 11, 2013). Vishnu Vardhan was one of the trainers at the Wikipedia Academy at Centre for Good Governance on April 9, 2013. Vishnu Vardhan spoke about the Access to Knowledge work in one of the sessions of Wikimedia Meeting with Media Heads on April 10, 2013. Vishnu Vardhan gave a talk on A2K’s plans for the growth of Telegu Wikipedia in 2013-14 at the Telegu Wikipedia general meeting on April 11, 2013. Vishnu Vardhan also gave a talk about Access to Knowledge in the digital era at the Wiki Chaitanya Vedika on April 11, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Other &lt;/b&gt;&lt;a href="https://cis-india.org/a2k"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/a&gt;&lt;b&gt; Updates&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;WIPO&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/cis-intervention-eu-blocking-wipo-treaty-for-blind"&gt;CIS Intervention on the Treaty for the Visually Impaired at SCCR/SS/GE/2/13&lt;/a&gt; (Geneva, April 18 – 20, 2013).  Pranesh Prakash participated in the session and spoke about the rights of the visually impaired.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes. Currently, CIS is doing a project with &lt;b&gt;Privacy International&lt;/b&gt;, London to facilitate research and events around surveillance, and freedom of speech and expression.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Information Technology&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison"&gt;IT (Amendment) Act, 2008, 69A Rules: Draft and Final Version Comparison&lt;/a&gt; (by Jadine Lannon, April 27, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules"&gt;Indian Telegraph Act, 1885, 419A Rules and IT (Amendment) Act, 2008, 69 Rules&lt;/a&gt; (by Jadine Lannon, April 28, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison"&gt;IT (Amendment) Act, 2008, 69 Rules: Draft and Final Version Comparison&lt;/a&gt; (by Jadine Lannon, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison"&gt;IT (Amendment) Act, 2008, 69B Rules: Draft and Final Version Comparison&lt;/a&gt; (by Jadine Lannon, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Resources&lt;/b&gt;&lt;br /&gt;The below rules were published recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009"&gt;Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/resources/indian-telegraph-act-section-419-a-rules"&gt;Rules Under Section 419A of the Indian Telegraph Act, 1885&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record"&gt;Off the Record&lt;/a&gt; (by Nishant Shah, Indian Express, April 6, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;India´s ´Big Brother´: The Central Monitoring System&lt;/a&gt; (CMS) (by Maria Xynou, April 8, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;br /&gt;Maria Xynou gives an overview of the discussions and recommendations from the privacy round tables held in Delhi and Bangalore:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting"&gt;A Privacy Round Table in Delhi&lt;/a&gt; (organized by CIS and Federation of Indian Chambers of Commerce and Industry, FICCI Federation House, Tansen Marg, New Delhi, April 3, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table"&gt;A Privacy Round Table in Bangalore&lt;/a&gt; (organized by CIS and Federation of Indian Chambers of Commerce and Industry, Jayamahal Palace, Jayamahal Road, Bangalore, April 20, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;2nd Expert Committee meeting on draft 'Human DNA Profiling Bill 2012': The Department of Biotechnology has constituted an Expert Committee to discuss various issues of this Bill in detail. Sunil Abraham has been nominated as one of the members of this Committee. A meeting of this Expert Committee has been scheduled for May 13, 2013 under the Chairmanship of Dr. T. S. Rao, Adviser, DBT.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chinmayi Arun is one of the international experts supporting the Internet &amp;amp; Jurisdiction project, a global multi-stakeholder dialogue process.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table-chennai"&gt;A Privacy Round Table in Chennai&lt;/a&gt; (co-organised with Data Security Council of India and the Federation of Indian Chambers of Commerce and Industry, Residency Towers, Sir Thyagaraja Road, T Nagar, Chennai, May 18, 10.30 a.m. to 4.00 p.m.).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore"&gt;Consilience – 2013&lt;/a&gt; (National Law School of India University, Bangalore, May 26 – 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Other Event Hosted&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni"&gt;Or-bits.com — A Talk by Marialaura Ghidini&lt;/a&gt; (CIS, Bangalore, April 19, 2013). Marialaura Ghidini gave a talk abou the creation and activities of or-bits.com, a web-based curatorial platform that she founded in 2009.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News and Media&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-april-1-2013-prashant-jha-clarify-and-define-terms-in-it-rules-panel-tells-govt"&gt;Clarify and define terms in IT rules, panel tells govt&lt;/a&gt;. (by Prashant Jha, Hindu, April 1, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation"&gt;India takes its first serious step toward privacy regulation – but it may be misguided&lt;/a&gt; (Privacy Surgeon, April 9, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary"&gt;Regulating Social Media: Unrealistic, Impossible, Necessary?&lt;/a&gt; (NDTV, April 11, 2013). Pranesh Prakash participated in a discussion on social media aired on NDTV.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014"&gt;Social media may influence 160 LS seats in 2014&lt;/a&gt; (by Zia Haq, Hindustan Times, April 12, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wall-street-journal-april-15-2013-r-jai-krishna-vote-will-social-media-impact-the-election"&gt;Vote: Will Social Media Impact the Election?&lt;/a&gt; (by R. Jai Krishna, Wall Street Journal, April 15, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net"&gt;Untangling the web of India's 'ungovernable' Net&lt;/a&gt; (Deutsche Welle, April 15, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/gni-annual-report-mentions-cis"&gt;CIS in GNI Annual Report&lt;/a&gt; (April 25, 2013). CIS gets mentioned in GNI Annual Report. Sunil Abraham is quoted in it. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/india-together-april-27-2013-satarupa-sen-bhattacharya-is-free-speech-an-indian-value"&gt;Is free speech an Indian value?&lt;/a&gt; (by Satarupa Sen Bhattacharya, India Together, April 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS in partnership with the Ford Foundation is executing a project on Internet Access. It covers the history of the internet, technologies involved, principle and values of internet access, broadband market and universal access and will touch upon various polices and regulations which has an impact on internet access and bodies and mechanism which are responsible for formulation policies related to internet access. The blog posts and modules will be published in a new website: &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;br /&gt;We are hosting an “Institute on Internet and Society” with the support of Ford Foundation India, which is to be held from June 8, 2013 to June 14, 2013. Call for registration and relevant details have been &lt;a href="http://www.internet-institute.in/"&gt;announced&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The following units have been published:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-infrastructure"&gt;Internet Infrastructure&lt;/a&gt; (by Srividya Vaidyanathan, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/isp-introduction"&gt;Internet Service Provider – Introduction&lt;/a&gt; (by Srividya Vaidyanathan, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility of telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-april-4-2013-prioritizing-communications-energy"&gt;Prioritizing Communications &amp;amp; Energy&lt;/a&gt; (by Shyam Ponappa, Business Standard and Organizing India Blogspot, April 4, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/open-citizen-radio-networks-to-race-for-.radio-gtld"&gt;From Open Citizen Radio Networks to the Race for .RADIO gTLD&lt;/a&gt; (by Sharath Chandra Ram, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Broadband Policy Course (organised by Lirne Asia, Bangalore, April 5 – 6, 2013). Nirmita Narasimhan and Snehashish Ghosh attended the course.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;br /&gt; &lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2013-bulletin'&gt;https://cis-india.org/about/newsletters/april-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-05-31T08:07:38Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules">
    <title>Indian Telegraph Act, 1885, 419A Rules and IT (Amendment) Act, 2008, 69 Rules</title>
    <link>https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of the 419A Rules of the Indian Telegraph Act, 1885 and the 69 Rules under Section 69 of the Information Technology (Amendment) Act, 2008 in order to better understand how the two are similar and how they differ. Though they are from different Acts entirely, the Rules are very similar. Notes have been included on some changes we deemed to be important. &lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Though they are from different Acts entirely, the 419A Rules from the Indian Telegraph Act of 1885 and the 69 Rules from the Information Technology (Amended) Act, 2008 are very similar. In fact, much of the language that appears in the official 69 rules is very close, if not the same in many places, as the language found in the 419A rules. The majority of the change in language between the 419A Rules and the equivalent 69 Rules acts to clarify statements or wordings that may appear vague in the former. Aside from this, it appears that many of the 69 Rules have been cut-and-pasted from the 419A Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arguably the most important change between the two sets of rules takes place between Clause (3) of the 419A Rules and Clause (8) of the 69 Rules, where the phrase “while issuing directions [...] the officer shall consider possibility of acquiring the necessary information by other means” has been changed to “the competent authority shall, &lt;i&gt;before issuing&lt;/i&gt; any direction under Rule (3), consider possibility of acquiring the necessary information by other means”. This is an important distinction, as the latter requires other options to be looked at before issuing the order for any interception or monitoring or decryption of any information, whereas the former could possibly allow the interception of messages while other options to gather the “necessary” information are being considered. It seems unreasonable that the state and various state-approved agencies could possibly be intercepting the personal messages of Indian citizens in order to gather “necessary” information without having first established that interception was a last resort.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another potentially significant change between the rules can be found between Clause (15) of the 419A Rules, which states, in the context of punishment of a service provider, the action taken shall include “not only fine but also suspension or revocation of their licenses”, whereas Clause (21) of the 69 Rules states that the punishment of an intermediary or person in-charge of computer resources “shall be liable for any action under the relevant provisions of the time being in force”. This is an interesting distinction, possibly made to avoid issues with legal arbitrariness associated with assigning punishments that differ for those punishments for the same activities laid out under the Indian Penal Code. Either way, the punishments for a violation of the maintenance of secrecy and confidentiality as well as unauthorized interception (or monitoring or decryption) could potentially be much harsher under the 69 Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the same vein, the most significant clarification through a change in language takes place between Clause (10) of the 419A and Clause (14) of the 69 Rules: “the service providers shall designate &lt;i&gt;two senior executives&lt;/i&gt; of the company” from the 419A Rules appears as “every intermediary or person in-charge of computer resource shall designate &lt;i&gt;an officer to receive requisition, and another officer to handle such requisition&lt;/i&gt;” in the 69 Rules. This may be an actual difference between the two sets of Rules, but either way, it appears to be the most significant change between the equivalent Clauses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The addition of certain clauses in the 69 Rules can also give us some interesting insights about what was of concern when the 419A rules were being written. To begin, the 419A rules provide no definitions for any of the specific terms used in the Rules, whereas the 69 Rules include a list of definitions in Clause (2). Clause (4) of 69 Rules, which deals which the authorisation of an agency of the Government to perform interception, monitoring and decryption, is sorely lacking in the 419A rules, which alludes to “authorised security [agencies]” without ever providing any framework as to how these agencies become authorised or who should be doing the authorising.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 69 Rules also include Clause (5), which deals with how a state should go about obtaining authorisation to issue directions for interception, monitoring and/or decryption in territories outside of its jurisdiction, which is never mentioned in 419A rules, lamely sentencing states to carry out the interception of messages only within their own jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, Clause (24), which deals with the prohibition of interception, monitoring and/or decryption of information without authorisation, and Clause (25), which deals with the prohibition of the disclosure of intercepted, monitored and/or decrypted information, have fortunately been added to the 69 Rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules'&gt;https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-30T10:04:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india">
    <title>Surveillance technology companies operating in India - spreadsheet</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has started investigating surveillance technology companies operating in India! This spreadsheet entails the first 77 companies which are being researched. &lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india'&gt;https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-27T16:29:14Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951">
    <title>Rule 419A of the Indian Telegraph Rules, 1951</title>
    <link>https://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951</link>
    <description>
        &lt;b&gt;The Central Government made the following rules to amend the Indian Telegraph Rules, 1951.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;G.S.R. 193 (E).&lt;/b&gt;— In exercise of the powers conferred by Section 7 of the Indian Telegraph Act, 1885 (13 of 1885), the Central Government hereby makes the following rules further to amend the Indian Telegraph Rules, 1951, namely:—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10  (1) These rules may be called the Indian Telegraph (Amendment) Rules, 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) They shall come into force on the date of their publication in the Official Gazette.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20  In the Indian Telegraph Rules, 1951, after rule 419, the following rule shall be substituted, namely:—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; 419-A. (1) Directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 (hereinafter referred to as the said (Act) shall not be issued except by an order made by the Secretary to the Government of India in the Ministry of Home Affairs in the case of Government of India and by the Secretary to the State Government in-charge of the Home Department in the case of a State Government. In unavoidable circumstances, such order may be made by an officer, not below the rank of a Joint Secretary to the Government of India, who has been duly authorized by the Union Home Secretary or the State Home Secretary, as the case may be:&lt;/p&gt;
&lt;p&gt;Provided that in emergent cases—&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;(i) in remote areas, where obtaining of prior directions for interception of messages or class of messages is not feasible; or&lt;br /&gt;(ii) for operational reasons, where obtaining of prior directions for interception of message or class of messages is not feasible;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;the required interception of any message or class of messages shall be carried out with the prior approval of the Head or the second senior most officer of the authorized security &lt;i&gt;i.e.&lt;/i&gt; Law Enforcement Agency at the Central Level and the officers authorised in this behalf, not below the rank of Inspector General of Police at the state level but the concerned competent authority shall be informed of such interceptions by the approving authority within three working days and that such interceptions shall be got confirmed by the concerned competent authority within a period of seven working days. If the confirmation from the competent authority is not received within the stipulated seven days, such interception shall cease and the same message or class of messages shall not be intercepted thereafter without the prior approval of the Union Home Secretary or the State Home Secretary, as the case may be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Any order issued by the competent authority under sub-rule (1) shall contain reasons for such direction and a copy of such order shall be forwarded to the concerned Review Committee within a period of seven working days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) While issuing directions under sub-rule (1) the officer shall consider possibility of acquiring the necessary information by other means and the directions under sub-rule (1) shall be issued only when it is not possible to acquire the information by any other reasonable means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The interception directed shall be the interception of any message or class of messages as are sent to or from any person or class of persons or relating to any particular subject whether such message or class of messages are received with one or more addresses, specified in the order, being an address or addresses likely to be used for the transmission of communications from or to one particular person specified or described in the order or one particular set of premises specified or described in the order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(5) The directions shall specify the name and designation of the officer or the authority to whom the intercepted message or class of messages is to be disclosed and also specify that the use of intercepted message or class of messages shall be subject to the provisions of sub-section (2) of Section 5 of the said Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(6) The directions for interception shall remain in force, unless revoked earlier, for a period not exceeding sixty days from the date of issue and may be renewed but the same shall not remain in force beyond a total period of one hundred and eighty days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(7) The directions for interception issued under sub-rule (1) shall be conveyed to the designated officers of the licensee(s) who have been granted licenses under Section 4 of the said Act, in writing by an officer not below the rank of Superintendent of Police or Additional Superintendent of Police or the officer of the equivalent rank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(8) The officer authorized to intercept any message or class of message shall maintain proper records mentioning therein, the intercepted message or class of messages, the particulars of persons whose message has been intercepted, the name and other particulars of the officer or the authority to whom the intercepted message or class of messages has been disclosed, the number of copies of the intercepted message or class of messages made and the mode or the method by which such copies are made, the date of destruction of the copies and the duration within which the directions remain in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(9) All the requisitioning security agencies shall designate one or more nodal officers not below the rank of Superintendent of Police or Additional Superintendent of Police or the officer of the equivalent rank to authenticate and send the requisitions for interception to the designated officers of the concerned service providers to be delivered by an officer not below the rank of Sub-lnspector of Police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(10) The service providers shall designate two senior executives of the company in every licensed service area/State/Union Territory as the nodal officers to receive and handle such requisitions for interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(11) The designated nodal officers of the service providers shall issue acknowledgment letters to the concerned security and Law Enforcement Agency within two hours on receipt of intimations for interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(12) The system of designated nodal officers for communicating and receiving the requisitions for interceptions shall also be followed in emergent cases/unavoidable cases where prior approval of the competent authority has not been obtained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(13) The designated nodal officers of the service providers shall forward every fifteen days a list of interception authorizations received by them during the preceding fortnight to the nodal officers of the security and Law Enforcement Agencies for confirmation of the authenticity of such authorizations. The list should include details such as the reference and date of orders of the Union Home Secretary or State Home Secretary, date and time of receipt of such orders and the date and time of Implementation of such orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(14) The service providers shall put in place adequate and effective internal checks to ensure that unauthorized interception of messages does not take place and extreme secrecy is maintained and utmost care and precaution is taken in the matter of interception of messages as it affects privacy of citizens and also that this matter is handled only by the designated nodal officers of the company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(15) The service providers are responsible for actions for their employees also. In case of established violation of license conditions pertaining to maintenance of secrecy and confidentiality of information and unauthorized interception of communication, action shall be taken against the service providers as per Sections 20, 20-A, 23 &amp;amp; 24 of the said Act, and this shall include not only fine but also suspension or revocation of their licenses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(16) The Central Government and the State Government, as the case may be, shall constitute a Review Committee. The Review Committee to be constituted by the Central Government shall consist of the following, namely:&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;(a) Cabinet Secretary                                                                                       —  Chairman&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;(b) Secretary to the Government of India Incharge, Legal Affairs                            —  Member&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;(c) Secretary to the Government of India, Department of Telecommunications         —  Member&lt;/p&gt;
&lt;p&gt;The Review Committee to be constituted by a State Government shall consist of the following, namely:&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;(a) Chief Secretary                                                                                            — Chairman&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;(b) Secretary Law/Legal Remembrancer Incharge, Legal Affairs                             — Member&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;(c) Secretary to the State Government (other than the Home Secretary)                 — Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(17) The Review Committee shall meet at least once in two months and record its findings whether the directions issued under sub-rule (1) are in accordance with the provisions of sub-section (2) of Section 5 of the said Act. When the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above it may set aside the directions and orders for destruction of the copies of the intercepted message or class of messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(18) Records pertaining to such directions for interception and of intercepted messages shall be destroyed by the relevant competent authority and the authorized security and Law Enforcement Agencies every six months unless these are, or likely to be, required for functional requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(19) The service providers shall destroy records pertaining to directions for interception of message within two months of discontinuance of the interception of such messages and in doing so they shall maintain extreme secrecy.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Subs, by G.S.R. 193 (E), dated 1.3.2007 (w.e.f. 12.3.2007).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951'&gt;https://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-19T07:16:04Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network">
    <title>When Netas Network</title>
    <link>https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network</link>
    <description>
        &lt;b&gt;In September 2009, a freshly re-elected Congress took exception to a light-hearted tweet by its newly inducted minister Shashi Tharoor, chastising him not only for causing offence but also for being too quick to air his views on social media. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Rukmini Shrinivasan was &lt;a class="external-link" href="http://www.timescrest.com/coverstory/when-netas-network-10207"&gt;published in the Times of India&lt;/a&gt; on April 27, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;So much can change in less than four years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rocked by allegations of corruption, and with anti-incumbency firmly  setting in, the Congress is struggling to reconnect with voters, and is  belatedly embracing social media. Tharoor has had the last laugh;his  social media activity has earned him praise and is being emulated by  others in his cabinet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As political discussion spills over from the neighbourhood tea shop and  coffee house to Facebook and Twitter, their potential impact on  electoral politics is something that those in power and those hoping to  get there are taking very, very seriously. &lt;br /&gt;&lt;br /&gt;The BJP runs its  social media operation out of its headquarters in Delhi. Most of the  party's top leaders have an official Facebook page and a verified  Twitter handle, while others, including octogenarian L K Advani, blog.&lt;br /&gt;&lt;br /&gt;The  Congress is late to the party;it does not have an official Twitter  account and has such a halfhearted Facebook presence that it isn't  immediately clear that it's official. But it seems to be waking up -  young leaders including Deepender Hooda are now part of a social media  strategy team, and the younger cabinet ministers are enthusiastic social  media adopters.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Rural India Logs On&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Despite representing a largely rural, relatively impoverished  constituency, 48-year-old Biju Janata Dal MP Baijayant Panda is a  Twitter natural. "Rural Indians are slowly beginning to get more active  online and I am beginning to interact more often with my constituents  there. In fact, particularly on Facebook, there are already a  significant number of Odia users, from all around the world, but also  those living in my constituency, " Panda says. &lt;br /&gt;&lt;br /&gt;Simultaneously,  social media entrepreneurs are responding to what they see as an area of  huge growth. The Australian web-based citizen-politician interaction  platform OurSay has just come to India (see interview on page 5). In the  run-up to the elections, Twitter and Google are both reaching out to  politicians and civil society organisations in the citizen engagement  game and have pitched town-hall style interactions to several  politicians, including union cabinet members and state governments. &lt;br /&gt;&lt;br /&gt;Social  media entrepreneur and analyst Mahesh Murthy believes that Indian  social media users have discovered the wonders of political engagement  online. "Only now are they figuring out that the real news doesn't seem  to get out on traditional media - and more importantly, that their  response on traditional media (at best, a letter to the editor) is puny  in comparison to the impact they can have via social, " he says.  Moreover, says Murthy, the impact is not online alone. "The Nirbhaya  case, the Palghar case, the recent child rape case - all would have gone  generally unnoticed a few years ago. Each of them, thanks to social  media, became a cause to rally around. Add to this disclosures under  RTI, NGOs becoming more transparent, online petitions and more - the  staid and set political world of India is undergoing the first wave of  massive, irreversible change. "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such evangelism about the potentially transformational impact of social  media was echoed in a recent study which claimed that Facebook users  could swing elections in 150 constituencies in the next Lok Sabha  election. Apart from being statistically flawed, the study also failed  to look beyond the number of people on social media, to the kinds of  conversations they are actually having.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A Broadcast Medium?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With some exceptions, the majority of politicians on Twitter and  Facebook use it as yet another broadcast medium for purely one-way  traffic, a rare few respond to the hundreds who leave comments on their  Facebook and Twitter posts. So while Gujarat chief minister Narendra  Modi might have asked the FICCI ladies to get in touch with him on  social media, what he omitted to mention was that he never responds. &lt;br /&gt;&lt;br /&gt;Most  politicians and parties are not doing a good job of engaging with  citizens through social media, agrees Sunil Abraham, executive director  of the Bangalore-based Centre for Internet and Society. "Most of them  are still outsourcing this function completely. This reminds me of the  early days of email in large corporations and government offices when  every email was printed before it was read by its recipient and the  response dictated and recorded using shorthand before it was entered  into the computer. This approach will not work with social media users.  Personal involvement will be one way to improve results, " says Abraham.  &lt;br /&gt;&lt;br /&gt;Arvind Gupta, who sold off his analytics firm to run the BJP's  IT cell from its Lutyens' Delhi headquarters, disagrees. "The volume of  responses on Twitter or Facebook make it impossible for Sushmaji  [Swaraj] or Modiji to respond to them all, but they often meet online  supporters offline too, or highlight insightful comments on their blogs,  " says Gupta. &lt;br /&gt;Younger leaders tend to be better at online  interaction. So while 89-year-old Karunanidhi of the DMK has a Twitter  account but follows no one, the party's youngest MLA, TRB Rajaa, has  five Facebook pages and a Twitter handle, and replies personally. "I get  several hundred messages on Facebook in a day, but I try to respond to  at least half, especially those who are raising grievances, " he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some times, the proximity of a politician to the blaze of online outrage can force action. "When (IIPM director) Arindam Choudhary got a remote district court to ban a UGC web page, social media turmoil spurred first Shashi Tharoor and then [minister of state for information technology] Milind Deora and then the government into action - and the case was challenged and the ban was overturned, " says Murthy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Influencing First-time Voters&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;But the big question remains - in a country where the internet is for a  privileged few, is it too early to start talking of social media playing  a role in electoral politics?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sanjay Jha who runs the website  Hamara-Congress. com and is a member of the party's social media  strategy team, believes the impact will largely be on youngt voters. "It  will have an impact on first time voters of urban India as also on  voters who are unsure about their political leanings, " he says. &lt;br /&gt;&lt;br /&gt;"Social  media like mainstream media will influence its users. Internet users  are still roughly around 10% of the population. However, they are elites  and can influence wider offline discourse. Social media may have other  benefits as it would help make the elections more transparent and free  from manipulation, " says Abraham. &lt;br /&gt;&lt;br /&gt;"One has to be careful - we  don't know yet how many people on Facebook are registered to vote, and  how many more will do so in time. We also need to understand better the  ability of a youth on Facebook to influence his parents' and family's  voting choices, " says Murthy. &lt;br /&gt;&lt;br /&gt;In number terms, Murthy believes  that social media will have some impact on 8-15 % of the electorate come  2014. "The 2014 elections will be a turning point. But I sense the 8%  to 15% will more than double by 2019 elections - and that will be a  moment when social media is far, far more important. The smarter parties  and politicians will realise this and start making investments and  efforts right away, " says Murthy. &lt;br /&gt;&lt;br /&gt;Gupta strongly believes that a  segment of the population that is politically engaged online but will  not come to dharnas nevertheless votes, and should not be dismissed.  "You often see people who make "I voted today" their Facebook status, "  he says. Moreover, citizens politically engaged online are influencing  each other and changing minds, he says.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Party Time&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Many in politics also believe that besides the voter - who makes his or  her decision based on a complex matrix of reasons - social media plays  an important role in helping the leadership of parties connect with and  energise their cadre and supporters. &lt;br /&gt;&lt;br /&gt;"At the very least, social  media will bring interested volunteers and party-workers closer to  public representatives by making direct interaction possible. Certain  candidates, even independent and otherwise lesser fancied ones, will  have a shot at mobilising supporters at rallies, even though they have  far fewer traditional resources to do so, " says Panda. &lt;br /&gt;Rajaa  agrees. "Not just voters, many motivated cadre also use social media to  keep in touch with our youth wing and with the second-rung leadership, "  he says.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With additional reporting by Kim Arora.&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network'&gt;https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-19T06:19:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
