<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2241 to 2255.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/deconstructing-2018internet-addiction2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2018-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2016-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2015-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2013-bulletin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking">
    <title>Delhi defends Internet blocking</title>
    <link>https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking</link>
    <description>
        &lt;b&gt;India on Friday defended itself against accusations of heavy-handed online censorship, saying it had been successful in blocking content blamed for fuelling ethnic tensions.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://gulftoday.ae/portal/6b2874ab-3e6d-4049-bf2f-a89594fad170.aspx"&gt;Gulf Today&lt;/a&gt; on August 25, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government over the past week has ordered Internet service providers to block 309 webpages, images and links on sites including Facebook, Twitter, Wikipedia, news channel ABC of Australia and Qatar-based Al Jazeera.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The orders were an effort to halt the spread of “hateful” material and rumours that Muslims planned to attack students and workers who have migrated from the northeast region to live in Bangalore and other southern cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have met with success. These pages were a threat to India’s national security and we demanded their immediate deletion,” Kuldeep Singh Dhatwalia, a spokesman for India’s home ministry said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Spreading rumours to encourage violence or cause tension will not be tolerated. The idea is not to restrict communication.” But Twitter users, legal experts and analysts criticised the government’s approach, which appeared to have resulted in only partial blocking of material, much of which was still accessible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The officials who are trusted with this don’t know the law or modern technology well enough,” Pranesh Prakash, programme manager at the Centre for Internet and Society research group, told AFP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is counter-productive. I accuse them of monumental incompetence, given that the main problem is that they are getting really bad advice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I hope that this fiasco shows the folly of excessive censorship and encourages the government to make better use of social networks and technology to reach out to people.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a strange irony, account of none other than Minister of State for Communication and Information Technology Milind Deora was suspended by Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But at the same time, a fake account similar to Deora’s remained active.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The followers of Deora on Twitter were in for a surprise when they found a search for his name showed “No people results for Milind Deora.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deora’s tweets gave the government’s version on the crackdown on the microblogging site and other social networking websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deora in his tweet on Thursday night had defended the government’s efforts to block hate content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Ironically, let me clarify on Twitter that there is absolutely no intent of the government to curb freedom of social media platforms,” Deora’s tweet read.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Account suspended. The profile you are trying to view has been suspended...,” was the automated message that was seen on the Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The news of Deora’s account suspension spread like wild fire on the microblogging site with some making sarcastic comments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Communication Minister Milind Deora’s Twitter Account ‘Suspended.’ It’s like the home minister losing his house key,” read one of the tweets, while another user’s tweet read: “Ah! I know what happened. Milind Deora sent Twitter a list of people to (be) banned and signed his name under it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has asked Internet service providers to block select 16 Twitter accounts, including that of some journalists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter has also removed six accounts, which resembled that of the Prime Minister’s Office (PMO) amid government’s assertion that action would be taken against those allowing objectionable content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a communication to the PMO, Twitter has said it has “removed the reported profile(s) from circulation due to violation of our Terms of Service regarding impersonation.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking'&gt;https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-27T04:13:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015">
    <title>DeitY says 143 URLs have been Blocked in 2015; Procedure for Blocking Content Remains Opaque and in Urgent Need of Transparency Measures</title>
    <link>https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015</link>
    <description>
        &lt;b&gt;Across India on 30 December 2014, following an order issued by the Department of Telecom (DOT), Internet Service Providers (ISPs) blocked 32 websites including Vimeo, Dailymotion, GitHub and Pastebin.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;In February 2015, the Centre for Internet and Society (CIS) requested the Department of Electronics and Information Technology (DeitY) under the Right to Information Act, 2005 (RTI Act) to provide information clarifying the procedures for blocking in India. We have received a response from DeitY which may be &lt;a href="https://cis-india.org/internet-governance/blog/response-deity.clarifying-procedures-for-blocking.pdf" class="external-link"&gt;seen here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this post, I shall elaborate on this response from DeitY and highlight some of the accountability and transparency measures that the procedure needs. To stress the urgency of reform, I shall also touch upon two recent developments—the response from Ministry of Communication to questions raised in Parliament on the blocking procedures and the Supreme Court (SC) judgment in Shreya Singhal v. Union of India.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Section 69A and the Blocking Rules&lt;/h2&gt;
&lt;p align="JUSTIFY" class="western"&gt;Section 69A of the Information Technology Act, 2008 (S69A hereinafter) grants powers to the central government to issue directions for blocking of access to any information through any computer resource. In other words, it allows the government to block any websites under certain grounds. The Government has notified rules laying down the procedure for blocking access online under the Procedure and Safeguards for Blocking for Access of Information by Public Rules, 2009 (Rules, 2009 hereinafter). CIS has produced a poster explaining the blocking procedure (&lt;a href="http://cis-india.org/internet-governance/blog/blocking-websites.pdf/at_download/file"&gt;download PDF&lt;/a&gt;, 2.037MB).&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;There are &lt;em&gt;three key aspects&lt;/em&gt; of the blocking rules that need to be kept under consideration:&lt;/p&gt;
&lt;h3 align="JUSTIFY" class="western"&gt;Officers and committees handling requests&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Designated Officer (DO)&lt;/strong&gt; – Appointed by the Central government, officer not below the rank of Joint Secretary.&lt;br /&gt;&lt;strong&gt;Nodal Officer (NO)&lt;/strong&gt; – Appointed by organizations including Ministries or Departments of the State governments and Union Territories and any agency of the Central Government. &lt;br /&gt;&lt;strong&gt;Intermediary contact&lt;/strong&gt;–Appointed by every intermediary to receive and handle blocking directions from the DO.&lt;br /&gt;&lt;strong&gt;Committee for Examination of Request (CER)&lt;/strong&gt; – The request along with printed sample of alleged offending information is examined by the CER—committee with the DO serving as the Chairperson and representatives from Ministry of Law and Justice; Ministry of Home Affairs; Ministry of Information and Broadcasting and representative from the Indian Computer Emergency Response Team (CERT-In). The CER is responsible for examining each blocking request and makes recommendations including revoking blocking orders to the DO, which are taken into consideration for final approval of request for blocking by the Secretary, DOT. &lt;br /&gt;&lt;strong&gt;Review Committee (RC) &lt;/strong&gt;– Constituted under rule 419A of the Indian Telegraph Act, 1951, the RC includes the Cabinet Secretary, Secretary to the Government of India (Legal Affairs) and Secretary (Department of Telecom). The RC is mandated to meet at least once in 2 months and record its findings and has to validate that directions issued are in compliance with S69A(1).&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Provisions outlining the procedure for blocking&lt;/h3&gt;
&lt;p&gt;Rules 6, 9 and 10 create three distinct blocking procedures, which must commence within 7 days of the DO receiving the request.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a) Rule 6 lays out the first procedure, under which any person may approach the NO and request blocking, alternatively, the NO may also raise a blocking request. After the NO of the approached Ministry or Department of the State governments and Union Territories and/or any agency of the Central Government, is satisfied of the validity of the request they forward it to the DO. Requests when not sent through the NO of any organization, must be approved by Chief Secretary of the State or Union Territory or the Advisor to the Administrator of the Union Territory, before being sent to the DO.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The DO upon receiving the request places, must acknowledge receipt within 24 four hours and places the request along with printed copy of alleged information for validation by the CER. The DO also, must make reasonable efforts to identify the person or intermediary hosting the information, and having identified them issue a notice asking them to appear and submit their reply and clarifications before the committee at a specified date and time, within forty eight hours of the receipt of notice.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Foreign entities hosting the information are also informed and the CER gives it recommendations after hearing from the intermediary or the person has clarified their position and even if there is no representation by the same and after examining if the request falls within the scope outlined under S69A(1). The blocking directions are issued by the Secretary (DeitY), after the DO forwards the request and the CER recommendations. If approval is granted the DO directs the relevant intermediary or person to block the alleged information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;b) Rule 9 outlines a procedure wherein, under emergency circumstances, and after the DO has established the necessity and expediency to block alleged information submits recommendations in writing to the Secretary, DeitY. The Secretary, upon being satisfied by the justification for, and necessity of, and expediency to block information may issue an blocking directions as an interim measure and must record the reasons for doing so in writing.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;Under such circumstances, the intermediary and person hosting information is not given the opportunity of a hearing. Nevertheless, the DO is required to place the request before the CER within forty eight hours of issuing of directions for interim blocking. Only upon receiving the final recommendations from the committee can the Secretary pass a final order approving the request. If the request for blocking is not approved then the interim order passed earlier is revoked, and the intermediary or identified person should be directed to unblock the information for public access.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;c) Rule 10 outlines the process when an order is issued by the courts in India. The DO upon receipt of the court order for blocking of information submits it to the Secretary, DeitY and initiates action as directed by the courts.&lt;/p&gt;
&lt;h3 style="text-align: justify;" class="western"&gt;Confidentiality clause&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Rule 16 mandates confidentiality regarding all requests and actions taken thereof, which renders any requests received by the NO and the DO, recommendations made by the DO or the CER and any written reasons for blocking or revoking blocking requests outside the purview of public scrutiny. More detail on the officers and committees that enforce the blocking rules and procedure can be found &lt;a href="http://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Response on blocking from the Ministry of Communication and Information Technology&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The response to our RTI from E-Security and Cyber Law Group is timely, given the recent clarification from the Ministry of Communication and Information Technology to a number of questions, raised by parliamentarian  Shri Avinash Pande in the Rajya Sabha. The questions had been raised in reference to the Emergency blocking order under IT Act, the current status of the Central Monitoring System, Data Privacy law and Net Neutrality. The Centre for Communication Governance (CCG), National Law University New Delhi have extracted a set of 6 questions and you can read the full article &lt;a href="https://ccgnludelhi.wordpress.com/2015/04/24/governments-response-to-fundamental-questions-regarding-the-internet-in-india/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;The governments response as quoted by CCG, clarifies under rule 9—the Government has issued directions for emergency blocking of &lt;em&gt;a total number of 216 URLs from 1st January, 2014 till date &lt;/em&gt;and that &lt;em&gt;a total of 255 URLs were blocked in 2014 and no URLs has been blocked in 2015 (till 31 March 2015)&lt;/em&gt; under S69A through the Committee constituted under the rules therein. Further, a total of 2091 URLs and 143 URLs were blocked in order to comply with the directions of the competent courts of India in 2014 and 2015 (till 31 March 2015) respectively. The government also clarified that the CER, had recommended not to block 19 URLs in the meetings held between 1&lt;sup&gt;st&lt;/sup&gt;&lt;sup&gt; &lt;/sup&gt;January 2014 upto till date and so far, two orders have been issued to revoke 251 blocked URLs from 1st January 2014 till date. Besides, CERT-In received requests for blocking of objectionable content from individuals and organisations, and these were forwarded to the concerned websites for appropriate action, however the response did not specify the number of requests.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;We have prepared a table explaining the information released by the government and to highlight the inconsistency in their response.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;colgroup&gt; &lt;col width="331"&gt; &lt;col width="90"&gt; &lt;col width="91"&gt; &lt;col width="119"&gt; &lt;/colgroup&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p align="LEFT"&gt;&lt;strong&gt;Applicable rule and procedure outlined under the Blocking Rules&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p align="CENTER"&gt;&lt;strong&gt;Number of websites&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;&lt;em&gt;2014&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;&lt;em&gt;2015&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;&lt;em&gt;Total&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Rule 6 - Blocking requests from NO and others&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;255&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;None&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;255&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Rule 9 - Blocking under emergency circumstances&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;216&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Rule 10 - Blocking orders from Court&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;2091&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;143&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;2234&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Requests from individuals and orgs forwarded to CERT-In&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Recommendations to not block by CER&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;19&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Number of blocking requests revoked&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;251&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;In a &lt;a href="http://sflc.in/deity-says-2341-urls-were-blocked-in-2014-refuses-to-reveal-more/"&gt;response &lt;/a&gt;to an RTI filed by the Software Freedom Law Centre, DeitY said that 708 URLs were blocked in 2012, 1,349 URLs in 2013, and 2,341 URLs in 2014.&lt;/p&gt;
&lt;h2&gt;Shreya Singhal v. Union of India&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;In its recent judgment, the SC of India upheld the constitutionality of 69A, stating that it was a narrowly-drawn provision with adequate safeguards. The constitutional challenge on behalf of the People’s Union for Civil Liberties (PUCL) considered the manner in which the blocking is done and the arguments focused on the secrecy present in blocking.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The rules may indicate that there is a requirement to identify and contact the originator of information, though as an expert &lt;a href="http://indianexpress.com/article/opinion/columns/but-what-about-section-69a/"&gt;has pointed out&lt;/a&gt;, there is no evidence of this in practice. The court has stressed the importance of a written order so that writ petitions may be filed under Article 226 of the Constitution. In doing so, the court seems to have assumed that the originator or intermediary is informed, and therefore held the view that any procedural inconsistencies may be challenged through writ petitions. However, this recourse is rendered ineffective not only due to procedural constraints, but also because of the confidentiality clause. The opaqueness through rule 16 severely reigns in the recourse that may be given to the originator and the intermediary. While the court notes that rule 16 requiring confidentality was argued to be unconstitutional, it does not state its opinion on this question in the judgment. One expert, holds the &lt;a href="https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act-judgment-and-secret-blocking/"&gt;view&lt;/a&gt; that this, by implication, requires that requests cannot be confidential. However, such a reading down of rule 16 is yet to be tested.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Further, Sunil Abraham has &lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a"&gt;pointed&lt;/a&gt; out, “block orders are unevenly implemented by ISPs making it impossible for anyone to independently monitor and reach a conclusion whether an internet resource is inaccessible as a result of a S69A block order or due to a network anomaly.” As there are no comprehensive list of blocked websites or of the legal orders through which they are blocked exists, the public has to rely on media reports and filing RTI requests to understand the censorship regime in India. CIS has previously &lt;a href="http://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism"&gt;analysed&lt;/a&gt; the leaked block lists and lists received as responses to RTI requests which have revealed that the block orders are full of errors and blocking of entire platforms and not just specific links has taken place.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While the state has the power of blocking content, doing so in secrecy and without judical scrutiny, mark deficiencies that remain in the procedure outlined under the provisions of the blocking rules . The Court could read down rule 16 except for a really narrow set of exceptions, and in not doing so, perhaps has overlooked the opportunities for reform in the existing system. The blocking of 32 websites, is an example of the opaqueness of the system of blocking orders, and where the safeguards assumed by the SC are often not observed such as there being no access to the recommendations that were made by the CER, or towards the revocation of the blocking orders subsequently. CIS filed the RTI to try and understand the grounds for blocking and related procedures and the response has thrown up some issues that must need urgent attention.&lt;/p&gt;
&lt;h2&gt;Response to RTI filed by CIS&lt;/h2&gt;
&lt;p align="JUSTIFY" class="western"&gt;Our first question sought clarification on the websites blocked on 30&lt;sup&gt;th&lt;/sup&gt;&lt;sup&gt; &lt;/sup&gt;December 2014 and the response received from DeitY, E-Security and Cyber Law Group reveals that the websites had been blocked as “they were being used to post information related to ISIS using the resources provided by these websites”. The response also clarifies that the directions to block were issued on &lt;em&gt;18-12-2014 and as of 09-01-2015&lt;/em&gt;, after obtaining an undertaking from website owners, stating their compliance with the Government and Indian laws, the sites were unblocked.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;It is not clear if ATS, Mumbai had been intercepting communication or if someone reported these websites. If the ATS was indeed intercepting communication, then as per the rules, the RC should be informed and their recommendations sought. It is unclear, if this was the case and the response evokes the confidentiality clause under rule 16 for not divulging further details. Based on our reading of the rules, court orders should be accessible to the public and without copies of requests and complaints received and knowledge of which organization raised them, there can be no appeal or recourse available to the intermediary or even the general public.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;We also asked for a list of all requests for blocking of information that had been received by the DO between January 2013 and January 2015, including the copies of all files that had accepted or rejected. We also specifically, asked for a list of requests under rule 9. The response from DeitY stated that since January 1, 2015 to March 31, 2015 directions to block 143 URLs had been issued based on court orders. The response completely overlooks our request for information, covering the 2 year time period. It also does not cover all types of blocking orders under rule 6 and rule 9, nor the requests that are forwarded to CERT-In, as we have gauged from the ministry's response to the Parliament. Contrary to the SC's assumption of contacting the orginator of information, it is also clear from DeitY's response that only the websites had been contacted and the letter states that the “websites replied only after blocking of objectionable content”.&amp;nbsp;&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;Further, seeking clarification on the functioning of the CER, we asked for the recent composition of members and the dates and copies of the minutes of all meetings including copies of the recommendations made by them. The response merely quotes rule 7 as the reference for the composition and does not provide any names or other details. We ascertain that as per the DeitY website Shri B.J. Srinath, Scientist-G/GC is the appointed Designated Officer, however this needs confirmation. While we are already aware of the structure of the CER which representatives and appointed public officers are guiding the examination of requests remains unclear. Presently, there are 3 Joint Secretaries appointed under the Ministry of Law and Justice, the Home Ministry has appointed 19, while 3 are appointed under the Ministry of Information and Broadcasting. Further, it is not clear which grade of scientist would be appointed to this committee from CERT-In as the rules do not specify this. While the government has clarified in their answer to Parliament that the committee had recommended not to block 19 URLs in the meetings held between 1st January 2014 to till date, it is remains unclear who is taking these decisions to block and revoke blocked URLs. The response from DeitY specifies that the CER has met six times between 2014 and March 2015, however stops short on sharing any further information or copies of files on complaints and recommendations of the CER, citing rule 16.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;Finally, answering our question on the composition of the RC the letter merely highlights the provision providing for the composition under 419A of the Indian Telegraph Rules, 1951. The response clarifies that so far, the RC has met once on 7th December, 2013 under the Chairmanship of the Cabinet Secretary, Department of Legal Affaits and Secretary, DOT. Our request for minutes of meetings and copies of orders and findings of the RC is denied by simply stating that “minutes are not available”. Under 419A, any directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 issued by the competent authority shall contain reasons for such direction and a copy of such order shall be forwarded to the concerned RC within a period of seven working days. Given that the RC has met just once since 2013, it is unclear if the RC is not functioning or if the interception of messages is being guided through other procedures. Further, we do not yet know details or have any records of revocation orders or notices sent to intermediary contacts. This restricts the citizens’ right to receive information and DeitY should work to make these available for the public.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;Given the response to our RTI, the Ministry's response to Parliament and the SC judgment we recommend the following steps be taken by the DeitY to ensure that we create a procedure that is just, accountable and follows the rule of law.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;The revocation of rule 16 needs urgent clarification for two reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Under Section 22 of the RTI Act provisions thereof, override all conflicting provisions in any other legislation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In upholding the constitutionality of S69A the SC cites the requirement of reasons behind blocking orders to be recorded in writing, so that they may be challenged by means of writ petitions filed under &lt;a href="http://indiankanoon.org/doc/1712542/"&gt;A&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/1712542/"&gt;rticle 226&lt;/a&gt; of the Constitution of India.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;If the blocking orders or the meetings of the CER and RC that consider the reasons in the orders are to remain shrouded in secrecy and unavailable through RTI requests, filing writ petitions challenging these decisions will not be possible, rendering this very important safeguard for the protection of online free speech and expression infructuous. In summation, the need for comprehensive legislative reform remains in the blocking procedures and the government should act to address the pressing need for transparency and accountability. Not only does opacity curtial the strengths of democracy it also impedes good governance. We have filed an RTI seeking a comprehensive account of the blocking procedure, functioning of committees from 2009-2015 and we shall publish any information that we may receive.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015'&gt;https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>69A</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-04-30T07:37:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality">
    <title>Definition of Net Neutrality should be flexible: Pranesh Prakash</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality</link>
    <description>
        &lt;b&gt;Critics argue that Facebook’s Internet.org violates the principle of Net Neutrality.&lt;/b&gt;
        &lt;p&gt;The article by Sanjay Vijaykumar was published in &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/pranesh-prakash-on-definition-of-net-neutrality/article7188661.ece"&gt;the Hindu&lt;/a&gt; on May 10, 2015. Pranesh Prakash is extensively quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The definition of Net Neutrality should be flexible enough to allow for experimentation with different models of providing cheaper Internet access and such experimentation needs to be regulated by the telecom regulator, Telecom and Regulatory Authority of India (TRAI) according to Internet expert Pranesh Prakash.&lt;br /&gt;&lt;br /&gt;Mr. Prakash was reacting to the business model of Boston-based start-up Jana, which said it had figured out a way to offer billions of people in the emerging world free access to the Internet, without violating the web’s open nature. The firm has launched Jana Loyalty, a product that seeks to reward its smartphone users in two ways. One, it reimburses users the cost of downloading and using an app of Jana’s clients. Two, it gives free additional data with which the user can access any content online.&lt;br /&gt;&lt;br /&gt;“While Jana is like Internet.org, since it is Internet service-specific zero-rating, Jana Loyalty is what my colleague Sunil Abraham dubs a ‘leaky walled garden’. The walled garden (site-specific access) exists, but you also get free access to the whole of the Web in return. Given that there is no one universal definition of Net Neutrality, and given India currently doesn’t have a definition, I can’t answer if this is a violation of Net Neutrality,” said Mr. Prakash, who is Policy Director at The Centre for Internet and Society (CIS), a Bangalore-based, non-profit, research and policy advocacy.&lt;br /&gt;&lt;br /&gt;Facebook’s attempts to provide a limited version of the Internet free has been attracting criticism from supporters of Net Neutrality, especially in India. Critics argue that Facebook’s Internet.org, which offers users free access to a bouquet of pre-selected Web sites, violates the principle of Net Neutrality by choosing what is accessible and what isn’t. Facebook has reacted to this by opening up Internet.org to all developers who meet its guidelines. Mr. Prakash said the definition of Net Neturality should be flexible enough to allow for experimentation with different models of providing cheaper Internet access, including Jana Loyalty.&lt;/p&gt;
&lt;p&gt;“However, such experimentation ought to be regulated by the telecom regulator. To minimise harm, they should be allowed on a case-by-case basis after the regulator has had an opportunity to conduct risk-benefit analysis against four goals it should seek to promote — universal and affordable access; effective competition; protection of consumers against harm; and diversity that arises from the openness and interconnectedness of the Internet,” he added.&lt;/p&gt;
&lt;p&gt;Net neutrality is a principle that says Internet Service Providers (ISPs) should treat all traffic and content on their networks equally.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_ISP.png" alt="ISP" class="image-inline" title="ISP" /&gt;&lt;/p&gt;
&lt;h3&gt;Why now?&lt;/h3&gt;
&lt;p&gt;Late last month, Trai released a draft consultation paper seeking views from the industry and the general public on the need for regulations for over-the-top (OTT) players such as Whatsapp, Skype, Viber etc, security concerns and net neutrality. The objective of this consultation paper, the regulator said, was to analyse the implications of the growth of OTTs and consider whether or not changes were required in the current regulatory framework.&lt;/p&gt;
&lt;h3&gt;What is an OTT?&lt;/h3&gt;
&lt;p&gt;OTT or over-the-top refers to applications and services which are accessible over the internet and ride on operators' networks offering internet access services. The best known examples of OTT are Skype, Viber, WhatsApp, e-commerce sites, Ola, Facebook messenger. The OTTs are not bound by any regulations. The Trai is of the view that the lack of regulations poses a threat to security and there’s a need for government’s intervention to ensure a level playing field in terms of regulatory compliance.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality'&gt;https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-19T01:43:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake">
    <title>Deepfakes: Algorithms at war, trust at stake</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake</link>
    <description>
        &lt;b&gt;A case in point is the video that surfaced of an Indian journalist not so long ago.&lt;/b&gt;
        &lt;p&gt;The article by Rajmohan Sudhakar was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-on-the-move/deepfakes-algorithms-at-war-trust-at-stake-747042.html"&gt;Deccan Herald&lt;/a&gt; on July 14, 2019. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Now machines are learning to manipulate imagery. That is a real worry. Deepfakes for instance. They are AI-manipulated videos achieved by machine learning. Products of the humongous volume of images and videos now available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The danger is, this imagery could be yours or mine. Imagine artificial intelligence of neural networks creating convincing identities of our real counterparts, and starts posting videos. Absurd.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Society has grappled with spurious and specious content in media over time. Media has been modified for various reasons, usually by those with access to significant resources and influence in the past,” says Elonnai Hickok, COO of the Bengaluru-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From an AI and machine learning perspective, deepfakes could be understood by what is known as GAN -- generative adversarial networks, essentially two algorithms at war. One is a generator, the other a discriminator. They compete with each other based on set inputs, in time bettering the version they together help create. These are behind what are now known as deepfakes of popular figures floating around online. Barack Obama is seen saying in a purported deepfake, “stay woke bitches”, which of course he did not say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another deepfake has Mark Zuckerberg boasting: “I have total control of billions of people’s stolen data, all their secrets, their lives, their futures.” “Deepfakes are media modified by current technology and techniques. Easy availability of technology and media allows anyone to create, tailor or manipulate media for their own ends. Deepfakes present an opportunity for introspection and research into the contours of freedom of expression as well as societal frameworks for dealing with fake content,” explains Hickok.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the horrid instances of a deepfake-like attack was the video that surfaced of an Indian woman journalist not so long ago. Or the child-kidnapping rumours that spread through WhatsApp and the subsequent mob lynchings. However, there’s the view that in post-truth times, deepfakes would be seen with caution in the inherent dilemma over believing what one views online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, people do not take these so seriously, especially on social media. It is mostly entertainment for many. Now, we are seeing people with diametrically opposing views. They often view content which they like to see. It would rather work as a reinforcer of views than a transformer,” feels political analyst Sandeep Shastri.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Open source software can create basic deepfakes if someone wanted to hurt somebody. The potential scale of danger and damage looms larger for influential figures and nations at war.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While deep fakes can be used to damage societies, it is important that collectively society takes steps to become sensitised to ways that media can be used to manipulate opinions and choices, and allow people to develop skills that build awareness and context to what they see and believe,” adds Hickok.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A video emerged recently of an ‘Iranian’ boat near an attacked oil tanker in the Persian Gulf. Deepfake or not, the authenticity of the video was questionable. If used wily, it could have triggered a war.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Hickok, society has to get more resilient to manipulation. “This includes spoken, written, seen as well as heard information. We have to learn to question the basis on which we confirm trust. Multiple forms of verification may help to address spurious media and information,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deepfakes are no surprise as social media feed into the small and large divisions and differences of multitudes. Emergence of such potentially dangerous AIs isn’t taken quite seriously by the tech czars. In fact, it is a matter of economy for them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oscar Schwartz writes in The Guardian that ‘technological solutionism’ in the ‘attention economy’ may not be the real approach. “And herein lies the problem: by formulating deepfakes as a technological problem, we allow social media platforms to promote technological solutions to those problems – cleverly distracting the public from the idea that there may be more fundamental problems with powerful Silicon Valley tech platforms,” Schwartz warns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The measures do not fall on the regulators alone. I think, individuals (by introspection and building awareness), society (through education), the legal system (stringent evidentiary requirements and capacity building) industry (differentiating recreational and prejudicial content, tagging content that is manipulated, etc.) and regulators (enabling accountability, oversight, transparency and redress) can all contribute to a more resilient society,” observes Hickok.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, viewing a video is still considered close to truth, almost sacred by the vast majority. Necessarily, it would not require a technologically advanced deepfake, especially in the backward rural pockets, to rile up and aggravate biases and prejudices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Deepfakes can further existing biases and manipulate opinions and choices. They can disrupt trust inherent in societal groups to co-exist and politically, they can breed distrust in leadership and capability. That said, deepfakes can be used for humour and satire. Ultimately, the impact will be shaped by a number of factors including pre-existing biases, individual response, etc.,” Hickok elaborates.&lt;/p&gt;
&lt;p&gt;On a lighter note, deepfakes could be helpful too. We could very well do away with some of our television news presenters.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake'&gt;https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rajmohan Sudhakar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-07-21T15:42:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy">
    <title>Deep Packet Inspection: How it Works and its Impact on Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy</link>
    <description>
        &lt;b&gt; In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign was a spectacular success and facilitated sending  over a million emails supporting the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in the Indian context, nor their impact on other values. In this article, the author focuses on network management, in general, and deep packet inspection, in particular and how it impacts the privacy of users.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;a name="_ek69t4linon1"&gt;&lt;/a&gt; Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign, captured in detail by an article in Mint,	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; was a spectacular success and facilitated sending over a million emails supporting 	the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact 	that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the 	debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in 	the Indian context, nor their impact on other values. In this article, I focus on network management, in general, and deep packet inspection, in particular 	and how it impacts the privacy of users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ft3wpj7p1jf1"&gt;&lt;/a&gt; The Architecture of the Internet&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Internet exists as a network acting as an intermediary between providers of content and it users.	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Traditionally, the network did not distinguish between those who provided content 	and those who were recipients of this service, in fact often, the users also functioned as content providers. The architectural design of the Internet 	mandated that all content be broken down into data packets which were transmitted through nodes in the network transparently from the source machine to the 	destination machine.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As discussed in detail later, as per the OSI model, the network 	consists of 7 layers. We will go into each of these layers in detail below, however is important to understand that at the base is the physical layer of 	cables and wires, while at the top is application layer which contains all the functions that people want to perform on the Internet and the content 	associated with it. The layers in the middle can be characterised as the protocol layers for the purpose of this discussion. What makes the architecture of 	the Internet remarkable is that these layers are completely independent of each other, and in most cases, indifferent to the other layers. The protocol 	layer is what impacts net neutrality. It is this layer which provides the standards for the manner in which the data must flow through the network. The 	idea was for the it to be as simple and feature free as possible such that it is only concerned with the transmission data as fast as possible ('best 	efforts principle') while innovations are pushed to the layers above or below it.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This aspect of the Internet's architectural design, which mandates that network features are implemented as the end points only (destination and source 	machine), i.e. at the application level, is called the 'end to end principle'.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This 	means that the intermediate nodes do not differentiate between the data packets in any way based on source, application or any other feature and are only concerned with transmitting data as fast as possible, thus creating what has been described as a 'dumb' or neutral network.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This feature of the Internet architecture was also considered essential to what 	Jonathan Zittrain has termed as the 'generative' model of the Internet.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Since, the 	Internet Protocol remains a simple layer incapable of discrimination of any form, it meant that no additional criteria could be established for what kind 	of application would access the Internet. Thus, the network remained truly open and ensured that the Internet does not privilege or become the preserve of 	a class of applications, nor does it differentiate between the different kinds of technologies that comprise the physical layer below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the above model speaks of a dumb network not differentiating between the data packets that travel through it, in truth, the network operators engage 	in various kinds of practices that priorities, throttle or discount certain kinds of data packets. In her thesis essay at the Oxford Internet Institute, 	Alissa Cooper&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; states that traffic management involves three different set of 	criteria- a) Some subsets of traffic needs to be managed, and arriving at a criteria to identify those subsets the criteria can be based on source, 	destination, application or users, b) Trigger for the traffic management measure which - could be based upon time of the day, usage threshold or a specific 	network condition, and c) the traffic treatment put into practice when the trigger is met. The traffic treatment can be of three kinds. The first is 	Blocking, in which traffic is prevented from being delivered. The second is Prioritization under which identified traffic is sent sooner or later. This is 	usually done in cases of congestion and one kind of traffic needs to be prioritized. The third kind of treatment is Rate limiting where identified traffic 	is limited to a defined sending rate.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The dumb network does not interfere with an 	application's operation, nor is it sensitive to the needs of an application, and in this way it treats all information sent over it as equal. In such a 	network, the content of the packets is not examined, and Internet providers act according to the destination of the data as opposed to any other factor. 	However, in order to perform traffic management in various circumstances, Deep packet Inspection technology, which does look at the content of data packets 	is commonly used by service providers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_r7ojhgh467u5"&gt;&lt;/a&gt; Deep Packet Inspection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Deep packet inspection (DPI) enables the examination of the content of a data packets being sent over the Internet. Christopher Parsons explains the header 	and the payload of a data packet with respect to the OSI model. In order to understand this better, it is more useful to speak of network in terms of the 	seven layers in the OSI model as opposed to the three layers discussed above.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the OSI model, the top layer, the Application Layer is in contact with the software making a data request. For instance, if the activity in question 	is accessing a webpage, the web-browser makes a request to access a page which is then passed on to the lower layers. The next layer is the Presentation 	Layer which deals with the format in which the data is presented. This lateral performs encryption and compression of the data. In the above example, this 	would involve asking for the HTML file. Next comes the Session Layer which initiates, manages and ends communication between the sender and receiver. In 	the above example, this would involve transmitting and regulating the data of the webpage including its text, images or any other media. These three layers 	are part of the 'payload' of the data packet.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next four layers are part of the 'header' of the data packet. It begins with the Transport Layer which collects data from the Payload and creates a 	connection between the point of origin and the point of receipt, and assembles the packets in the correct order. In terms of accessing a webpage, this 	involves connecting the requesting computer system with the server hosting the data, and ensuring the data packets are put together in an arrangement which 	is cohesive when they are received. The next layer is the Data Link Layer. This layer formats the data packets in such a way that that they are compatible 	with the medium being used for their transmission. The final layer is the Physical Layer which determines the actual media used for transmitting the 	packets.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The transmission of the data packet occurs between the client and server, and packet inspect occurs through some equipment placed between the client and 	the server. There are various ways in which packet inspection has been classified and the level of depth that the inspection needs to qualify in order to 	be categorized as Deep Packet Inspection. We rely on Parson's classification system in this article. According to him, there are three broad categories of 	packet inspection - shallow, medium and deep.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shallow packet inspection involves the inspection of the only the header, and usually checking it against a blacklist. The focus in this form of inspection 	is on the source and destination (IP address and packet;s port number). This form of inspection primarily deals with the Data Link Layer and Network Layer 	information of the packet. Shallow Packet Inspection is used by firewalls.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Medium Packet Inspection involves equipment existing between computers running the applications and the ISP or Internet gateways. They use application 	proxies where the header information is inspected against their loaded parse-list and used to look at a specific flows. These kinds of inspections 	technologies are used to look for specific kinds of traffic flows and take pre-defined actions upon identifying it. In this case, the header and a small 	part of the payload is also being examined.&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, Deep Packet Inspection (DPI) enables networks to examine the origin, destination as well the content of data packets (header and payload). These 	technologies look for protocol non-compliance, spam, harmful code or any specific kinds of data that the network wants to monitor. The feature of the DPI 	technology that makes it an important subject of study is the different uses it can be put to. The use cases vary from real time analysis of the packets to 	interception, storage and analysis of contents of a packets.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_pi28w1745j15"&gt;&lt;/a&gt; The different purposes of DPI&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Network Management and QoS&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The primary justification for DPI presented is network management, and as a means to guarantee and ensure a certain minimum level of QoS (Quality of 	Service). Quality of Service (QoS) as a value conflicting with the objectives of Network Neutrality, has emerged as a significant discussion point in this 	topic. Much like network neutrality, QoS is also a term thrown around in vague, general and non-definitive references. The factors that come into play in 	QoS are network imposed delay, jitter, bandwidth and reliability. Delay, as the name suggests, is the time taken for a packet to be passed by the sender to the receiver. Higher levels of delay are characterized by more data packets held 'in transit' in the network.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A paper by Paul Ferguson and Geoff Huston described the TCP as a 'self clocking' 	protocol.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This enables the transmission rate of the sender to be adjusted as per 	the rate of reception by the receiver. As the delay and consequent stress on the protocol increases, this feedback ability begins to lose its sensitivity. 	This becomes most problematic in cases of VoIP and video applications. The idea of QoS generally entails consistent service quality with low delay, low 	jitter and high reliability through a system of preferential treatment provided to some traffic on a criteria formulated around the need of such traffic to 	have greater latency sensitivity and low delay and jitter. This is where Deep Packet Inspection comes into play. In 1991, Cisco pioneered the use of a new 	kind of router that could inspect data packets flowing through the network. DPI is able to look inside the packets and its content, enabling it to classify 	packets according to a formulated policy. DPI, which was used a security tool, to begin with, is a powerful tool as it allows ISPs to limit or block 	specific applications or improve performances of applications in telephony, streaming and real-time gaming. Very few scholars believe in an all-or-nothing approach to network neutrality and QoS and debate often comes down to what forms of differentiations are reasonable for service providers to practice.	&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Security&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deep Packet inspection was initially intended as a measure to manage the network and protect it from transmitting malicious programs . As mentioned above, Shallow Packet Inspection was used to secure LANs and keep out certain kinds of unwanted traffic.	&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Similarly, DPI is used for identical purposes, where it is felt useful to 	enhance security and complete a 'deeper' inspection that also examines the payload along with the header information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Surveillance&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third purpose of DPI is what concerns privacy theorists the most. The fact that DPI technologies enable the network operators to have access to the actual content of the data packets puts them a position of great power as well as making them susceptible to significant pressure from the state.	&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For instance, in US, the ISPs are required to conform to the provisions of the 	Communications Assistance for Law Enforcement Act (CALEA) which means they need to have some surveillance capacities designed into their systems. What is 	more disturbing for privacy theorists compared to the use of DPI for surveillance under legislation like CALEA, are the other alleged uses by organisation 	like the National Security Agency through back end access to the information via the ISPs. Aside from the US government, there have been various reports of use of DPI by governments in countries like China,&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Malaysia&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Singapore.	&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Behavioral targeting&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DPI also enables very granular tracking of the online activities of Internet users. This information is invaluable for the purposes of behavioral targeting 	of content and advertising. Traditionally, this has been done through cookies and other tracking software. DPI allows new way to do this, so far exercised 	only through web-based tools to ISPs and their advertising partners. DPI will enable the ISPs to monitor contents of data packets and use this to create profiles of users which can later be employed for purposes such as targeted advertising.	&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_gn60r7ifwcge"&gt;&lt;/a&gt; Impact on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Each of the above use-cases has significant implications for the privacy of Internet users as the technology in question involves access, tracking or 	retention of their online communication and usage activity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alyssa Cooper compares DPI with other technologies carrying out content inspection such as caching services and individual users employing firewalls or packet sniffers. She argues that one of the most distinguishing feature of DPI is the potential for "mission-creep."	&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kevin Werbach writes that while networks may deploy DPI for implementation under 	CALEA or traffic peer-to-peer shaping, once deployed DPI techniques can be used for completely different purposes such as pattern matching of intercepted 	content and storage of raw data or conclusions drawn from the data.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This scope of 	mission creep is even more problematic as it is completely invisible. As opposed to other technologies which rely on cookies or other web-based services, 	the inspection occurs not at the end points, but somewhere in the middle of the network, often without leaving any traces on the user's system, thus 	rendering them virtually undiscoverable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much like other forms of surveillance, DPI threatens the sense that the web is a space where people can engage freely with a wide range of people and 	services. For such a space to continue to exist, it is important for people to feel secure about their communication and transaction on medium. This notion 	of trust is severely harmed by a sense that users are being surveilled and their communication intercepted. This has obvious chilling effect on free speech 	and could also impact electronic commerce.&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Allyssa Cooper also points out another way in which DPI differs from other content tracking technologies. As the DPI is deployed by the ISPs, it creates a 	greater barrier to opting out and choosing another service. There are only limited options available to individuals as far as ISPs are concerned. 	Christopher Parsons does a review of ISPs using DPI technology in UK, US and Canada and offers that various ISPs do provide in their terms of services that 	they use DPI for network management purposes. However, this information is often not as easily accessible as the terms and conditions of online services. 	A;so, As opposed to online services, where it is relatively easier to migrate to another service, due to both presence of more options and the ease of 	migration, it is a much longer and more difficult process to change one's ISP.&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_n5w8euzb4xhb"&gt;&lt;/a&gt; Measures to mitigate risk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, there are no existing regulatory frameworks in India which deal govern DPI technology in any way. The International Telecommunications Union 	(ITU) prescribes a standard for DPI&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; however, the standard does not engage with 	any questions of privacy and requires all DPI technologies to be capable of identifying payload data, and prescribing classification rules for specific 	applications, thus, conflicting with notions of application agnosticism in network management. More importantly, the requirements to identify, decrypt and 	analyse tunneled and encrypted data threaten the reasonable expectation of privacy when sending and receiving encrypted communication. In this final 	section, I look at some possible principles and practices that may be evolved in order to mitigate privacy risks caused due to DPI technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Limiting 'depth' and breadth&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been argued that inherently what DPI technology intends to do is matching of patterns in the inspected content against a pre-defined list which is 	relevant to the purpose how which DPI is employed. Much like data minimization principles applicable to data controllers and data processors, it is 	possible for network operators to minimize the depth of the inspection (restrict it to header information only or limited payload information) so as to 	serve the purpose at hand. For instance, in cases where the ISP is looking to identify peer-to-peer traffic, there are protocols which declare their names 	in the application header itself. Similarly, a network operators looking to generate usage data about email traffic can do so simply by looking at port 	number and checking them against common email ports.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, this mitigation 	strategy may not work well for other use-cases such as blocking malicious software or prohibited content or monitoring for the sake of behavioral 	advertising.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While depth referred to the degree of inspection within data packets, breadth refers to the volume of packets being inspected. Alyssa Cooper argues that 	for many DPI use cases, it may be possible to rely on pattern matching on only the first few data packets in a flow, in order to arrive at sufficient data 	to take appropriate response. Cooper uses the same example about peer-to-peer traffic. In some cases, the protocol name may appear on the header file of 	only the first packet of a flow between two peers. In such circumstances, the network operators need not look beyond the header files of the first packet 	in a flow, and can apply the network management rule to the entire flow.&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Data retention&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aside from the depth and breadth of inspection, another important question whether and for along is there a need for data retention. All use cases may not 	require any kind of data retention and even in case where DPI is used for behavioral advertising, only the conclusions drawn may be retained instead of 	retaining the payload data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Transparency&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the issues is that DPI technology is developed and deployed outside the purview of standard organizations like ISO. Hence, there has been a lack of 	open, transparent standards development process in which participants have deliberated the impact of the technology. It is important for DPI to undergo 	these process which are inclusive, in that there is participation by non-engineering stakeholders to highlight the public policy issues such as privacy. Further, aside from the technology, the practices by networks need to be more transparent.	&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Disclosure of the presence of DPI, the level of detail being inspected or retained and the purpose for deployment of DPI can be done. Some ISPs provide some of these details in their terms of service and website notices.	&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, as opposed to web-based services, users have limited interaction with 	their ISP. It would be useful for ISPs to enable greater engagement with their users and make their practices more transparent.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The very nature of of the DPI technology renders some aspects of recognized privacy principles like notice and consent obsolete. The current privacy frameworks under FIPP&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and OECD	&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; rely on the idea of empowering the individual by providing them with knowledge 	and this knowledge enables them to make informed choices. However, for this liberal conception of privacy to function meaningfully, it is necessary that 	there are real and genuine choices presented to the alternatives. While some principles like data minimisation, necessity and proportionality and purpose 	limitation can be instrumental in ensuring that DPI technology is used only for legitimate purposes, however, without effective opt-out mechanisms and 	limited capacity of individual to assess the risks, the efficacy of privacy principles may be far from satisfactory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ongoing Aadhaar case and a host of surveillance projects like CMS, NATGRID, NETRA&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and NMAC	&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; have raised concerns about the state conducting mass-surveillance, particularly 	of online content. In this regard, it is all the more important to recognise the potential of Deep Packet Inspection technologies for impact on privacy 	rights of individuals. Earlier, the Centre for Internet and Society had filed Right to Information applications with the Department of Telecommunications, Government of India regarding the use of DPI, and the government had responded that there was no direction/reference to the ISPs to employ DPI technology.	&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Similarly, MTNL also responded to the RTI Applications and denied using the 	technology.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is notable though, that they did not respond to the questions 	about the traffic management policies they follow. Thus, so far there has been little clarity on actual usage of DPI technology by the ISPs.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ashish Mishra, "India's Net Neutrality Crusaders", available at 			&lt;a href="http://mintonsunday.livemint.com/news/indias-net-neutrality-crusaders/2.3.2289565628.html"&gt; http://mintonsunday.livemint.com/news/indias-net-neutrality-crusaders/2.3.2289565628.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.livinginternet.com/i/iw_arch.htm"&gt;http://www.livinginternet.com/i/iw_arch.htm&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Vinton Cerf and Robert Kahn, "A protocol for packet network intercommunication", available at 			&lt;a href="https://www.semanticscholar.org/paper/A-protocol-for-packet-network-intercommunication-Cerf-Kahn/7b2fdcdfeb5ad8a4adf688eb02ce18b2c38fed7a"&gt; https://www.semanticscholar.org/paper/A-protocol-for-packet-network-intercommunication-Cerf-Kahn/7b2fdcdfeb5ad8a4adf688eb02ce18b2c38fed7a &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ganley and Ben Algove, "Network Neutrality-A User's Guide", available at			&lt;a href="http://wiki.commres.org/pds/NetworkNeutrality/NetNeutrality.pdf"&gt;http://wiki.commres.org/pds/NetworkNeutrality/NetNeutrality.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; J H Saltzer, D D Clark and D P Reed, "End-to-End arguments in System Design", available at			&lt;a href="http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf"&gt;http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 4.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Jonathan Zittrain, The future of Internet - and how to stop it, (Yale University Press and Penguin UK, 2008) available at 			&lt;a href="https://dash.harvard.edu/bitstream/handle/1/4455262/Zittrain_Future%20of%20the%20Internet.pdf?sequence=1"&gt; https://dash.harvard.edu/bitstream/handle/1/4455262/Zittrain_Future%20of%20the%20Internet.pdf?sequence=1 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alissa Cooper, How Regulation and Competition Influence Discrimination in Broadband Traffic Management: A Comparative Study of Net Neutrality in 			the United States and the United Kingdom available at 			&lt;a href="http://ora.ox.ac.uk/objects/uuid:757d85af-ec4d-4d8a-86ab-4dec86dab568"&gt; http://ora.ox.ac.uk/objects/uuid:757d85af-ec4d-4d8a-86ab-4dec86dab568 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Christopher Parsons, "The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers?", available at 			&lt;a href="https://www.christopher-parsons.com/the-politics-of-deep-packet-inspection-what-drives-surveillance-by-internet-service-providers/"&gt; https://www.christopher-parsons.com/the-politics-of-deep-packet-inspection-what-drives-surveillance-by-internet-service-providers/ &lt;/a&gt; at 15.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Jay Klein, "Digging Deeper Into Deep Packet Inspection (DPI)", available at			&lt;a href="http://spi.unob.cz/papers/2007/2007-06.pdf"&gt;http://spi.unob.cz/papers/2007/2007-06.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Tim Wu, "Network Neutrality: Broadband Discrimination", available at			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=388863"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=388863&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ferguson and Geoff Huston, "Quality of Service on the Internet: Fact, Fiction,&lt;/p&gt;
&lt;p&gt;or Compromise?", available at &lt;a href="http://www.potaroo.net/papers/1998-6-qos/qos.pdf"&gt;http://www.potaroo.net/papers/1998-6-qos/qos.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Barbara van Schewick, "Network Neutrality and Quality of Service: What a non-discrimination Rule should look like", available at 			&lt;a href="http://cyberlaw.stanford.edu/downloads/20120611-NetworkNeutrality.pdf"&gt; http://cyberlaw.stanford.edu/downloads/20120611-NetworkNeutrality.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ohm, "The Rise and Fall of Invasive ISP Surveillance," available at 			&lt;a href="http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf"&gt; http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ben Elgin and Bruce Einhorn, "The great firewall of China", available at 			&lt;a href="http://www.bloomberg.com/news/articles/2006-01-22/the-great-firewall-of-china"&gt; http://www.bloomberg.com/news/articles/2006-01-22/the-great-firewall-of-china &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mike Wheatley, "Malaysia's Web Heavily Censored Before Controversial Elections", available at 			&lt;a href="http://siliconangle.com/blog/2013/05/06/malaysias-web-heavily-censored-before-controversial-elections/"&gt; http://siliconangle.com/blog/2013/05/06/malaysias-web-heavily-censored-before-controversial-elections/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Fazal Majid, "Deep packet inspection rears it ugly head" available at			&lt;a href="https://majid.info/blog/telco-snooping/"&gt;https://majid.info/blog/telco-snooping/&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alissa Cooper, "Doing the DPI Dance: Assessing the Privacy Impact of Deep Packet Inspection," in W. Aspray and P. Doty (Eds.), Privacy in America: 			Interdisciplinary Perspectives, Plymouth, UK: Scarecrow Press, 2011 at 151.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 148.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kevin Werbach, "Breaking the Ice: Rethinking Telecommunications Law for the Digital Age", Journal of Telecommunications and High Technology, 			available at &lt;a href="http://www.jthtl.org/articles.php?volume=4"&gt;http://www.jthtl.org/articles.php?volume=4&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; Note 25 at 149.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; Note 25 at 147.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; International Telecommunications Union, Recommendation ITU-T.Y.2770, Requirements for Deep Packet Inspection in next generation networks, available 			at &lt;a href="https://www.itu.int/rec/T-REC-Y.2770-201211-I/en"&gt;https://www.itu.int/rec/T-REC-Y.2770-201211-I/en&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; Note 25 at 154.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 156.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ohm, "The Rise and Fall of Invasive ISP Surveillance", available at 			&lt;a href="http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf"&gt; http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.nist.gov/nstic/NSTIC-FIPPs.pdf"&gt;http://www.nist.gov/nstic/NSTIC-FIPPs.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm"&gt; https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; "India's Surveillance State" Software Freedom Law Centre, available at 			&lt;a href="http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/"&gt; http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Amber Sinha, "Are we losing our right to privacy and freedom on speech on Indian Internet", DNA, available at 			&lt;a href="http://www.dnaindia.com/scitech/column-are-we-losing-the-right-to-privacy-and-freedom-of-speech-on-indian-internet-2187527"&gt; http://www.dnaindia.com/scitech/column-are-we-losing-the-right-to-privacy-and-freedom-of-speech-on-indian-internet-2187527 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf"&gt;http://cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smita Mujumdar, "Use of DPI Technology by ISPs - Response by the Department of Telecommunications" available at 			&lt;a href="http://cis-india.org/telecom/dot-response-to-rti-on-use-of-dpi-technology-by-isps"&gt; http://cis-india.org/telecom/dot-response-to-rti-on-use-of-dpi-technology-by-isps &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy'&gt;https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-16T23:14:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns">
    <title>Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns</link>
    <description>
        &lt;b&gt;Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The use of aggregated Big Data by governments has the potential to 
exacerbate power asymmetries and erode civil liberties like few 
technologies of the past. In order to guard against the aggressive&amp;nbsp; 
aggregation&amp;nbsp;and manipulation of&amp;nbsp;the data generated by individuals&amp;nbsp;who 
are branded&amp;nbsp;as suspect, it is critical that our firmly established 
constitutional rights protect human dignity in the face of this 
potential erosion.&lt;/p&gt;
&lt;p&gt;The increasing ubiquity of Automated Facial Recognition Systems 
(AFRS) serve as a prime example of the rising desire of governments to 
push fundamental rights to the brink. With AFRS, the core fundamental 
right in question is privacy, although questions have been posed 
regarding the potential violation of&amp;nbsp;other related rights, such as the 
Right to Equality and the Right to Free Speech and Expression, as well.&lt;/p&gt;
&lt;p&gt;There is a rich corpus of literature, (see &lt;a href="https://indianexpress.com/article/opinion/columns/digital-identification-facial-recognition-system-ncrb-5859072/" rel="noreferrer noopener" target="_blank"&gt;here&lt;/a&gt;, &lt;a href="http://www.unswlawjournal.unsw.edu.au/wp-content/uploads/2017/09/40-1-11.pdf" rel="noreferrer noopener" target="_blank"&gt;here&lt;/a&gt; and an excellent recent paper by Smriti Parsheera &lt;a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank"&gt;here)&lt;/a&gt;
 from a diverse coterie of scholars that call out the challenges posed 
by AFRS, particularly with respect to its proportionality as a 
restriction over the right to privacy. Our contribution to this 
discourse focuses on a very specific question around a ‘reasonable 
expectation of privacy’ — the standard identified for the protection of 
privacy in public spaces across jurisdictions, including in India. This 
is because at this juncture, the precise nature of the AFRS which will 
eventually be used and the regulations it will be subject to are not 
clear.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In &lt;a href="https://indiankanoon.org/doc/91938676/'"&gt;Retd. K.S &lt;/a&gt;&lt;a href="https://indiankanoon.org/doc/91938676/" rel="noreferrer noopener" target="_blank"&gt;Puttaswamy (Retd.) v. Union of India&lt;/a&gt;:
 Justice Chandrachud (Puttaswamy I), the Indian Supreme Court was 
concerned with the question whether there exists a fundamental right to 
privacy under the Indian Constitution. A nine-judge bench of the Court 
recognized that the right to privacy is a fundamental right implicit 
inter alia in the right to life within Article 21 of the Constitution.&lt;/p&gt;
&lt;p&gt;The right to privacy protects people and not places. Every person is 
entitled, however, to a reasonable expectation of privacy. The 
expectation of privacy must be twofold. First, the person must prove 
that the alleged act could inflict some harm. Such harm must be real and
 not be speculative or imaginary. Second, society must recognize this 
expectation as reasonable. The test of reasonable expectations is 
contextual, i.e., the extent to which it safeguards privacy depends on 
the place at which the individual is.&lt;/p&gt;
&lt;p&gt;In order to pass any constitutional test, therefore, AFRS must 
satisfy the ‘reasonable expectation’ test articulated in Puttaswamy. 
However, in this context, the test itself has multiple contours. Do we 
have a right to privacy in a public place? Is AFRS collecting any data 
that specifically violates a right to privacy? Is the aggregation of 
that data a potential violation?&lt;/p&gt;
&lt;p&gt;After providing a brief introduction to the use cases of AFRS in 
India and across the world, we embark upon answering all these 
questions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Primer on Automated Facial Recognition Systems (AFRS)&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Facial recognition is a biometric technology that utilises cameras to
 match stored or live footage of individuals (including both stills and 
moving footage) with images or video&amp;nbsp;from an existing database. Some 
systems might also be used to analyze broader demographic trends or 
conduct sentiment analysis through crowd scanning.&lt;/p&gt;
&lt;p&gt;While the use of photographs and video footage have been core 
components of police investigation, the use of algorithms to process 
vast tracts of Big Data (characterized by ‘Volume, Velocity, and 
Variety), and compare disparate and discrete data points allows for the 
derivation of hitherto unfeasible insights on the subjects of Big Data.&lt;/p&gt;
&lt;p&gt;The utilisation of AFRS for law enforcement is rapidly spreading around the world. &lt;a href="https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847" rel="noreferrer noopener" target="_blank"&gt;A Global AI Surveillance Index&lt;/a&gt;
 compiled by the Carnegie Endowment for International Peace found that 
at least sixty-four countries are incorporating facial recognition 
systems into their AI surveillance programs.&lt;/p&gt;
&lt;p&gt;Chinese technology company Yitu has entered into a partnership with 
security forces in Malaysia to equip police officers with facial 
recognition body cameras that, powered by enabling technologies, would 
allow a comparison of images caught by the live body cameras with images
 from several central databases.&lt;/p&gt;
&lt;p&gt;In &lt;a href="https://news.sky.com/story/met-polices-facial-recognition-tech-has-81-error-rate-independent-report-says-11755941" rel="noreferrer noopener" target="_blank"&gt;England and Wales&lt;/a&gt;,
 London Metropolitan Police, South Wales Police, and Leicestershire 
Police are all in the process of developing technologies that allow for 
the identification and comparison of live images with those stored in a 
database.&lt;/p&gt;
&lt;p&gt;The technology is being developed by Japanese firm NEC and the police
 force has limited ability to oversee or modify the software, given its 
proprietary nature. The Deputy Chief of South Wales Police stated that 
“the tech is given to [them] as a sealed box… [and the police force 
themselves] have no input – whatever it does, it does what it does.”&lt;/p&gt;
&lt;p&gt;In the US, &lt;a href="https://www.americanbar.org/groups/criminal_justice/publications/criminal-justice-magazine/2019/spring/facial-recognition-technology/" rel="noreferrer noopener" target="_blank"&gt;Baltimore’s police&lt;/a&gt;
 set up facial recognition cameras to track and arrest protestors — a 
system that reached its zenith during the 2018 riots in the city.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is suspected that authorities in &lt;a href="https://www.japantimes.co.jp/news/2019/10/23/asia-pacific/hong-kong-protests-ai-facial-recognition-tech/#.Xf1Fs_zhVPY" rel="noreferrer noopener" target="_blank"&gt;Hong Kong&lt;/a&gt; are also using AFRS to clamp down on the ongoing pro-democracy protests.&lt;/p&gt;
&lt;p&gt;In India, the Ministry of Home Affairs, through the National Crime Records Bureau put out a &lt;a href="http://ncrb.gov.in/TENDERS/AFRS/RFP_NAFRS.pdf" rel="noreferrer noopener" target="_blank"&gt;tender for a new AFRS&lt;/a&gt;,
 whose stated objective is to “act as a foundation for national level 
searchable platform of facial images.” The AFRS will pull facial image 
data from CCTV feeds and compare these with existing records across 
databases including the Crime and Criminal Tracking Networks and Systems
 (CCTNS), Inter-operable Criminal Justice System (or ICJS), Immigration 
Visa Foreigner Registration Tracking (IVFRT), Passport, Prisons and 
state police records.&lt;/p&gt;
&lt;p&gt;Plans are also afoot to integrate this with the yet to be deployed 
National Automated Fingerprint Identification System (NAFIS), thereby 
creating a multi-faceted surveillance system.&lt;/p&gt;
&lt;p&gt;Despite raising eyeballs due to its potential all-pervasive scope, 
this tender is not the first instance of AFRS being used by Indian 
authorities. Punjab Police, &lt;a href="https://www.livemint.com/AI/DIh6fmR6croUJps6x7JW5K/Meet-Staqu-a-startup-helping-Indian-law-enforcement-agencie.html" rel="noreferrer noopener" target="_blank"&gt;in partnership with Gurugram-based start-up Staqu&lt;/a&gt;
 has launched and commenced implementation of&amp;nbsp; the Punjab Artificial 
Intelligence System (PAIS) which uses digitised criminal records and 
automated facial recognition to retrieve information on a suspected 
criminal and essentially tracks their public whereabouts, which poses 
potential constitutional questions.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was published by &lt;a class="external-link" href="https://aipolicyexchange.org/2019/12/26/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns/"&gt;AI Policy Exchange&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns'&gt;https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:01:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/deconstructing-2018internet-addiction2019">
    <title>Deconstructing ‘Internet addiction’ </title>
    <link>https://cis-india.org/news/deconstructing-2018internet-addiction2019</link>
    <description>
        &lt;b&gt;An article by Sruthi Krishnan and Shyam Ranganathan in The Hindu on August 30th,'09 &lt;/b&gt;
        
&lt;p&gt;CHENNAI: Earlier this week, the first rehabilitation centre for ‘Internet addicts’ was opened in the United States. De-addiction camps in China were in the news recently for the death of a teenager because of the brutal methods used there to cure ‘Internet addiction.’&lt;/p&gt;
&lt;p&gt;‘Internet addiction’ for now is a catch-all term that not only stands for addiction to specific activities such as gambling or gaming but also refers to longer hours devoted to the computer network at the expense of other activities.&lt;/p&gt;
&lt;p&gt;Though the Internet is only a medium of communication and information transmission like the printed book or television, ‘addiction’ is being used in this case with concern because of a fundamental dialectic: ‘quantity becomes quality.’&lt;/p&gt;
&lt;p&gt;“A whole new world is just a click away with the Internet. It is a medium just like books and TV, but the amount of interaction it makes possible with others, sometimes replacing the need for real world interaction, makes it vastly different,” says E.S. Krishnamoorthy, consultant neuropsychiatrist, Voluntary Health Services, Chennai.&lt;/p&gt;
&lt;p&gt;Though chemical changes may not be induced by the broadly repetitive action involved in gaming and general ‘Internet addiction,’ social behavioural modifications do take place, including sleep deprivation and aggression towards the depriver of access to the Internet, he says.&lt;/p&gt;
&lt;p&gt;“It is somewhat between Obsessive Compulsive Disorder (OCD) and addiction due to substance abuse. Substance abuse-led addiction focusses on gratification which this form of attachment provides, though there is no chemical ingestion. At the same time, the behavioural modifications are similar to those with OCD. It is almost like the ‘rush’ gamblers get out of a purely gratification-oriented repetitive action,” Dr. Krishnamoorthy adds.&lt;/p&gt;
&lt;h3&gt;Generational gap&lt;/h3&gt;
&lt;p align="justify"&gt;Sunil Abraham, director-policy, Centre for Internet and Society, Bangalore, says what constitutes ‘Internet addiction’ is sometimes misunderstood because of a generational gap between those who grew up immersed in technology and those who adopted technology later in their lives.&lt;/p&gt;
&lt;p&gt;Can a teenager’s extensive use of social networking be categorised as ‘addiction’? Not necessarily. Social networking could lead to forging new relationships which could be beneficial.&lt;/p&gt;
&lt;p&gt;For now, such activities may not be the norm, but it could be the way our society is configured in the future, says Mr. Abraham.&lt;/p&gt;
&lt;p&gt;The Internet itself offers solutions to balance your real and virtual activities. For instance, ‘Freedom’ is an application that disables networking on an Apple computer for up to eight hours at a time. In the settings of Google mail, you can enable ‘Email addict’ (a Google Labs feature) that disables your screen and makes you invisible on chat for 15 minutes. There are many such timer software that let you set a period for which a certain activity would be banned.&lt;/p&gt;
&lt;p&gt;Dr. Krishnamoorthy advocates counselling and concerted effort to increase real world social interactions for “treating” Internet addiction. He warns that the problem is larger in that we are creating an “inward-looking society.”&lt;/p&gt;
&lt;p&gt;“There is a big problem on hand if many people replace the real world with the Internet instead of using it as a device to enhance interactions,” he says.&lt;/p&gt;
&lt;p&gt;Mr. Abraham says controls should come from a more open and informed discussion, of which even children are a part. Dubbing an activity not fully understood an “addiction” and imposing old-fashioned controls are not the right approach, he adds.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/deconstructing-2018internet-addiction2019'&gt;https://cis-india.org/news/deconstructing-2018internet-addiction2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T15:09:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india">
    <title>Decline in web freedom steepest in India: Report</title>
    <link>https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india</link>
    <description>
        &lt;b&gt;In a report on the state of internet in 60 countries, Freedom House, a US-based organization, said that in 2013 India saw the "most significant year-on-year decline" in terms of the web freedom.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Javed Anwer was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-10-03/internet/42663467_1_web-freedom-anja-kovacs-internet-democracy-project"&gt;published in the Times of India&lt;/a&gt; on October 3, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The report said that that the internet in India was "partly free". This  is the same status that India had in 2012. But the country's score is  now 47 points (higher means more censorship) in 2013 compared to 39 in  2012. The 8-point fall is the steepest Freedom House found among all 60  countries that the group surveyed. Freedom House said it recorded  5-point fall in Brazil, Venezuela and the US.&lt;/p&gt;
&lt;div class="mod-articletext mod-timesofindiaarticletext mod-timesofindiaarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;Despite mass surveillance revealed by Edward Snowden, a former  contractor for National Security Agency in the US, Freedom House calls  the web in the country "free".&lt;/p&gt;
&lt;p&gt;The Freedom House report said that  in 2013 India "suffered from deliberate interruptions of mobile and  internet service to limit unrest, excessive blocks on content during  rioting in northeastern states, and an uptick in the filing of criminal  charges against ordinary users for posts of social media sites".&lt;/p&gt;
&lt;p&gt;In 2013, India's commitment to the web freedom has not only been worse  than developed countries but has also been inferior to countries like  Malawi, Tunisia and Mexico.&lt;/p&gt;
&lt;p&gt;In the case of India, Freedom House  particularly singles out Central Monitoring System, which Indian  government is putting in place to regulate and monitor the web usage  within the country. "Surveillance (under CMS) requires no judicial  oversight. While some of this activity might be justifiable, the lack of  transparency surrounding the system, which was never reviewed by  Parliament, is concerning," it notes in the report. "The system's  potential for abuse is also disquieting, as is its inadequate legal  framework.&lt;/p&gt;
&lt;p&gt;The report cites the case of the girl who was arrested for liking a Facebook post in Maharashtra, blocking of some &lt;a href="http://timesofindia.speakingtree.in/topics/thoughts/twitter"&gt;Twitter&lt;/a&gt; accounts belonging to Indian users, overly broad court directives that  have resulted in blocking of websites and a general lack of transparency  in how Indian government blocks or filters content reach a conclusion  that Indians now have less freedom on how they use the web.&lt;/p&gt;
&lt;p&gt;Sunil  Abraham, director at Bangalore-based Centre for Internet and Society,  says that Freedom House reports are not very accurate because they don't  factor in censorship by copyright holders. But he agreed with its basic  premise that in India conditions for web users are getting more  difficult.&lt;/p&gt;
&lt;p&gt;"The report is absolutely right in pointing out that  censorship and surveillance in India is increasing. Despite protests  from many quarters, it is a real pity that the government is not taking  steps to amend the IT act and has joined other nation states in the  global race to the bottom of the internet freedom," said Abraham.&lt;/p&gt;
&lt;p&gt;Anja Kovacs, founder of Delhi-based Internet Democracy Project, agrees.  "I have some issues with Freedom House reports due to how they are  prepared and their methodologies. But yes I can say that last year has  been very eventful and difficult," said. "But at the same time, there  has also been a lot of push back from web users and activists. There  have been conversations around the issue of web censorship, which is  good."&lt;/p&gt;
&lt;p&gt;Globally, the web surveillance is on the rise. "Broad  surveillance, new laws controlling web content, and growing arrests of  social-media users drove a worldwide decline in internet freedom in the  past year," noted Freedom House.&lt;/p&gt;
&lt;p&gt;Overall, 34 out of 60 countries part of the report saw a decline in  the web freedom. "Vietnam and Ethiopia continued on a worsening cycle of  repression; Venezuela stepped up censorship during presidential  elections; and three democracies—India, the United States, and  Brazil—saw troubling declines," noted the report.&lt;/p&gt;
Iceland and  Estonia topped the list of countries with the greatest degree of  internet freedom. China, Cuba, and Iran were found to be the most  repressive countries.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india'&gt;https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-10-24T03:50:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy">
    <title>Deceptive Design in Voice Interfaces: Impact on Inclusivity, Accessibility, and Privacy </title>
    <link>https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy</link>
    <description>
        &lt;b&gt;This article was commissioned by the Pranava Institute, as part of their project titled Design Beyond Deception, supported by the University of Notre Dame - IBM's Tech Ethics Lab.” The article examines the design of voice interfaces (VI) to anticipate potential deceptive design patterns in VIs. It also presents design and regulatory recommendations to mitigate these practices. &lt;/b&gt;
        &lt;p&gt;The original blog post can be accessed &lt;a class="external-link" href="https://www.design.pranavainstitute.com/post/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Voice Interfaces (VIs) have come a long way in recent years and are easily available as inbuilt technology with smartphones, downloadable applications, or standalone devices. In line with growing mobile and internet connectivity, there is now an increasing interest in India in internet-based multilingual VIs which have the potential to enable people to access services that were earlier restricted by language (primarily English) and interface (text-based systems). This current interest has seen even global voice applications such as Google Home and Amazon’s Alexa being available in &lt;a class="itht3 TWoY9" href="https://www.businesstoday.in/technology/news/story/now-talk-to-alexa-seamlessly-in-hindi-english-and-hinglish-231469-2019-10-09" rel="noopener noreferrer" target="_blank"&gt;Hindi&lt;/a&gt; (Singal, 2019) as well as the &lt;a class="itht3 TWoY9" href="https://voice.cis-india.org/#mapping-actors" rel="noopener noreferrer" target="_blank"&gt;growth&lt;/a&gt; of multilingual voice bots for certain banks, hotels, and hospitals (Mohandas, 2022).&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;The design of VIs can have a significant impact on the behavior of the people using them. Deceptive design patterns or design practices that trick people into taking actions they might otherwise not take (Tech Policy Design Lab, n.d.), have gradually become pervasive in most digital products and services. Their use in visual interfaces has been widely &lt;a class="itht3 TWoY9" href="https://dl.acm.org/doi/pdf/10.1145/3400899.3400901" rel="noopener noreferrer" target="_blank"&gt;criticized&lt;/a&gt; by researchers (Narayanan, Mathur, Chetty, and Kshirsagar, 2020), along with recent &lt;a class="itht3 TWoY9" href="https://tacd.org/manipulative-design-practices-online-what-policy-solutions-for-the-eu-and-the-u-s/" rel="noopener noreferrer" target="_blank"&gt;policy interventions&lt;/a&gt; (Schroeder and Lützow-Holm Myrstad, 2022) as well. As VIs become more relevant and mainstream, it is critical to anticipate and address the use of deceptive design patterns in them. This article, based on our learnings from the &lt;a class="itht3 TWoY9" href="http://voice.cis-india.org/index.html" rel="noopener noreferrer" target="_blank"&gt;study&lt;/a&gt; of VIs in India, examines the various types of deceptive design patterns in VIs and focuses on their implications in terms of linguistic barriers, accessibility, and privacy.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Potential deceptive design patterns in VIs&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Our research findings suggest that VIs in India are still a long way off from being inclusive, accessible and privacy-preserving. While there has been some development in multilingual VIs in India, their compatibility has been limited to a few Indian languages (Mohandas, 2022) (Naidu, 2022)., The potential of VIs as a tool for people with vision loss and certain cognitive disabilities such as dyslexia is widely recognized (Pradhan, Mehta, and Findlater, 2018), but our conversations suggest that most developers and designers do not consider accessibility when conceptualizing a voice-based product, which leads to interfaces that do not understand non standard speech patterns, or have only text-based privacy policies (Mohandas, 2022). Inaccessible privacy policies full of legal jargon along with the lack of regulations specific to VIs,  also make people vulnerable to privacy risks.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Deceptive design patterns can be used by companies to further these gaps in VIs. As with visual interfaces, the affordances and attributes of VI can determine the way in which they can be used to manipulate behavior. Kentrell Owens, et.al in their recent &lt;a class="itht3 TWoY9" href="https://homes.cs.washington.edu/~kentrell/static/papers/owensEuroUSEC2022-preprint.pdf" rel="noopener noreferrer" target="_blank"&gt;research&lt;/a&gt; lay down six unique properties of VIs that may be used to implement deceptive design patterns (Owens, Gunawan, Choffnes, Emami-Naeini, Kohno, and Roesner, 2022). Expanding upon these properties, and drawing from our research, we look at how they can be exacerbated in India.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Making processes cumbersome&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;VIs are often limited by their inability to share large amounts of information through voice. They thus operate in combination with a smartphone app or a website. This can be intentionally used by platforms to make processes such as changing privacy settings or accessing the full privacy notice inconvenient for people to carry out. In India, this is experienced while unsubscribing from services such as Amazon Prime (Owens et al., 2022). Amazon Echo Dot presently allows individuals to subscribe to an Amazon Prime membership using a voice command, but directs them to use the website in order to unsubscribe from the membership. This can also manifest in the form of canceling orders and changing privacy settings.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;VIs follow a predetermined linear structure that ensures a tightly controlled interaction. People make decisions based on the information they are provided with at various steps. Changing their decision or switching contexts could involve going back several steps. People may accept undesirable actions from the VI in order to avoid this added effort (Owens et al., 2022). The urgency to make decisions on each step can also cause people to make unfavorable choices such as allowing consent to third party apps. The VI may prompt advertisements and push for the company’s preferred services in this controlled conversation structure, which the user cannot side-step. For example, while setting up the Google voice assistant on any device, it nudges people to sign into their Google account. This means the voice assistant gets access to their web and app activity and location history at this step. While the data management of Google accounts can be tweaked through the settings, it may get skipped during a linear set-up structure. Voice assistants can also push people to opt into features such as ads personalisation, default news sources, and location tracking.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Making options difficult to find&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Discoverability is another challenge for VIs. This means that people might find it difficult to discover available actions or options using just voice commands. This gap can be misused by companies to trick people into making undesirable choices. For instance, while purchasing items, the VI may suggest products that have been sponsored and not share full information on other cheaper products, forcing people to choose without complete knowledge of their options. Many mobile based voice apps in India use a combination of images or icons with the voice prompts to enable discoverability of options and potential actions, which excludes people with vision loss (Naidu, 2022). These apps comprise a voice layer added to an otherwise touch-based visual platform so that people are able to understand and navigate through all available options using the visual interface, and use voice only for purposes such as searching or narrating. This means that these apps cannot be used through voice alone, making them disadvantageous for people with vision loss.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Discreet integration with third parties&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;VIs can use the same voice for varying contexts. In the case of Alexa, Skills, which are apps on its platform, have the same voice output and invocation phrases as its own in-built features. End users find it difficult to differentiate between an interaction with Amazon and that with Skills which are third-party applications. This can cause users to share information that they otherwise would not have with third parties (Mozilla Foundation, 2022). There are numerous Amazon Skills inHindi and people might not be aware that the developers of these Skills are &lt;a class="itht3 TWoY9" href="https://www.theverge.com/2021/3/5/22315211/amazon-alexa-skills-how-to-remove-security-privacy-problems" rel="noopener noreferrer" target="_blank"&gt;not vetted &lt;/a&gt;by Amazon. This misunderstanding can create significant privacy or security risks if Skills are linked to contacts, banking, or social media accounts.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Lack of language inclusivity &lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;The lack of local language support, colloquial translations, and accents can lead to individuals not receiving clear and complete information. VI’s failure to understand certain accents can also make people feel isolated (Harwell, 2018). While in India voice assistants and even voice bots are available in few Indic languages, the default initial setup, privacy policies, and terms and conditions are still in English. The translated policies also use literary language which is difficult for people to understand, and miss out on colloquial terms. This could mean that the person might have not fully understood these notices and hence not have given informed consent. Such use of unclear language and unavailability of information in Indic languages can be viewed as a deceptive design pattern.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Making certain choices more apparent &lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;The different dimensions of voice such as volume, pitch, rate, fluency, pronunciation, articulation, and emphasis can be controlled and manipulated to implement deceptive design patterns. VIs may present the more privacy-invasive options more loudly or clearly, and the more privacy-preserving options more softly or quickly. It can use tone modulations to shame people into making a specific choice (Owens et al., 2022). For example, media streaming platforms may ask people to subscribe for a premium account to avoid ads in normal volume and mention the option to keep ads in a lower volume. Companies have also been observed to discreetly integrate product advertisements in voice assistants using tone. SKIN, a neurotargeting advertising strategy business, used a change of tone of the voice assistant to suggest a dry throat to advertise a drink (Chatellier, Delcroix, Hary, and Girard-Chanudet, 2019).&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;The attribution of gender, race, class, and age through stereotyping can create a persona of the VI for the user. This can extend to personality traits, such as an extroverted or an introverted, docile or aggressive character (Simone, 2020). The default use of female voices with a friendly and polite persona for voice assistants has drawn criticism for perpetuating harmful gender stereotypes (Cambre and Kulkarni, 2019). Although there is an option to change the wake word “Alexa” in Amazon’s devices, certain devices and third party apps do not work with another wake word (Ard, 2021). Further, projection of demographics can also be used to employ deceptive design patterns. For example, a VI persona that is constructed to create a perception of intelligence, reliability, and credibility can have a stronger influence on people’s decisions. Additionally, the effort to make voice assistants as human sounding as possible without letting people know they are human, could create a number of &lt;a class="itht3 TWoY9" href="https://www.nytimes.com/2019/05/22/technology/personaltech/ai-google-duplex.html" rel="noopener noreferrer" target="_blank"&gt;issues&lt;/a&gt; (X. Chen and Metz, 2019). First time users might divulge sensitive information thinking that they are interacting with a person. This becomes more ethically challenging when persons with vision loss are not able to know who they are interacting with.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Recording without notification &lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Owens et al speak about VIs occupying physical domains due to which they have a much wider impact as opposed to a visual interface (Owens et al., 2022). The always-on nature of virtual assistants could result in personal information of a guest being recorded without their knowledge or consent as consent is only given at the setup stage by the owner of the device or smartphone.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Making personalization more convenient through data collection&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;VIs are trained to adapt to the experience and expertise of the user. Virtual assistants provide personalization and the possibility to download a number of skills, save payment information, and phone contacts. In order to facilitate differentiation between multiple users on the same VI, individuals talking to the device are profiled based on their speech patterns and/or voice biometrics. This also helps in controlling or restricting content for children (Naidu, 2022). There is also tracking of commands to identify and list their intent for future use. The increase of specific and verified data can be used to provide better targeted advertisements, as well possibly be shared with law enforcement agencies in certain cases. &lt;a class="itht3 TWoY9" href="https://www.business-standard.com/article/current-affairs/razorpay-shared-donor-data-with-police-claims-alt-news-122070501255_1.html" rel="noopener noreferrer" target="_blank"&gt;Recently&lt;/a&gt;, a payment gateway company was made to share customer information to the law enforcement without their customer’s knowledge. This included not just the information about the client but also revealed sensitive personal data of the people who had used the gateway for transactions to the customer. While providing such details are not illegal and companies are meant to comply with requests from law enforcement, if more people knew of the possibility of every conversation of the house being accessible to law enforcement they would make more informed choices of what the VI records.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Reducing friction in actions desired by the platform&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;One of the fundamental advantages of VIs is that it can reduce several steps to perform an action using a single command. While this is helpful to people interacting with it, the feature can also be used to reduce friction from actions that the platform wants them to take. These actions could include sharing sensitive information, providing consent to further data sharing, and making purchases. An &lt;a class="itht3 TWoY9" href="http://insider.com/kids-alexa-buy-700-worth-of-toys-moms-credit-card-2019-12" rel="noopener noreferrer" target="_blank"&gt;&lt;span class="D-jZk"&gt;example&lt;/span&gt;&lt;/a&gt; of this can be seen where children have found it very easy to purchase items using Alexa (BILD, 2019).&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Recommendations for Designers and Policymakers&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Through these deceptive design patterns, VIs can obstruct and control information according to the preferences of the platform. This can result in a heightened impact on people with less experience with technology. Presently, profitability is a key driving factor for development and design of VI products. There is more importance given to data-based and technical approaches, and interfaces are often conceptualized by people with technical expertise with lack of inputs from designers at the early stages (Naidu, 2022). Designers also focus more on the usability and functionality of the interfaces by enabling personalization, but are often not as sensitive to safeguarding the rights of individuals using them. In order to tackle deceptive design, designers must work towards prioritizing ethical practice, and building in more agency and control for people who use VIs.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Many of the potential deceptive design patterns can be addressed by designing for accessibility and inclusivity in a privacy preserving manner. This includes vetting third-party apps, providing opt-outs, and clearly communicating privacy notices. Privacy implications can also be prompted by the interface at the time of taking actions. There should be clear notice mechanisms such as a prominent visual cue to alert people when a device is on and recording, along with an easy way to turn off the ‘always listening’ mode. The use of different voice outputs for third party apps can also signal to people about who they are interacting with and what information they would like to share in that context.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Training data that covers a diverse population should be built for more inclusivity. A linear and time-efficient architecture is helpful for people with cognitive disabilities. But, this linearity can be offset by adding conversational markers that let the individual know where they are in the conversation (Pearl, 2016). This could address discoverability as well, allowing people to easily switch between different steps. Speech-only interactions can also allow people with vision loss to access the interface with clarity.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;A number of policy documents including the 2019 version of India’s Personal Data Protection Bill, emphasize on the need for privacy by design. But, they do not mention how deceptive design practices could be identified and avoided, or prescribe penalties for using these practices (Naidu, Sheshadri, Mohandas, and Bidare, 2020). In the case of VI particularly, there is a need to look at it as biometric data that is being collected and have related regulations in place to prevent harm to users. In terms of accessibility as well, there could be policies that require not just websites but also apps (including voice based apps) to be compliant with international accessibility guidelines , and to conduct regular audits to ensure that the apps are meeting the accessibility threshold.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy'&gt;https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Saumyaa Naidu and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2023-08-08T15:22:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2018-newsletter">
    <title>December 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/december-2018-newsletter</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society (CIS) wish you all a great year ahead and welcome you to the twelfth issue of its newsletter (December) for the year 2018: &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;Highlights&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS &lt;a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy"&gt;signed a MoU&lt;/a&gt; with Odia Virtual Academy to      work on drafting an open content policy for the state, to promote use of      Wikimedia projects by various user types and to ensure sustainability of      Wikimedia projects, and to facilitate development of relevant free and      open source software projects. This partnership between OVA and CIS will      be carried out from December 2018 to November 2019.&lt;/li&gt;
&lt;li&gt;Natalia Khaniejo, in a &lt;a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"&gt;four-part report&lt;/a&gt; has attempted to document      the various approaches that are being adopted by different stakeholders      towards incentivizing cybersecurity and the economic challenges of      implementing the same. The literature review was edited by Amber Sinha.&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, Karan Saini,      Aayush Rathi and Swaraj Barooah &lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic"&gt;created an infographic&lt;/a&gt; which has mapped the      key stakeholder, areas of focus and threat vectors that impact      cybersecurity policy in India. The authors have stated that broadly      policy-makers should concentrate on establishing a framework where      individuals feel secure and trust the growing digital ecosystem.&lt;/li&gt;
&lt;li&gt;In April 2018 European Union      issued the proposal for a new regime dealing with cross border sharing of      data and information by issuing two draft instruments, an E-evidence      Regulation (“Regulation”) and an E-evidence Directive (“Directive”),      (together the “E-evidence Proposal”). Vipul Kharbanda &lt;a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"&gt;has analysed&lt;/a&gt; how service providers based in      India whose services are also available in Europe would be affected by      these proposals.&lt;/li&gt;
&lt;li&gt;Feminist research methodology      is a vast body of knowledge, spanning across multiple disciplines      including sociology, media studies, and critical legal studies. A &lt;a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research"&gt;literature review by Ambika Tandon&lt;/a&gt; aims to      understand key aspects of feminist methodology across these disciplines,      with a particular focus on research on technology and its interaction with      society.&lt;/li&gt;
&lt;li&gt;CIS and design collective      Design Beku came together &lt;a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"&gt;for a workshop on Illustrations&lt;/a&gt; and Visual      Representations of Cybersecurity. The authors Paromita Bathija, Padmini      Ray Murray, and Saumyaa Naidu have stated that images play a vital role in      the public’s perception of cybercrime and cybersecurity. &lt;/li&gt;
&lt;li&gt;A list of selected sessions and      papers for the Internet Researchers' Conference 2019 (IRC19) &lt;a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers"&gt;has been published&lt;/a&gt;. IRC19 will be held in      Lamakaan, Hyderabad, from Jan 30 to Feb 1, 2019.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security"&gt;Private-public partnership for cyber security&lt;/a&gt; (Arindrajit Basu; Hindu Businessline; December 24, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle"&gt;Is the new ‘interception’ order old wine in a new      bottle?&lt;/a&gt; (Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and      Pranav M. Bidare; Newslaundry.com; December 27, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/indian-express-nishant-shah-december-30-2018-digital-native-system-needs-a-robot"&gt;Digital Native: System Needs a Reboot&lt;/a&gt; (Nishant Shah; Indian Express; December 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-december-6-2018-many-sites-bypass-porn-ban"&gt;Many sites bypass porn ban&lt;/a&gt; (Rajitha Menon;      Deccan Herald; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook"&gt;How data privacy and governance issues have battered      Facebook ahead of 2019 polls&lt;/a&gt; (Rahul Sachitanand; Economic      Times; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls"&gt;Is Aadhaar Essential To Achieve Error-Free Electoral      Rolls?&lt;/a&gt; (Bloomberg Quint; December 16, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy"&gt;Centre’s order on computer surveillance threatens right      to privacy, experts say&lt;/a&gt; (Abhishek Dey; Scroll.in; December 22,      2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"&gt;Centre’s order on computer surveillance is backed by      law – but the law lacks adequate safeguards&lt;/a&gt; (Nehaa Chaudhari      and Tuhina Joshi; Scroll.in; December 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data"&gt;Ten Indian government agencies can now snoop on      people’s internet data&lt;/a&gt; (David Spenser; VPN Compare; December      24, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete"&gt;Big Brother is here: Amid snooping row, govt report      says monitoring system 'practically complete'&lt;/a&gt; (Keerthana      Sankaran; New Indian Express; December 26, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content"&gt;MHA snoop order &amp;amp; bid to amend IT rules: China-like      clampdown or tracking unlawful content?&lt;/a&gt; (Fatima Khan; The Print      December 28, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech"&gt;The dark side of future tech: Where are we headed on      privacy, security, truth? &lt;/a&gt;(Dipanjan Sinha; Hindustan Times; December      29, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order"&gt;The constitutionality of MHA surveillance order&lt;/a&gt; (Nehaa Chaudhari; Asian Age; December 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/punjabi-wikisource-training-workshop-patiala"&gt;Punjabi Wikisource Training Workshop, Patiala&lt;/a&gt; (Jayanta Nath; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/indic-wikisource-community-consultation-2018"&gt;Indic Wikisource Community Consultation 2018&lt;/a&gt; (Jayanta Nath; December 8, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy"&gt;CIS Signs MoU with Odia Virtual Academy&lt;/a&gt; (Sailesh      Patnaik; December 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Lecture&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/news/lecture-on-open-access-and-open-content-licensing-at-icar-short-course"&gt;Lecture on Open Access and Open Content Licensing at      ICAR (short course)&lt;/a&gt; (Organized by ICAR-Indian Institute of      Horticultural Research (IIHR) a constituent establishment of Indian      Council of Agricultural Research; November 13 - 22, 2018). Anubha Sinha      delivered a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Lecture&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude"&gt;Teaching at Shristi Interlude&lt;/a&gt; (Organised by      Shristi; Bangalore; December 7, 2018). Shweta Mohandas participated as a      mentor.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Gender &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research"&gt;Feminist Methodology in Technology Research: A      Literature Review&lt;/a&gt; (Ambika Tandon with contributions from Mukta      Joshi; research assistance by by Kumarjeet Ray and Navya Sharma; design by      Saumyaa Naidu; December 23, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/intermediary-liability-and-gender-based-violence"&gt;Event Report on Intermediary Liability and Gender Based      Violence &lt;/a&gt;(Akriti Bopanna; edited by Ambika Tandon; December 20,      2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018"&gt;International Network on Feminist Approaches to      Bioethics 2018&lt;/a&gt; (Co-organized by Feminist Approaches to      Bioethics and Sama; St. John's Medical College; Bangalore; December 3 - 5,      2018). Aayush Rathi and Ambika Tandon were speakers at the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Cyber Security&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"&gt;European E-Evidence Proposal and Indian Law&lt;/a&gt; (Vipul Kharbanda; December 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"&gt;Economics of Cybersecurity: Literature Review      Compendium&lt;/a&gt; (Natalia Khaniejo; edited by Amber Sinha; December      31, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Infographic&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic"&gt;Mapping cybersecurity in India: An infographic&lt;/a&gt; (information contributed by Arindrajit Basu, Karan Saini, Aayush Rathi and      Swaraj Barooah; designed by Saumyaa Naidu; December 23, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"&gt;A Critical Look at the Visual Representation of      Cybersecurity&lt;/a&gt; (Paromita Bathija, Padmini Ray Murray, and      Saumyaa Naidu; December 11, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/india-china-tech-forum"&gt;India-China Tech Forum 2018&lt;/a&gt; (Organised by      ORF and Peking University at the Ji Xianlin Centre for India-China      Studies; Mumbai; December 11 - 12, 2018). Arindrajit Basu was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Artificial Intelligence &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/future-tech-and-future-law"&gt;Future Tech and Future Law&lt;/a&gt; (Organised by      Dept. of IT &amp;amp; BT, Government of Karnataka; Palace Grounds; Bangalore;      November 29 - December 1, 2018). Arindrajit Basu was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit"&gt;AI for Social Good Summit&lt;/a&gt; (Co-organised by      Google AI and United Nations ESCAP; Bangkok; December 13, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Selected Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers"&gt;Internet Researchers' Conference 2019&lt;/a&gt; (IRC19): #List - Selected Sessions and Papers (P.P. Sneha; January 2,      2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr size="2" style="text-align: justify; " width="100%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt; &lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge:      a2k@cis-india.org &lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work:      raw@cis-india.org &lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at tanveer@cis-india.org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2018-newsletter'&gt;https://cis-india.org/about/newsletters/december-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-01-08T16:15:38Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2017-newsletter">
    <title>December 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/december-2017-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Shruthi Anand &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/artificial-intelligence-literature-review"&gt;wrote a report&lt;/a&gt; that seeks to map the development of Artificial Intelligence both generally and in specific sectors culminating in a stakeholder analysis and contributions to policy making.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS made a submission to the Department of Industrial Planning and Promotion on December 7, 2017. CIS also &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/submission-to-dipp-at-meeting-with-ip-stakeholders"&gt;offered its assistance on other matters aimed at developing a suitable policy framework for SEPs and FRAND in India&lt;/a&gt;, and, working towards sustained innovation, manufacture and availability of mobile technologies in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Office of the Controller General of Patents, Designs and Trademarks held a meeting with IP stakeholders on December 7, 2017, chaired by the Secretary, DIPP, to take suggestions on improving procedures and functioning of the Office. &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-submissions-to-dipp-and-cgptdm-at-meeting-with-ip-stakeholders"&gt;Anubha Sinha attended the meeting and requested the DIPP to improve compliance of uploading Form 27s by patentees and ensure proper enforcement of related provisions within the Indian Patent Act, 1970&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A Kannada Wikipedia orientation workshop was held at the Entrepreneurship Centre, SID, Indian Institute of Science, Bengaluru on 26 November, 2017. The &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/kannada-wikipedia-orientation-workshop-at-iisc-bengaluru"&gt;day long event was aimed at adding content to Kannada Wikimedia projects&lt;/a&gt; on topics such as ecology, environment, wildlife and sciences of Karnataka.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shyam Ponappa &lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-december-6-2017-shyam-ponappa-the-tragedy-of-the-unused-commons"&gt;wrote an article on the tragedy of commons&lt;/a&gt; in the Business Standard on December 6, 2017.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Just like porn is not real life, all news is not real news. It’s time, therefore, to come of age in the 18th year of this century, wrote Nishant Shah in an article in the &lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-december-31-2017-digitial-native-the-age-of-consent"&gt;Indian Express&lt;/a&gt; on December 31, 2017.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;CIS wrote the following articles:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-"&gt;New Recommendations to Regulate Online Hate Speech Could Pose More Problems Than Solutions&lt;/a&gt; (Amber Sinha; Wire; October 14, 2017). &lt;i&gt;This was published in the month of December on the CIS website&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-"&gt;Breeding misinformation in virtual space&lt;/a&gt; (Amber Sinha; Asian Age; December 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime"&gt;India’s Data Protection Regime Must Be Built Through an Inclusive and Truly Co-Regulatory Approach&lt;/a&gt;&lt;span&gt; (Amber Sinha; Wire; December 1, 2017).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-december-3-2017-digital-native-memory-card-is-full"&gt;Digital native: Memory card is full&lt;/a&gt; (Nishant Shah; Indian Express; December 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/should-aadhaar-be-mandatory"&gt;Should Aadhaar be mandatory?&lt;/a&gt; (Amber Sinha; Deccan Herald; December 9, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-december-31-2017-digitial-native-the-age-of-consent"&gt;Digital native: The age of consent&lt;/a&gt; (Nishant Shah; Indian Express; December 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;CIS in the News:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts"&gt;Aadhaar linking deadline approaches: Here are all the myths and facts&lt;/a&gt; (Business Today; December 7, 2017).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts"&gt;Checks and balances needed for mass surveillance of citizens, say experts&lt;/a&gt; (Hindu; December 9, 2017).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts"&gt;Masking personal data to protect privacy crucial for India, say experts&lt;/a&gt; (Deepti Govind; Livemint; December 11, 2017).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops"&gt;Paranoid about state surveillance? Here’s the FD Guide to living in the age of snoops&lt;/a&gt; (Sriram Sharma; Factor Daily; December 12, 2017).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march"&gt;Deadline For Linking Bank Accounts With Aadhaar To Be Extended To 31 March&lt;/a&gt; (Komal Gupta and Ramya Nair; Livemint; December 14, 2017).&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Copyright &amp;amp; Patent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/submission-to-dipp-at-meeting-with-ip-stakeholders"&gt;Submission to DIPP at Meeting with IP Stakeholders&lt;/a&gt; (Anubha Sinha; December 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-submissions-to-dipp-and-cgptdm-at-meeting-with-ip-stakeholders"&gt;CIS' Submission to DIPP and CGPDTM at meeting with IP Stakeholders&lt;/a&gt; (Anubha Sinha; December 13, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;►&lt;/span&gt;Wikipedia&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/christ-university-wikipedia-education-program-internship-1"&gt;Christ University Wikipedia Education Program Internship&lt;/a&gt; (Manasa Rao; December 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/wikipedia-orientation-program-at-rotary-club-of-salem"&gt;Wikipedia Orientation Program at Rotary Club of Salem&lt;/a&gt; (Manasa Rao; December 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/nichole-saad-from-the-wikimedia-foundation-visits-christ-university"&gt;Nichole Saad from the Wikimedia Foundation visits Christ University&lt;/a&gt; (Manasa Rao; December 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/kannada-wikipedia-orientation-workshop-at-iisc-bengaluru"&gt;Kannada Wikipedia Orientation Workshop at IISc, Bengaluru&lt;/a&gt; (A. Gopalakrishna; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/wikimedia-technical-workshop-at-savitribai-phule-pune-university"&gt;Wikimedia Technical Workshop at Savitribai Phule Pune University&lt;/a&gt; (Manasa Rao; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-for-sandarbh-science-magazine-writers"&gt;Marathi Wikipedia workshop for Sandarbh Science magazine writers&lt;/a&gt; (Manasa Rao; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-vishwakosh-workshop-for-science-writers-in-iucaa-pune"&gt;Marathi Wikipedia - Vishwakosh Workshop for Science writers in IUCAA, Pune&lt;/a&gt; (Manasa Rao; December 20, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►&lt;/span&gt;Free Speech &amp;amp; Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/it-hurts-them-too"&gt;It Hurts Them Too&lt;/a&gt; (Mir Farhat; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/internet-shutdowns-a-modern-day-siege"&gt;Internet Shutdowns: A Modern-day Siege&lt;/a&gt; (Ayswarya Murthy; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/days-to-derail-work-of-two-generations"&gt;Days to Derail Work of Two Generations?&lt;/a&gt; (Mahesh Kumar Shiva; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/sorry-business-closed-until-internet-is-back-on"&gt;Sorry, Business Closed until Internet is Back On&lt;/a&gt; (Nalanda Tambe; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/stock-brokers-dont-love-an-internet-shutdown"&gt;Stock Brokers Don't Love an Internet Shutdown&lt;/a&gt; (Binita Parikh; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/was-there-an-unofficial-internet-shutdown-in-bhu-ntpc"&gt;Was there an Unofficial Internet Shutdown in BHU &amp;amp; NTPC?&lt;/a&gt; (Saurabh Sharma; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/how-media-beat-the-shutdown-in-darjeeling"&gt;How Media beat the Shutdown in Darjeeling&lt;/a&gt; (Manish Adhikary; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/internet-and-the-police-tool-to-some-trash-to-others"&gt;Internet and the Police: Tool to Some, Trash to Others&lt;/a&gt; (Manoj Kumar; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/business-woes-from-saharanpurs-internet-ban"&gt;Business Woes from Saharanpur's Internet Ban&lt;/a&gt; (Mahesh Kumar Shiva; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/amid-unrest-in-the-valley-students-see-a-dark-wall"&gt;Amid Unrest in the Valley, Students See a Dark Wall&lt;/a&gt; (Aakash Hassan; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-rising-stars-in-music-loath-losing-their-only-platform"&gt;The Rising Stars in Music Loath Losing their Only Platform&lt;/a&gt; (Umar Shah and Mir Farhat; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/internet-and-banking-a-trust-broken"&gt;Internet and Banking: A Trust Broken&lt;/a&gt; (Roshan Gupta; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/online-or-offline-protest-goes-on"&gt;Online or Offline, Protest Goes On&lt;/a&gt; (Junaid Nabi Bazaz; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/digital-banking-dreams-interrupted"&gt;Digital Banking Dreams: Interrupted&lt;/a&gt; (Safeena Wani; December 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/will-darjeeling-regain-the-trust-of-tourists"&gt;Will Darjeeling Regain the Trust of Tourists?&lt;/a&gt; (Roshan Gupta; December 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/silence-on-the-dera-front"&gt;Silence on the Dera Front&lt;/a&gt; (Sat Singh; December 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/isps-in-kashmir-grappling-with-mounting-losses-amid-recurrent-shutdowns"&gt;ISPs in Kashmir Grappling with Mounting Losses Amid Recurrent Shutdowns&lt;/a&gt; (Safina Wani; December 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/taxes-in-the-time-of-internet-shutdown"&gt;Taxes in the Time of Internet Shutdown&lt;/a&gt; (Avijit Sarkar; December 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/every-town-had-its-jio-dara"&gt;Every Town had its Jio Dara&lt;/a&gt; (Ayswarya Murthy; December 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/education-and-employment-opportunities-tossed-out-of-the-window"&gt;Education and Employment Opportunities Tossed out of the Window&lt;/a&gt; (Roshan Gupta; December 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/darjeeling2019s-e-commerce-crumbles-after-100-days-sans-internet"&gt;Darjeeling’s e-commerce Crumbles after 100 days sans Internet&lt;/a&gt; (Avijit Sarkar; December 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/e-administration-efforts-are-lame-ducks-without-internet"&gt;E-administration Efforts are Lame Ducks without Internet&lt;/a&gt; (Amit Kumar and Sat Singh; December 20, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;►Privacy&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/artificial-intelligence-literature-review"&gt;Artificial Intelligence - Literature Review&lt;/a&gt;&lt;span&gt; (Shruthi Anand; edited by Amber Sinha and Udbhav Tiwari with research assistance by Sidharth Ray; December 16, 2017).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/ai-and-healthcare-in-india-looking-forward"&gt;AI and Healthcare in India: Looking Forward&lt;/a&gt; (Shweta Mohandas; edited by Roshni Ranganathan; December 16, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div&gt;&lt;strong&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Participation in Event&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/figi-symposium-2017"&gt;FIGI Symposium 2017&lt;/a&gt; (Organized by Telecommunication Standardization Bureau (TSB) of the International Telecommunication Union (ITU), jointly with  the Bill &amp;amp; Melinda Gates Foundation, the World Bank and the Committee on Payments and Market Infrastructure (CPMI) and support of the Government of India; November 29 - December 1, 2017; Bangalore). Elonnai Hickok participated in the symposium and spoke in the "Security, Infrastructure, and Trust" working group on big data and privacy in DFS.&lt;/li&gt;
&lt;/ul&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Article &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-december-6-2017-shyam-ponappa-the-tragedy-of-the-unused-commons"&gt;The tragedy of the unused commons&lt;/a&gt; (Shyam Ponappa; Business Standard; December 6, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----------------------------------&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;br /&gt;&lt;/a&gt;&lt;span&gt;----------------------------------- &lt;/span&gt;&lt;/p&gt;
&lt;div class="keyResearch"&gt;
&lt;div id="parent-fieldname-text-8a5942eb6f4249c5b6113fdd372e636c"&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-below-content-body"&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2017-newsletter'&gt;https://cis-india.org/about/newsletters/december-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-03-17T11:12:26Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2016-newsletter">
    <title>December 2016 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/december-2016-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the December 2016 newsletter of the Centre for Internet and Society (CIS). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dear readers,&lt;/p&gt;
&lt;p&gt;Wishing you a happy and prosperous New Year. As the New Year unfolds we are glad to bring you developments from the last month of the year gone by for your reference. Thank you for reading the Centre for Internet and Society's (CIS) December 2016 newsletter.&lt;/p&gt;
&lt;p&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Telugu Theatre scholar Pranay Raj Vangari &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/pranay-raj-record-in-100-days-100-articles"&gt;created a record by completing a challenge&lt;/a&gt; that is famous worldwide in Wikimedia community - "100 Days-100 Articles". &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rohini Lakshané attended the 25th session of the World Intellectual Property Organization Standing Committee on the Law of Patents held in Geneva from December 12 - 15, 2016 and made a statement on &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/25th-session-of-the-wipo-scp-statement-on-future-work"&gt;Future Work&lt;/a&gt;. She also submitted a statement on the &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/twenty-fifth-session-of-wipo-scp-statement-on-assessment-of-inventive-step"&gt;Assessment of Inventive Step&lt;/a&gt; to Secretariat for the WIPO Standing Committee for the Law of Patents, Twenty Fifth Session.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/cis-inputs-to-the-working-group-on-enhanced-cooperation-on-public-policy-issues-pertaining-to-the-internet-wgec"&gt;submitted inputs to the Working Group on Enhanced Cooperation on Public Policy Issues Pertaining to the Internet&lt;/a&gt; (WGEC) on 15 December 2016. The WGEC sought inputs on two questions that will guide the next meeting of the Working Group which is scheduled to take place on the 26-27 January 2017. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Udbhav Tiwari &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse"&gt;wrote an article on the technical, legal and jurisdictional issues around the recent Twitter and email hacks&lt;/a&gt; claimed by the ‘Legion Crew’, and what can targeted entities do to better protect themselves. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Amber Sinha &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy"&gt;wrote a blog entry&lt;/a&gt; that focuses on network management, in general, and deep packet inspection, in particular and how it impacts the privacy of users. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS is &lt;a class="external-link" href="http://cis-india.org/papers/mapping-digital-humanities-in-india"&gt;pleased to bring you the second title of the CIS Papers series&lt;/a&gt;. This report by P.P. Sneha comes out of an extended research project supported by the Kusuma Trust. The study undertook a detailed mapping of digital practices in arts and humanities scholarship, both emerging and established, in India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Zeenab Aneez &lt;a class="external-link" href="http://cis-india.org/raw/indian-newspapers-digital-transition"&gt;wrote a report that examines the digital transition underway at three leading newspapers in India&lt;/a&gt;, the Dainik Jagran in Hindi, English-language Hindustan Times, and Malayala Manorama in Malayalam. Our focus is on how they are changing their newsroom organisation and journalistic work to expand their digital presence and adapt to a changing media environment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="http://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi"&gt;made a submission on the ​Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks&lt;/a&gt; published by the TRAI on November 15, 2016. Our analysis of the solution proposed in the Note, in brief, is that there is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;CIS in the news:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome"&gt;Lack of clarity about cashless and online transactions makes digital payments more worrisome &lt;/a&gt;(Neha Alawadhi; Economic Times; December 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/story-weaver-december-1-2016-pooja-saxena-changing-the-typographic-landscape-of-a-country"&gt;Changing the typographic landscape of a country: one letter at a time&lt;/a&gt; (Pooja Saxena; Storyweaver; December 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-december-2-2016-alnoor-peermohammed-no-laws-in-india-to-protect-customers-if-they-lose-money-during-digital-transactions"&gt;No laws in India to protect customers if they lose money during digital transactions &lt;/a&gt;(Alnoor Peermohamed; Business Standard; December 2, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves"&gt;Fake Narendra Modi apps aplenty, but it’s up to users to protect themselves&lt;/a&gt; (Indian Express; December 2, 2016). Also see Nandini Yadav's blog post in &lt;a class="external-link" href="http://www.bgr.in/news/beware-of-the-fake-narendra-modi-app-on-google-play-store/"&gt;BGR&lt;/a&gt; on December 3, 2016.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket"&gt;Your digital wallet can be a ‘pickpocket’&lt;/a&gt; (The Hindu; December 5, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/et-telecom-december-7-2016-most-popular-smartphone-apps-inaccessible-to-disabled-study"&gt;Most popular smartphone apps inaccessible to disabled: Study&lt;/a&gt; (ET Telecom; December 7, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/new-indian-express-december-7-2016-regina-gurung-english-gottila-job-illa"&gt;English gottila,job illa&lt;/a&gt; (Regina Gurung; Indian Express; December 7, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/statesman-december-7-2016-smriti-sharma-vasudeva-bumpy-road-ahead-for-rfid-tags-in-vehicles"&gt;Bumpy road ahead for RFID Tags in vehicles&lt;/a&gt; (Smriti Sharma Vasudeva; Statesman; December 7, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/indias-tech-policy-entrepreneurs"&gt;India's Tech Policy Entrepreneurs&lt;/a&gt; (Rohin Dharmakumar; The Ken; December 8, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/business-standard-alnoor-peermohamed-december-10-2016-vijay-mallya-cries-foul-after-his-twitter-and-email-accounts-are-hacked"&gt;Vijay Mallya cries foul after his Twitter and email accounts are hacked&lt;/a&gt; (Alnoor Peermohamed; Business Standard; December 10, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/namaste-telangana-december-11-2016-article-on-wikipedia"&gt;విజ్ఞాన నిధి వికీపీడియా.. &lt;/a&gt;(Namaste Telangana; December 11, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/andhra-bhoomi-december-11-2016-article-on-wikipedia"&gt;వికీపీడియాతో విజ్ఞాన విప్లవం&lt;/a&gt; (Andhra Bhoomi; December 11, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/namaste-telangana-december-11-2016-wikipedia-is-a-newspaper"&gt;Wikipedia is a Newspaper&lt;/a&gt; (Namaste Telangana; December 11, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/andhra-jyoti-december-12-2016-telugu-wikipedians-are-creating-knowledge-revolution"&gt;Wikipedian Pavan Santhosh says Telugu Wikipedians are creating Knowledge revolution&lt;/a&gt; (in Telugu) (Andhra Jyoti; December 12, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/vijaya-karnataka-december-18-2016-wikipedia-event-in-mangalore"&gt;Wikipedia Event in Mangalore&lt;/a&gt; (Vijaya Karnataka; December 18, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/scroll-in-vinita-govindarajan-shrutisagar-yamunan-with-power-phone-and-internet-services-affected-chennai-is-still-recovering-from-cyclone-vardah"&gt;With power, phone and internet services affected, Chennai is still recovering from Cyclone Vardah&lt;/a&gt; (Vinita Govindarajan and Sruthisagar Yamunan; Scroll.in; December 20, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/hindustan-november-12-2016-article-1-opencon-conference-held-at-ru"&gt;पीजी जूलॉजी विभाग में एक दिवसीय समागम का आयोजन&lt;/a&gt; (Hindustan, December 20, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch"&gt;How private companies are using Aadhaar to try to deliver better services (but there's a catch)&lt;/a&gt; (M. Rajshekhar; Scroll.in; December 22, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/new-indian-express-december-27-2016-christin-philip-mathew-it-hub-karnataka-ranks-12-in-e-deals"&gt;‘IT hub’ K’taka ranks No 12 in e-deals&lt;/a&gt; (Christin Philip Mathew; New Indian Express; December 27, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-national-december-31-2016-samanth-subramanian-indias-ruling-party-takes-online-abuse-to-a-professional-level"&gt;India’s ruling party takes online abuse to a professional level&lt;/a&gt; (Samanth Subramanian; December 31, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;CIS members published the following articles:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-december-4-2016-nishant-shah-digital-native-the-view-from-my-bubble"&gt;Digital native: The View from My Bubble&lt;/a&gt; (Nishant Shah; Indian Express; December 4, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-newspapers-digital-transition"&gt;Indian Newspapers' Digital Transition&lt;/a&gt; (Zeenab Azeez; Reuters Institute for the Study of Journalism; December 9, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/giswatch-december-9-2016-sunil-abraham-and-vidushi-marda-digital-protection-of-traditional-knowledge-questions-raised-by-traditional-knowledge-digital-library-in-india"&gt;The Digital Protection of Traditional Knowledge: Questions Raised by the Traditional Knowledge Digital Library in India &lt;/a&gt;(Sunil Abraham and Vidushi Marda; GIS Watch; December 9, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse"&gt;The Curious Case of Poor Security in the Indian Twitterverse &lt;/a&gt;(Udbhav Tiwari; The Wire; December 17, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/pranay-raj-record-in-100-days-100-articles"&gt;Pranay Raj record in 100 days-100 articles&lt;/a&gt; (Pavan Santhosh; Andhra Jyoti; December 17, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-december-18-2016-digital-native-people-like-us"&gt;Digital Native: People Like Us&lt;/a&gt; (Nishant Shah; Indian Express; December 18, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/100-days-100-articles-wikipedian-from-motkur-created-record-in-telugu-wikipedia"&gt;వంద రోజులు.. వంద వ్యాసాలు - తెలుగు వికీపీడియాలో మోత్కూరు యువకుని రికార్డు &lt;/a&gt;(100 Days...100 Articles: Wikipedian from Motkur created record in Telugu Wikipedia) (Pavan Santhosh; Andhra Jyoti; December 18, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;CIS is seeking applications for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/jobs/policy-officer-cyber-security"&gt;Policy Officer (Cyber Security)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/jobs/senior-policy-officer-cyber-security"&gt;Senior Policy Officer (Cyber Security)&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't     have access to read printed materials due to some form of physical,     sensory, 	cognitive or other disability. As part of our endeavour to     make available accessible content for persons with disabilities, we are     developing a text-to-speech software in 15 languages with support  from    the Hans Foundation. The progress made so far in the project can  be    accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/events/international-accessibility-summit-shaastra-2017"&gt;International Accessibility Summit of Shaastra 2017&lt;/a&gt; (Organized by CIS and IIT, Madaras; December 31 - January 3, 2017). Nirmita Narasimhan was a panel moderator.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/best-practices-in-digital-accessibility"&gt;Best Practices in Digital Accessibility&lt;/a&gt; (Organized by IIM, Bangalore; December 19, 2016). Nirmita Narasimhan was a panelist. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt;Our     Access to Knowledge programme currently consists of two projects.  The    Pervasive Technologies project, conducted under a grant from the     International Development Research Centre (IDRC), aims to conduct     research on the complex interplay between low-cost pervasive     technologies and intellectual property, in order to encourage the     proliferation and development of such technologies as a social good. The     Wikipedia project, which is under a 	grant from the Wikimedia     Foundation, is for the growth of Indic language communities and projects     by designing community collaborations and partnerships 	that recruit     and cultivate new editors and explore innovative approaches to   building   projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Copyright and Patent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Statements&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/twenty-fifth-session-of-wipo-scp-statement-on-assessment-of-inventive-step"&gt;25th Session of the WIPO SCP: Statement on Assessment of Inventive Step &lt;/a&gt;(Rohini Lakshané; December 15, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/25th-session-of-the-wipo-scp-statement-on-future-work"&gt;25th Session of the WIPO SCP: Statement on Future work&lt;/a&gt; (Rohini Lakshané; December 16, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/7th-emerging-markets-finance-conference"&gt;7th Emerging Markets Finance Conference&lt;/a&gt; (Organized by Finance Research Group in association with Vanderbilt Law School; Mumbai; December 15, 2016). Anubha Sinha was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by     organizing more than 100 outreach events and catalysed the release of     encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0)     license in four Indian languages (21 books in Telugu, 13 in Odia, 4     volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1  book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/freedominfeb"&gt;Freedom in Feb — an awareness increasing campaign&lt;/a&gt; (Tito Dutta; December 8, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/a-shortcut-to-freedom"&gt;A Shortcut to Freedom&lt;/a&gt; (Tito Dutta; December 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-in-kolhapur"&gt;Marathi Wikipedia Edit-a-thon in Kolhapur&lt;/a&gt; (Subodh Kulkarni; December 16, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/ongoing-proof-reading-effort-by-alc-student-wikimedians-in-telugu-wikisource"&gt;Ongoing Proof-reading Effort by ALC Student Wikimedians in Telugu Wikisource&lt;/a&gt; (Pavan Santosh and Ting-Yi Chang; December 30, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our   work in the Openness programme   focuses on open data, especially open   government data, open access,  open  education resources, open knowledge   in Indic languages, open  media, and  open technologies and standards -   hardware and software. We  approach  openness as a cross-cutting   principle for knowledge  production and  distribution, and not as a   thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-on-draft-national-policy-on-software-products"&gt;Comments on the Draft National Policy on Software Products &lt;/a&gt;(Anubha Sinha, Rohini Lakshané, and Udbhav Tiwari; December 11, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;b&gt; -----------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As   part of its research on privacy and   free speech, CIS is engaged with   two different projects. The first  one  (under a grant from Privacy   International and IDRC) is on  surveillance  and freedom of expression   (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)   is on restrictions that the  Indian government  has placed on freedom  of  expression online.&lt;/p&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/privacy-and-security-implications-of-public-wi-fi-a-case-study"&gt;Privacy and Security Implications of Public Wi-Fi - A Case Study&lt;/a&gt; (Vanya Rakesh; December 9, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/habeas-data-in-india"&gt;Habeas Data in India&lt;/a&gt; (Vipul Kharbanda and edited by Elonnai Hickok; December 10, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016"&gt;Workshop Report - UIDAI and Welfare Services: Exclusion and Countermeasures&lt;/a&gt; (Vanya Rakesh; December 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/enlarging-the-small-print"&gt;Enlarging the Small Print: A Study on Designing Effective Privacy Notices for Mobile Applications&lt;/a&gt; (Meera Manoj; December 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps"&gt;Protection of Privacy in Mobile Phone Apps&lt;/a&gt; (Hitabhilash Mohanty and Edited by Leilah Elmokadem; December 15, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/iso-iec-jtc-1-sc-27-working-group-meetings-a-summary"&gt;ISO/IEC JTC 1 SC 27 Working Group Meetings - A Summary&lt;/a&gt; (Vanya Rakesh; December 16, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy"&gt;Deep Packet Inspection: How it Works and its Impact on Privacy &lt;/a&gt;(Amber Sinha; December 16, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/industry-consultation-panel-on-data-retention-dsci"&gt;Industry Consultation Panel on Data Retention - DSCI&lt;/a&gt; (Organized by Data Security Council of India; New Delhi; November 23, 2016). &lt;i&gt;This was mirrored on the website on December 6, 2016&lt;/i&gt;. Udbhav Tiwari was a panelist.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/dsci-nasscom-annual-information-security-summit-2016"&gt;11th DSCI-NASSCOM Annual Information Security Summit 2016&lt;/a&gt; (Organized by DSCI and NASSCOM; December 14, 2016). Udbhav Tiwari was a panelist.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/workshop-on-center-for-it-and-society"&gt;Workshop on Center for IT and Society&lt;/a&gt; (Organized by IIT, Delhi; December 20, 2016). Amber Sinha attended the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;►Free Speech &amp;amp; Expression&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/isis-and-recruitment-using-social-media-2013-roundtable-report"&gt;ISIS and Recruitment using Social Media – Roundtable Report&lt;/a&gt; (Vidushi Marda, Aditya Tejus, Megha Nambiar and Japreet Grewal; December 15, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/cis-inputs-to-the-working-group-on-enhanced-cooperation-on-public-policy-issues-pertaining-to-the-internet-wgec"&gt;Inputs to the Working Group on Enhanced Cooperation on Public Policy Issues Pertaining to the Internet (WGEC)&lt;/a&gt; (Sunil Abraham and Vidushi Marda, with inputs from Pranesh Prakash; December 17, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/myanmar-digital-rights-forum"&gt;Myanmar Digital Rights Forum&lt;/a&gt; (Organized by Phandeeyar, You Can Do IT, Engage Media and Myanmar Centre for Responsible Business with support from the Embassy of Sweden; December 14 - 15, 2016). Sunil Abraham was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;►Big Data&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore"&gt;"Decoding the Digital" &lt;/a&gt;(Organized by Centre for IT and Public Policy at IIIT; Bangalore; December 12 - 14, 2016). Vanya Rakesh attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/european-studies-guest-lecture/view"&gt;The EU and Free Flows of Data - Data Protection, Trade and Law Enforcement&lt;/a&gt; (Organized by the Department of European Studies; Bangalore; December 14, 2016). Ameila Andersdotter gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/technology-behind-big-data"&gt;The Technology behind Big Data&lt;/a&gt; (Geethanjali Jujjavarapu and Udbhav Tiwari; December 1, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;►Cyber Security&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/major-security-flaw-namo-app"&gt;Developer team fixed vulnerabilities in Honorable PM's app and API&lt;/a&gt; (Bhavyanshu Parasher; December 4, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law"&gt;Incident Response Requirements in Indian Law&lt;/a&gt; (Vipul Kharbanda; December 28, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016"&gt;Mapping of India’s Cyber Security-Related Bilateral Agreements&lt;/a&gt; (Leilah Elmokadem and Saumyaa Naidu; December 29, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/india-mlat-agreements-sections-map-dec-2016"&gt;Mapping of Sections in India’s MLAT Agreements&lt;/a&gt; (Leilah Elmokadem and Saumyaa Naidu; December 31, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption"&gt;Multistakeholder Consultation on Encryption&lt;/a&gt; (Organized by CIS with ORF and Takshashila Institution; TERI, Bangalore; December 17, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;----------------------------------- 	&lt;br /&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt; ----------------------------------- &lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/b&gt;CIS  is involved in promoting access and accessibility to    telecommunications services and resources, and has provided inputs to    ongoing policy discussions 	and consultation papers published by TRAI.    It has prepared reports on unlicensed spectrum and accessibility of    mobile phones for persons with disabilities 	and also works with the    USOF to include funding projects for persons with disabilities in its    mandate:&lt;/p&gt;
&lt;p&gt;Submission&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi"&gt;CIS Submission to TRAI Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks&lt;/a&gt; (Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter; December 12, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary     research initiative driven by an emerging need to understand the     reconfigurations of 	social practices and structures through the     Internet and digital media technologies, and vice versa. It aims to     produce local and contextual 	accounts of interactions, negotiations,     and resolutions between the Internet, and socio-material and     geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/papers/mapping-digital-humanities-in-india"&gt;Mapping Digital Humanities in India&lt;/a&gt; (P.P. Sneha; December 30, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation     that undertakes interdisciplinary research on internet and digital     technologies from 	policy and academic perspectives. The areas of focus     include digital accessibility for persons with disabilities,  access    to knowledge, intellectual 	property rights, openness (including   open   data, free and open source software, open standards, open access,   open   educational resources, and open video), 	internet governance,     telecommunication reform, digital privacy, and cyber-security. The     academic research at CIS seeks to understand the reconfigurations 	of     social and cultural processes and structures as mediated through the     internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="text-align: justify; "&gt;Please   help us defend consumer and   citizen rights on the Internet! Write a   cheque in favour of 'The Centre   for Internet and Society' and mail it   to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru -  5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;We   invite researchers, practitioners,   artists, and theoreticians, both   organisationally and as individuals,  to  engage with us on topics   related internet 	and society, and improve  our  collective  understanding  of this field. To discuss such  possibilities,  please  write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org  (for policy  research), or Sumandro Chattapadhyay,   Research Director,  at  sumandro@cis-india.org (for academic research),   with an 	 indication of  the form and the content of the collaboration  you  might  be interested  in. To discuss collaborations on Indic  language   Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS   is grateful to its primary   donor the Kusuma Trust founded by Anurag   Dikshit and Soma Pujari,   philanthropists of Indian origin for its  core  funding and 	support for   most of its projects. CIS is also  grateful to  its other donors,   Wikimedia Foundation, Ford Foundation,  Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation,  and IDRC for  funding its various   projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2016-newsletter'&gt;https://cis-india.org/about/newsletters/december-2016-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2017-01-28T12:02:23Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2015-bulletin">
    <title>December 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2015-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of December 2015 is below.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) is happy to share the twelfth issue of CIS newsletter (December 2015). Previous editions of the newsletter can 	be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;Highlights&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/press-release-india-to-host-4th-global-congress-on-intellectual-property-and-the-public-interest"&gt;4th edition of the Global Congress&lt;/a&gt; themed around "Three Decades of Openness, Two Decades of TRIPS" was 	 organized in New Delhi from December 15 - 17, 2015. The largest ever in  Asia, the Congress was jointly organised by CIS, NLU-D, Open A.I.R.,  CREATe, 	Columbia University and American University.&lt;/li&gt;
&lt;li&gt;Nehaa Chaudhari &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/4th-global-congress-on-ip-and-the-public-interest-statement-of-conclusion-for-the-ip-and-development-track"&gt;summarized the developments of the 4th Global Congress on IP and the Public Interest in a blog post&lt;/a&gt; that was originally published on the Global Congress blog.&lt;/li&gt;
&lt;li&gt;Sunil Abraham wrote a blog entry stating the	&lt;a href="http://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"&gt;institutional position of CIS on the Net Neutrality&lt;/a&gt; discussion 	going on in India.&lt;/li&gt;
&lt;li&gt;Catch News interviewed Sunil Abraham about the recent advertisement by Facebook titled 	&lt;a href="http://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them"&gt; "What Net Neutrality Activists won't Tell You or, the Top 10 Facts about Free Basics" &lt;/a&gt; . Sunil argued against the validity of all the 'top 10 facts'.&lt;/li&gt;
&lt;li&gt;Odia author and cultural historian Jagannath Prasad Das 	&lt;a href="http://cis-india.org/a2k/blogs/discover-bhubaneswar-30-books-of-odia-author-and-historian-jagannath-prasad-das-to-come-online-on-odia-wikisource"&gt; has recently permitted 30 volumes of his notable works to be re-license  under an open license (Creative Commons Share-Alike 4.0 or CC-BY-SA  4.0) &lt;/a&gt; . Subhashish Panigrahi wrote a blog post on this in Discover Bhubaneswar, a web portal in Odisha.&lt;/li&gt;
&lt;li&gt;CIS has established institutional partnerships with University of  Mysore and Guru G Learning Labs for furthering Wikipedia growth. Tanveer  Hasan &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/analysis-of-institutional-partnerships-university-of-mysore-and-guru-g-learning-lab"&gt;analyses the developments and lists out the possible future plans&lt;/a&gt; in this regard.&lt;/li&gt;
&lt;li&gt;CIS along with Observer Research Foundation, Centre for Global  Communication Studies, Annenberg School for Communication, University of  	Pennsylvania, and Internet Policy Observatory 	&lt;a href="http://cis-india.org/internet-governance/events/net-neutrality-across-south-asia"&gt; organized an event in New Delhi on Net Neutrality across South Asia &lt;/a&gt; .&lt;/li&gt;
&lt;li&gt;Today the quantity of data being generated is expanding at an  exponential rate. From smartphones and televisions, trains and  airplanes, sensor-equipped buildings and even the infrastructures of our  cities, data now streams constantly from almost every sector and  function of daily life, &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data"&gt;stated Scott Mason in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The Government of India is in the process of developing 100 smart  cities in India which it sees as the key to the country's economic and  social growth. Vanya Rakesh &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview"&gt;gave an overview of the Smart Cities project currently underway in India in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For the second part of the Smart City podcast series, Sruthi  Krishnan and Harsha K from Fields of View spoke with Sumandro  Chattapadhyay on data, people, and smart cities.	&lt;a href="http://cis-india.org/raw/fov-podcast-data-people-and-smart-cities"&gt;Fields of View has produced and shared the recording&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;An extended survey of digital initiatives in arts and humanities  practices in India was undertaken last year. The 'mapping digital  humanities in 	India' enquiry began with the term 'digital humanities'  itself, as a 'found' name for which one needs to excavate some meaning,  context, and location in India at the present moment. P.P Sneha  published the &lt;a href="http://cis-india.org/raw/reading-from-a-distance-data-as-text"&gt;third&lt;/a&gt;,&lt;a href="http://cis-india.org/raw/the-infrastructure-turn-in-the-humanities"&gt;fourth&lt;/a&gt;, and	&lt;a href="http://cis-india.org/raw/living-in-the-archival-moment"&gt;fifth&lt;/a&gt; sections of the study this month.&lt;/li&gt;
&lt;li&gt;The RAW programme has initiated a new annual conference series titled Internet Researchers' Conference (IRC). The	&lt;a href="http://cis-india.org/raw/irc16-call"&gt;first edition of the Conference&lt;/a&gt;, organised around the theme of "studying internet in India" will be held 	in Delhi in February 2016&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;br /&gt;&lt;/a&gt;----------------------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing a project on developing text-to-speech software for 15 Indian languages. The progress made so far in 	the project can be accessed &lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Updates&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/december-2015-report"&gt;December 2015 Report&lt;/a&gt; (Suman Dogra; December 31, 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;-----------------------------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;br /&gt;&lt;/a&gt;-----------------------------------------------------------&lt;/b&gt;&lt;br /&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Copyright and Patent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/abuse-of-dominant-position-in-indian-competition-law-a-brief-guide"&gt;Abuse of Dominant Position in Indian Competition Law: A Brief Guide &lt;/a&gt; (Sarthak Sood; December 9, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/gcip2015-notes-from-the-inaugural-session"&gt;GCIP2015: Notes from the Inaugural Session&lt;/a&gt; (Spadika Jayaraj; 	SpicyIP; December 14, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/gcip-day-1-session-3-challenges-in-re-articulating-public-interest"&gt;GCIP Day 1 Session 3: Challenges in Re-Articulating Public Interest &lt;/a&gt; (Spadika Jayaraj; SpicyIP; December 17, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/gcip-15-day-2-discussions-on-health-technology-innovation-and-access"&gt;GCIP 15 Day 2: Discussions on Health Technology, Innovation and Access &lt;/a&gt; (Spadika Jayaraj; SpicyIP; December 17, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions-in-abeyance"&gt;Guidelines for Examination of Computer Related Inventions in abeyance &lt;/a&gt; (Anubha Sinha; Anubha Sinha; December 21, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/4th-global-congress-on-ip-and-the-public-interest-statement-of-conclusion-for-the-ip-and-development-track"&gt;4th Global Congress on IP and the Public Interest: Statement of Conclusion for the IP and Development track &lt;/a&gt; (Nehaa Chaudhari; December 25, 2015). &lt;i&gt;This was also published on the Global Congress Blog&lt;/i&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k/blogs/call-for-participation-global-congress-on-intellectual-property-and-the-public-interest"&gt;Global Congress on Intellectual Property and the Public Interest &lt;/a&gt; (Organized by National Law University, Delhi, American Assembly, Columbia University, Open A.I.R., American University, and CIS; New Delhi, December 15 - 	17, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Participation in Event&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/code-session"&gt;CODE Session&lt;/a&gt; (Organized by IDRC; December 17, 2015; New Delhi). Nehaa Chaudhari and Anubha Sinha participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k/news/nlsiu-conference-on-access-to-copyrighted-works-for-persons-with-disability-an-enriching-experience"&gt;NLSIU Conference on Access to Copyrighted Works for Persons with Disability: An enriching experience &lt;/a&gt; (Abolee Vaidya and Nuhar Bansal; SINAPSE; December 14, 2015). 	&lt;i&gt; This is an event report on a one-day national conference on the 'Access to Copyrighted Works for Persons with Disability' for which Pranesh Prakash was 		a speaker &lt;/i&gt; .&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/discover-bhubaneswar-30-books-of-odia-author-and-historian-jagannath-prasad-das-to-come-online-on-odia-wikisource"&gt;30 Books of Odia Author and Historian Jagannath Prasad Das to Come Online on Odia Wikisource &lt;/a&gt; (Subhashish Panigrahi; Discover Bhubaneswar; December 4, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/sambada-rabibara-subhashish-panigrahi-december-6-2015-odia-wikisource"&gt;ଓଡ଼ିଆ&lt;/a&gt; &lt;a href="http://cis-india.org/a2k/blogs/sambada-rabibara-subhashish-panigrahi-december-6-2015-odia-wikisource"&gt; &lt;/a&gt; &lt;a href="http://cis-india.org/a2k/blogs/sambada-rabibara-subhashish-panigrahi-december-6-2015-odia-wikisource"&gt; ଉଇକିପାଠାଗାର &lt;/a&gt; (Subhashish Panigrahi; Sambad; December 6, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/wikimedia-blog-subhashish-panigrahi-december-3-open-access-in-marathi-language-expands-by-thousand-books"&gt;Open access in the Marathi language expands by a thousand books &lt;/a&gt; (Subhashish Panigrahi and Abhinav Garule; December 3, 2015). &lt;i&gt;This was published on Wikimedia Blog&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/guru-g-learning-labs-and-cis-a2k-institutional-partnership"&gt;Guru-G Learning Labs and CIS A2K Institutional Partnership &lt;/a&gt; (Tanveer Hasan; December 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/community-prioritisation-content-donation-kannada-wikisource"&gt;Community Prioritisation of Content Donation: Kannada Wikisource &lt;/a&gt; (Tanveer Hasan; December 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/analysis-of-institutional-partnerships-university-of-mysore-and-guru-g-learning-lab"&gt;Analysis of Institutional Partnerships: University of Mysore and Guru G Learning Labs &lt;/a&gt; (Tanveer Hasan; December 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/department-of-tourism-studies-christ-university-st-aloysius-college"&gt;Touch Point Report: Department of Tourism Studies, Christ University and St. Aloysius College, Mangalore &lt;/a&gt; (Tanveer Hasan; December 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/ttt-2015"&gt;TTT 2015&lt;/a&gt; (Tanveer Hasan; December 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/kannada-wikipedia-editathon-at-mangaluru"&gt;Kannada Wikipedia Editathon at Mangaluru&lt;/a&gt; (Dr. U.B. Pavanaja; 	December 29, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/openness/discussion-on-bringing-peshwa-culture-on-marathi-wikipedia"&gt;Talk on bringing 1000 books about the culture of Maharashtra on Marathi Wikipedia &lt;/a&gt; (The Energy and Resources Institute; Bangalore; December 1, 2015). Avinash Chaphekar, Joint Secretary, Maharashtra Granthottejak Sanstha gave a talk.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/odia-wikimedia-community-meetup-at-cuttack"&gt;Odia Wikimedia community meetup&lt;/a&gt; (Organized by Odia Wikipedia 	Community and CIS; Cuttack; December 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/events/sau-dhuni-teen-project-december-edit-a-thon-at-womens-studies-centre-university-of-pune"&gt;Sau Dhuni Teen Project: December Edit-a-thon &lt;/a&gt; (Women's Studies Centre, University of Pune; December 3, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k/news/telugu-wikipedia-day-2015-photo-walk"&gt;Telugu Wikipedia Day 2015, Photo Walk&lt;/a&gt; (Organized by Telugu 	Wikipedians; Dr. YSR State Archaeological Museum, Hyderabad; December 13, 2015). Pavan Santhosh attended the event. One of the popular Telugu news channel TV9 covered the event and telecasted the same.	&lt;a href="http://cis-india.org/a2k/news/telugu-wikipedia-day-2015-eenadu-coverage"&gt;Eenadu published a special item on photo walk&lt;/a&gt; on December 13, 2015.&lt;/li&gt;
&lt;li&gt;English Wikipedia and the Telugu Wikipedia joint meetup and edit-a-thon (Organized by Wikipedia community; Golden Threshold, Hyderabad; December 20, 2015). The event was covered in&lt;a href="http://cis-india.org/a2k/news/english-wikipedia-and-the-telugu-wikipedia-joint-meetup-and-edit-a-thon-sakshi"&gt;Sakshi&lt;/a&gt; and	&lt;a href="http://cis-india.org/a2k/news/english-wikipedia-and-the-telugu-wikipedia-joint-meetup-and-edit-a-thon-andhra-jyoti"&gt;Andhra Jyoti&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/post-more-articles-on-kannada-wikipedia"&gt;Post More Articles on Kannada Wikipedia&lt;/a&gt; (Indian Express; 	Mangaluru edition; December 12, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A Kannada Wikipedia Editathon was conducted in Mangalore on December 10, 2015. The following are the media coverage for the same:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-udayavani-coverage"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Udayavani; December 7, 	2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-vijayavani"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Vijayavani; December 11, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-vijaya-karnataka"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Vijaya Karnataka; December 	11, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-in-mangalore-udayavani"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Udayavani; December 11, 	2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-prajavani-mangal"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Prajavani; December 10, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/kannada-wikipedia-editathon-in-prajavani"&gt;Kannada Wikipedia Editathon&lt;/a&gt; (Prajavani; December 13, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;-----------------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;br /&gt;&lt;/a&gt;-----------------------------------------------&lt;/b&gt;&lt;br /&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and 	International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur 	Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Free Speech and Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them"&gt;Facebook shares 10 key facts about Free Basics. Here's what's wrong with all 10 of them &lt;/a&gt; (Shweta Sengar; Catch News; December 24, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"&gt;CIS's Position on Net Neutrality&lt;/a&gt; (Sunil Abraham; 	December 4, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance/events/net-neutrality-across-south-asia"&gt;Net Neutrality across South Asia&lt;/a&gt; (Organized by 	Observer Research Foundation, Centre for Global Communication Studies, Annenberg School for Communication, University of Pennsylvania, Internet Policy 	Observatory and CIS; New Delhi; December 12, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline"&gt;Consultation on "Understanding the Freedom of Expression Online and Offline" &lt;/a&gt; (Organized by Digital Empowerment Foundation and Association for Progressive Communications; YMCA, New Delhi; December 10, 2015). Jyoti Panday was a 	speaker at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Big Data&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data"&gt;Benefits and Harms of "Big Data"&lt;/a&gt; (Scott Mason; December 	30, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Cyber Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/ground-zero-summit"&gt;Ground Zero Summit&lt;/a&gt; (Amber Sinha; December 22, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/telecom/news/second-regional-conference-on-connectivity-for-all-future-technologies-markets-and-regulation"&gt;Second Regional Conference on Connectivity for All: Future Technologies, Markets and Regulation &lt;/a&gt; (Organized by International Telecommunications Society, IIMA IDEA Telecom Centre of Excellence and Indian Institute of Management, Ahmedabad; New Delhi; 	December 13 - 15, 2015). Sunil Abraham was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/events/bangalore-chapter-meet-dsci"&gt;Bangalore Chapter Meet - DSCI&lt;/a&gt; (CIS, Bangalore; December 	1, 2015). CIS hosted the Bangalore Chapter Meet of DSCI. Pronab Mohanty, Inspector General of Police gave a talk on Cybercrimes. Sunil Abraham presented 	the outcome of his study "Anonymity in Cyberspace".&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/uid-research"&gt;UID Research&lt;/a&gt; (Vanya Rakesh; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/dna-research"&gt;DNA Research&lt;/a&gt; (Vanya Rakesh; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/privacy-policy-research"&gt;Privacy Policy Research&lt;/a&gt; (Vanya Rakesh; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/sectoral-privacy-research"&gt;Sectoral Privacy Research&lt;/a&gt; (Vanya Rakesh; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/security-research"&gt;Security Research&lt;/a&gt; (Vanya Rakesh; December 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015"&gt;Eight Key Privacy Events in India in the Year 2015 &lt;/a&gt; (Amber Sinha; December 31, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project"&gt;Kick Off Meeting for the Politics of Data Project&lt;/a&gt; (Organized by Tactical Tech; Phnom Penh; December 7-8, 2015). Amber Sinha participated in the event.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion"&gt;Unbundling Issues of Privacy, Data Security, Identity Matrics, for Financial Inclusion &lt;/a&gt; (Organized by Indicus Foundation and MicroSave; December 10, 2015; Metropolitan Hotel and Spa, New Delhi). Sunil Abraham was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Miscellaneous&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview"&gt;Smart Cities in India: An Overview&lt;/a&gt; (Vanya Rakesh; 	December 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/elite-capture-of-governance-in-bangalore"&gt;Elite Capture of Governance&lt;/a&gt; (Organized by Forum for Urban Governance and Commons; December 16, 2015; Bangalore). Vanya Rakesh participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;--------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;/b&gt;&lt;br /&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/the-free-basics-debate-trai-has-a-point-in-imposing-temporary-ban-on-net-neutrality"&gt;The Free Basics debate: Trai has a point in imposing temporary ban on net neutrality &lt;/a&gt; (Sunil Abraham; FirstPost; December 24, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/millions-of-indians-slam-facebooks-2018free-basics2019-app"&gt;Millions of Indians Slam Facebook's 'Free Basics' App &lt;/a&gt; (Subhashish Panigrahi; December 29, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;--------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;/b&gt;&lt;br /&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/ai-hype-cycles-and-artistic-subversions"&gt;A.I. Hype Cycles and Artistic Subversions&lt;/a&gt; (CIS, Bangalore; January 	22, 2016). Gene Kogan will give a talk.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-call"&gt;First Edition of Internet Researchers' Conference&lt;/a&gt; (IRC) 2016 - Studying Internet in India: Call 	for Sessions (Organized by CIS; New Delhi; February 25 - 27, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/raw-lecture-01-nishant-shah-video"&gt;RAW Lecture #01: Nishant Shah on 'Stories and Histories of Internet in India' - Video &lt;/a&gt; (P.P. Sneha; December 1, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/fov-podcast-data-people-and-smart-cities"&gt;FOV Podcast - Data, People, and Smart Cities&lt;/a&gt; (Sumandro 	Chattapadhyay; December 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/reading-from-a-distance-data-as-text"&gt;Reading from a Distance - Data as Text&lt;/a&gt; (P.P. Sneha; December 7, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/the-infrastructure-turn-in-the-humanities"&gt;The Infrastructure Turn in the Humanities&lt;/a&gt; (P.P. Sneha; December 7, 	2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/living-in-the-archival-moment"&gt;Living in the Archival Moment&lt;/a&gt; (P.P. Sneha; December 14, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;---------------------------------&lt;a href="http://cis-india.org/news"&gt;&lt;br /&gt;News &amp;amp; Media Coverage&lt;br /&gt;&lt;/a&gt;---------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/india2019s-net-neutrality-debate-is-unique-and-complex"&gt;India's net neutrality debate is unique and complex &lt;/a&gt; (Pratap Vikram Singh; Governance Now; December 14, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics"&gt;Start-up India turns the heat on Facebook Free Basics &lt;/a&gt; (Anita Babu; Business Standard; December 22, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/a-scam-masquerading-as-santa"&gt;A Scam Masquerading as Santa&lt;/a&gt; (Apurva Venkat &amp;amp; Vandana 	Kamath; Bangalore Mirror; December 25, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/facebook-goes-out-all-guns-blazing-in-push-for-free-basics-net-neutrality-advocates-cry-foul"&gt;Facebook goes out all guns blazing in push for Free Basics, Net neutrality advocates cry foul &lt;/a&gt; (IBN Live; December 29, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-december-30-2015-foreign-media-on-zukerberg-india-backlash"&gt;Foreign Media on Zuckerberg's India Backlash &lt;/a&gt; (Bhuma Shrivastava; NDTV; December 30, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/mark-zuckerberg2019s-india-backlash-imperils-vision-for-free-global-web"&gt;Mark Zuckerberg's India backlash imperils vision for free global web &lt;/a&gt; (Bhuma Shrivastava; Livemint; December 30, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;---------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;br /&gt;&lt;/a&gt;---------------------------------&lt;/b&gt;&lt;br /&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from 	policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual 	property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), 	internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations 	of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Offices&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Bengaluru - No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru, 560071. 	&lt;a href="https://www.google.com/maps/place/Centre+for+Internet+and+Society/@12.9644512,77.6374907,19z/data=%214m6%211m3%213m2%211s0x3bae141bb474ca25:0xe88eda6c81771517%212sDomlur+Bus+Stop%213m1%211s0x0000000000000000:0x88cd9bce9a1aa4d8?hl=en"&gt; &lt;/a&gt; &lt;a href="https://www.google.com/maps/place/Centre+for+Internet+and+Society/@12.9644512,77.6374907,19z/data=%214m6%211m3%213m2%211s0x3bae141bb474ca25:0xe88eda6c81771517%212sDomlur+Bus+Stop%213m1%211s0x0000000000000000:0x88cd9bce9a1aa4d8?hl=en"&gt; Location on Google Map &lt;/a&gt; .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Delhi - First floor, B 1/8, Hauz Khas, near G Block market, after Crunch, New Delhi, 110016.&lt;a href="http://j.mp/cis-delhi"&gt; &lt;/a&gt; &lt;a href="http://j.mp/cis-delhi"&gt;Location on Google Map&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Follow Us&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge:&lt;a href="https://twitter.com/CISA2K"&gt; https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru, 560 071.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet 	and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at 	sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an 	indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, 	write to Tanveer Hasan, Programme Officer, at &lt;a href="mailto:tanveer@cis-india.org"&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and 	support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 	Foundation, MacArthur Foundation, and IDRC for funding its various projects.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2015-bulletin'&gt;https://cis-india.org/about/newsletters/december-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-01-13T14:07:01Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2014-bulletin">
    <title>December 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2014-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) wishes you a very happy new year and welcomes you to the twelfth issue of the newsletter (December 2014). &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS prepared a		&lt;a href="http://cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain"&gt;policy brief&lt;/a&gt; that 		identifies the problem areas with the current work flow being used to publish documents and proposes suitable modifications to make them easy to 		locate, authentic and accessible.&lt;/li&gt;
&lt;li&gt;NVDA team conducted two workshops. The first one was held at the Hyderabad Central University	&lt;a href="http://cis-india.org/accessibility/blog/telugu-e-speak-training-with-nvda-december-2014"&gt;for reading and writing in Telugu&lt;/a&gt;. The second one was held at the Blind Empowerment Foundation in Kolkata	&lt;a href="http://cis-india.org/accessibility/blog/bangla-e-speak-training-with-nvda-december-2014"&gt;for reading and writing in Bangla&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Nehaa Chaudhari participated in the 29&lt;sup&gt;th&lt;/sup&gt; WIPO-SCCR held in Geneva from December 8 to 12, 2014 and on behalf of CIS gave statements on 		&lt;a href="http://cis-india.org/a2k/blogs/wipo-sccr-29-cis-intervention-on-proposed-treaty-for-protection-of-broadcasting-organizations"&gt; the Proposed Treaty for the Protection of Broadcasting Organizations &lt;/a&gt; , 		&lt;a href="http://cis-india.org/a2k/blogs/cis-statement-on-limitations-and-exceptions-for-education-teaching-research-institutions-and-persons-with-disabilities"&gt; Limitations and Exceptions for Education, Teaching, Research Institutions and Persons with Disabilities &lt;/a&gt; , made a 		&lt;a href="http://cis-india.org/a2k/blogs/wipo-sccr-29-cis-second-brief-intervention-on-broadcast-treaty"&gt; brief pointed intervention on the Broadcast Treaty &lt;/a&gt; , and briefly interviewed Prof. Crews on his 		&lt;a href="http://cis-india.org/a2k/blogs/cis-intervention-questions-to-prof-kenneth-crews-on-limitations-and-exceptions-for-libraries-and-archives"&gt; Updated Study on Limitations and Exceptions for Libraries and Archives &lt;/a&gt; . &lt;/li&gt;
&lt;li&gt; Nehaa Chaudhari 		&lt;a href="https://cis-india.org/a2k/blogs/the-broadening-of-definitions-in-the-proposed-broadcast-treaty-compared-to-other-international-conventions"&gt; analyses the broadening of definitions/concepts in the Proposed Broadcast Treaty &lt;/a&gt; versus those in pre-existing international instruments.&lt;/li&gt;
&lt;li&gt;Maggie Huang, an intern at CIS as part of the Pervasive Technologies projects conducted interviews with fabless semiconductor industry professionals 	in Taiwan. The findings are highlighted in two separate blog entries. The first one 	&lt;a href="http://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-part-3"&gt; explores some of their views on the current intellectual property system &lt;/a&gt; and the second 	&lt;a href="http://cis-india.org/a2k/blogs/interviews-with-semiconductor-industry-part-4"&gt; explores the tension between market forces and governmental intervention in providing access to mobile technology &lt;/a&gt; .&lt;/li&gt;
&lt;li&gt;Tejaswini Niranjana, a distinguished fellow at CIS		&lt;a href="http://cis-india.org/openness/blog/the-hindu-december-6-2014-tejaswini-niranjana-beyond-the-language-tussle"&gt;wrote an op-ed in the Hindu&lt;/a&gt; telling readers to see the ongoing Sanskrit versus German controversy as a welcome opportunity to discuss the real and persistent problems of our 		education system. &lt;/li&gt;
&lt;li&gt; Vidushi Marda and Bhairav Acharya have co-authored a		&lt;a href="http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt;white pape&lt;/a&gt;r that seeks to identify aspects of 		privacy in Islamic Law and demonstrate that the notion of privacy was recognized and protected in traditional Islamic law. &lt;/li&gt;
&lt;li&gt; Ashna Ashesh and Bhairav Acharya have		&lt;a href="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law"&gt;produced a white paper&lt;/a&gt; seeks to locate privacy in Classical Hindu Law, and by doing so, displace the notion that privacy is an inherently 'Western' concept that is the 		product of a modernist legal system. &lt;/li&gt;
&lt;li&gt; Vipul Kharbanda authored a		&lt;a href="https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality"&gt;white paper&lt;/a&gt; establishing the 		relationship between privacy and confidentiality. &lt;/li&gt;
&lt;li&gt; Geetha Hariharan in a 		&lt;a href="http://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt; blog entry examines the constitutional validity of Section 69A &lt;/a&gt; and the Blocking Rules. &lt;/li&gt;
&lt;li&gt; Shyam Ponappa in an 		&lt;a href="http://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-december-4-2014-a-roadmap-for-digital-india"&gt; article published by the Business Standard &lt;/a&gt; writes that India's current policies for telecommunications don't serve our interests and tells readers what must change. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is being printed. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/december-2014-nvda-report.pdf"&gt;December 2014 Report&lt;/a&gt; (Suman Dogra; December 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/telugu-e-speak-training-with-nvda-december-2014"&gt;Telugu eSpeak Training with NVDA&lt;/a&gt; (Organized by NVDA team; Hyderabad Central University, Hyderabad; December 1-2, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/bangla-e-speak-training-with-nvda-december-2014"&gt;Bangla eSpeak training with NVDA&lt;/a&gt; (Organized by NVDA team; Blind Empowerment Foundation, Kolkata; December 19-20, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/events/training-in-e-speak-malayalam"&gt;Training in Use of eSpeak with Malayalam&lt;/a&gt; (Co-organized by CIS, DAISY Forum of India and Chakshumathi Assistive Technology Centre; Trivandrum; January 24 - 25, 2015, Trivandrum). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain"&gt; Availability and Accessibility of Government Information in Public Domain &lt;/a&gt; (Sunil Abraham, Nirmita Narasimhan, Beliappa, and Anandhi Viswanathan; December 9, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/news/first-meeting-of-high-level-committee-on-national-policy-on-universal-electronic-accessibility"&gt; First meeting of the high level committee on National Policy on Universal Electronic Accessibility &lt;/a&gt; (Organized by the Department of Electronics and Information Technology; December 30, 2014; New Delhi). Sunil Abraham participated in this meeting. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/news/e-gov-reach-december-15-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not"&gt;&lt;b&gt; &lt;/b&gt;When technology is able but the mindset is not &lt;/a&gt; (Governance Now; December 1-15 issue). Sunil Abraham and Nirmita Narasimhan gave their inputs. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the Pervasive Technologies project, Maggie Huang conducted interviews with fabless semiconductor industry professionals in Taiwan. The findings 	from the samples are highlighted in four part series. The third and fourth parts have been published:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-part-3"&gt;&lt;b&gt; &lt;/b&gt;[Open] Innovation and Expertise &amp;gt; Patent Protection &amp;amp; Trolls in a Broken Patent Regime &lt;/a&gt; (Maggie Huang; December 26, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/copyright-management-in-age-of-mobile-music"&gt; "Copyright Management in the Age of Mobile Music" - Living Methodology Document &lt;/a&gt; (Maggie Huang; December 26, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nehaa Chaudhari attended the 29&lt;sup&gt;th&lt;/sup&gt; WIPO-SCCR held in Geneva from December 8 to 12. The following are the outputs:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-29-cis-intervention-on-proposed-treaty-for-protection-of-broadcasting-organizations"&gt; 29th Session of the WIPO SCCR: CIS Intervention on the Proposed Treaty for the Protection of Broadcasting Organizations &lt;/a&gt; (Nehaa Chaudhari; December 9, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-29-cis-second-brief-intervention-on-broadcast-treaty"&gt; 29th Session of the WIPO SCCR: CIS- 2nd (brief) Intervention on the Broadcast Treaty &lt;/a&gt; (Nehaa Chaudhari; December 11, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/the-broadening-of-definitions-in-the-proposed-broadcast-treaty-compared-to-other-international-conventions"&gt; The Broadening of Definitions in the Proposed Broadcast Treaty Compared to Other International Conventions &lt;/a&gt; (Nehaa Chaudhari; December 11, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/cis-intervention-questions-to-prof-kenneth-crews-on-limitations-and-exceptions-for-libraries-and-archives"&gt; 29th Session of the WIPO SCCR: CIS Intervention: Questions to Prof. Kenneth Crews on his Updated Study on Limitations and Exceptions for Libraries 			and Archives &lt;/a&gt; (Nehaa Chaudhari; December 14, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/cis-statement-on-limitations-and-exceptions-for-education-teaching-research-institutions-and-persons-with-disabilities"&gt; 29th Session of the WIPO SCCR: Statement on the Limitations and Exceptions for Education, Teaching, Research Institutions and Persons with 			Disabilities &lt;/a&gt; (Nehaa Chaudhari; December 20, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/protection-of-broadcasting-organisations-under-proposed-broadcast-treaty"&gt; Protection of Broadcasting Organisations under the Proposed Treaty as Compared to Other International Conventions &lt;/a&gt; (Nehaa Chaudhari; December 21, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/a2k/news/kei-10-december-2014-the-broadcasting-treaty-a-solution-in-search-of-a-problem"&gt;&lt;b&gt; &lt;/b&gt;Save the Date - 10 December 2014: The Broadcasting Treaty: A Solution in Search of a Problem? &lt;/a&gt; (Organized at WIPO; December 10, 2014). Nehaa Chaudhari was a speaker at this side event. The details were originally published by Knowledge Ecology 		International. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/a2k/news/knowledge-ecology-international-sccr-29-public-interest-organizations-statements-regarding-the-broadcasting-treaty"&gt;&lt;b&gt; &lt;/b&gt;SCCR 29: Public Interest Organizations Statements regarding the Broadcasting Treaty &lt;/a&gt; (Knowledge Ecology International; December 9, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/knowledge-ecology-international-sccr-29-december-11-2014-libraries-archives-public-interest-ngos-q-a-with-dr-crews"&gt; SCCR 29 Libraries, Archives and Public Interest NGOs in Q&amp;amp;A with Dr. Crews &lt;/a&gt; (Knowledge Ecology International; December 11, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/ip-watch-catherine-saez-december-18-2014-wipo-study-on-copyright-exceptions-stimulates-broad-discussion-with-author"&gt; At WIPO, Study On Copyright Exceptions Stimulates Broad Discussion With Author &lt;/a&gt; (Catherine Saez; December 18, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/ip-watch-catherine-saez-december-19-2014-wipo-delegates-hear-concerns-of-ngos-on-exceptions-for-libraries"&gt; WIPO Delegates Hear Concerns of NGOs on Exceptions for Libraries (Catherine Saez; IP Watch &lt;/a&gt; ; December 19, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Newspaper Article&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/the-hindu-december-6-2014-tejaswini-niranjana-beyond-the-language-tussle"&gt;&lt;b&gt; &lt;/b&gt;Beyond the Language Tussle &lt;/a&gt; (Tejaswini Niranjana; The Samaja, November 17, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikisource-campus-project-at-kiss"&gt;&lt;b&gt; &lt;/b&gt;Odia Wikisource campus project at Kalinga Institute of Social Sciences &lt;/a&gt; (Subhashish Panigrahi; December 3, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/publications-under-creative-commons-license"&gt; Several Publications Now Available under Creative Commons License &lt;/a&gt; (Subhashish Panigrahi; December 28, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/odia-wikisource-workshop-new-delhi-december-14-2014"&gt;Odia Wikisource workshop at New Delhi&lt;/a&gt; (Subhashish Panigrahi; December 30, 2014). &lt;i&gt;The event was organized by CIS in collaboration with "The Intellects" on December 14&lt;/i&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/article-in-dhatri"&gt;Odia Wikipedia&lt;/a&gt; (Dhatri; December 1, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/odiapua-december-1-2014-article-on-odia-wikipedia"&gt;Odia Wikipedia&lt;/a&gt; (Odiapua; December 1, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/new-indian-express-december-5-2014-diana-sahu-access-to-rare-books-made-easy"&gt; Access to Rare Books Made Easy &lt;/a&gt; (Diana Sahu; Indian Express; December 5, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/hindu-businessline-december-13-2014-tulu-wikipedia-gets-some-push"&gt; Tulu Wikipedia gets some push &lt;/a&gt; (Hindu Businessline; December 13, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/kannada-prabha-december-14-2014-tulu-wikipedia-presentation"&gt;Tulu Wikipedia&lt;/a&gt; (Kannada Prabha; December 14, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/tulu-wikipedia-december-15-2014-coverage-in-vijaya-karnataka"&gt;Tulu Wikipedia&lt;/a&gt; (Vijaya Karnataka; December 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/tulu-wikipedia-coverage-in-vijayavani"&gt;Tulu Wikipedia&lt;/a&gt; (VijayaVani; December 27, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/the-hans-india-december-31-2014-works-of-veerasalingam-pantulu-on-web"&gt; Works of Veerasalingam Pantulu on web &lt;/a&gt; (Hans India; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/sakshi-december-31-2014-wiki-winter-camp"&gt;Wiki Winter Camp - Coverage in Sakshi&lt;/a&gt; (Sakshi; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/eenadu-december-31-wiki-winter-camp"&gt;Wiki Winter Camp - Coverage in Eenadu&lt;/a&gt; (Eenadu; December 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/events/odia-wikisource-sabha-2014"&gt;Odia Wikisource Sabha 2014&lt;/a&gt; (Co-organized by CIS-A2K and Odia Wikimedia Community; November 28, 2014). Subhashish Panigrahi participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/news/ict-for-development"&gt;ICT for Development&lt;/a&gt; (Organized by Christ University; December 3, 2014). Dr. U.B. Pavanaja was a speaker at this event. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/swatantra-2014-icfoss-december-18-20-2014-fifth-international-free-software-conference-in-kerala"&gt; Swatantra 2014: Fifth International Free Software Conference, Kerala &lt;/a&gt; (Organized by ICFOSS, Govt. of Kerala; Hotel Hycinth by Sparsa, Trivandrum; December 18 - 20, 2014). T. Vishnu Vardhan chaired a session on Wikimedia 		and Access to Knowledge in India and Rahimanuddin Shaik co-presented on Making DLI Accessible. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/department-of-science-and-technology-department-of-biotechnology-adopt-open-access-policy"&gt;&lt;b&gt; &lt;/b&gt;Department of Science and Technology &amp;amp; Department of Biotechnology adopt Open Access Policy &lt;/a&gt; (Anubha Sinha; December 29, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/news/omidyar-network-december-11-2014-tech-for-citizen-engagement-2014"&gt;&lt;b&gt; &lt;/b&gt;Tech for Citizen Engagement 2014 &lt;/a&gt; (Organized by Omidyar Network; New Delhi; December 11, 2014). Sunil Abraham was a speaker in the session "Rules of Engagement: Emerging Trends in 		Citizen Outreach". &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/swatantra-2014-icfoss-december-18-20-2014-fifth-international-free-software-conference-in-kerala"&gt; Swatantra 2014: Fifth International Free Software Conference, Kerala &lt;/a&gt; (Organized by ICFOSS, Govt. of Kerala; Hotel Hycinth by Sparsa, Trivandrum; December 18 - 20, 2014). Prof. Subbiah Arunachalam was a speaker and made a 		presentation on Open Science. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in 	enhancing respect for the right to privacy in developing countries. During the month we published the following blog entries:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;White Papers&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law"&gt;&lt;b&gt; &lt;/b&gt;Locating Constructs of Privacy within Classical Hindu Law &lt;/a&gt; (Ashna Ashesh and Bhairav Acharya; December 29, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality"&gt; Relationship between Privacy and Confidentiality &lt;/a&gt; (Vipul Kharbanda; December 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt;&lt;b&gt; &lt;/b&gt;Identifying Aspects of Privacy in Islamic Law &lt;/a&gt; (Vidushi Marda and Bhairav Acharya; December 14, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy"&gt;&lt;b&gt; &lt;/b&gt;Security, Governments, and Data: Technology and Policy &lt;/a&gt; (Co-organized by CIS and the Observer Research Foundation; January 8, 2015; New Delhi). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/cpdp-2015"&gt;CPDP 2015&lt;/a&gt; : The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. CIS is a moral 		supporter of CPDP. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights"&gt;&lt;b&gt; &lt;/b&gt;Security and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights &lt;/a&gt; (CIS; December 19, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Free Speech&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the MacArthur Foundation, CIS is doing research on the restrictions placed on freedom of expression online by the Indian government and 	contribute studies, reports and policy briefs to feed into the ongoing debates at the national as well as international level. As part of the project we 	bring you the following outputs:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014"&gt;&lt;b&gt; &lt;/b&gt;ICANN reveals hitherto undisclosed details of domain names revenues &lt;/a&gt; (Geetha Hariharan; December 8, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/ianas-revolving-door"&gt; Revolving Door Analysis: IANA Stewardship Transition Coordination Group &lt;/a&gt; (Lakshmi Venkataraman; December 10, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt; Is India's website-blocking law constitutional? - I. Law &amp;amp; procedure &lt;/a&gt; (Geetha Hariharan; December 11, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws"&gt;&lt;b&gt; &lt;/b&gt;National Seminar on Cyber Security &amp;amp; Cyber Laws - Issues and Concerns &lt;/a&gt; (Organized by the Advanced Centre for Research, Development &amp;amp; Training in Cyber Laws &amp;amp; Forensics; National Law School of India University, 		Bangalore; December 27 - 28, 2014). Sharath Chandra Ram was part of a plenary session on "Multi-Disciplinary Challenges in Ensuring Cyber Security". &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/overview-constitutional-challenges-on-itact"&gt;&lt;b&gt; &lt;/b&gt;Overview of the Constitutional Challenges to the IT Act &lt;/a&gt; (Pranesh Prakash; December 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling"&gt; Reply to RTI filed with BSNL regarding Network Neutrality and Throttling &lt;/a&gt; (Tarun Krishnakumar; December 22, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------- 	&lt;br /&gt; &lt;b&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;/b&gt;&lt;br /&gt; --------------------------------- 	&lt;br /&gt; CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom"&gt; India sees biggest improvement in Internet freedom, says report &lt;/a&gt; (Moulishree Srivastava; Livemint; December 5, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe"&gt;Are Cab Apps safe?&lt;/a&gt; (IBN Live; December 8, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety"&gt; FrndiNeed; an app for passengers' safety &lt;/a&gt; (Athira A. Nair; Economic Times; December 10, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors"&gt; Thank You To Our 2014 Sponsors &lt;/a&gt; (Medianama; December 22, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle"&gt; Why did India fail to discover the ISIS Twitter handle? &lt;/a&gt; (Anita Babu; Business Standard; December 26, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance"&gt; Targeting surveillance &lt;/a&gt; (Ajai Sreevatsan; The Hindu; December 28, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-"&gt; Centre blocks 32 websites for security reasons, restores some later &lt;/a&gt; (S. Ronendra Singh; Hindu Businessline; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/ndtv-december-31-2014-dot-reportedly-orders-blocking-of-32-websites-including-github-archiveorg-sourceforge"&gt; DoT Reportedly Orders Blocking of 32 Websites Including GitHub, Archive.org, SourceForge &lt;/a&gt; (NDTV; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/livemint-december-31-2014-moulishree-srivastava-govt-blocks-32-websites"&gt; Govt blocks 32 websites, including Vimeo and Github &lt;/a&gt; (Moulishree Srivastava; Livemint; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/ib-times-jeff-stone-december-31-2014-sites-blocked-in-india-for-anti-india-content-from-isis"&gt; Vimeo, DailyMotion, Pastebin Among Sites Blocked In India For 'Anti-India' Content From ISIS &lt;/a&gt; (Jeff Stone; IB Times; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/times-of-india-anupam-saxena-december-31-2014-pastein-dailymotion-github-blocked-after-dot-order"&gt; Pastebin, Dailymotion, Github blocked after DoT order: Report &lt;/a&gt; (Anupam Saxena; The Times of India; December 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-december-4-2014-a-roadmap-for-digital-india"&gt;&lt;b&gt; &lt;/b&gt;A Road Map for Digital India &lt;/a&gt; (Shyam Ponappa; Business Standard; December 3, 2014 and Organizing India Blogspot; December 4, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social 	sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new 	conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/raw/the-spaces-of-digital"&gt;The Spaces of Digital&lt;/a&gt; (P.P.Sneha; December 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and 	improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at	&lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2014-bulletin'&gt;https://cis-india.org/about/newsletters/december-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-01-12T16:56:54Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2013-bulletin">
    <title>December 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of December 2013 can be accessed below. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet &amp;amp; Society (CIS) wish you all a  great year ahead and welcome you to the twelfth issue of its newsletter  (December) for the year 2013:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------&lt;br /&gt;Highlights&lt;br /&gt;-------------------------------&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The  National Resource Kit team has published a draft chapter highlighting  the state of laws, policies and programmes for persons with disabilities  in the state of Gujarat.&lt;/li&gt;
&lt;li&gt;Government  of India has passed the National Electronic Accessibility Policy. CIS  had worked with the Department of Electronics and Information Technology  to formulate this policy. We bring you a brief analysis of the policy  and provisions therein in a blog post.&lt;/li&gt;
&lt;li&gt;Nehaa  Chaudhari on behalf of CIS submitted comments on the Proposed WIPO  Treaty for the Protection of Broadcasting Organizations to the Ministry  of Human Resource Development.&lt;/li&gt;
&lt;li&gt;CIS-A2K  team has published a report highlighting the key accomplishments about  the work accomplished on Konkani Wikipedia from September to December  2013.&lt;/li&gt;
&lt;li&gt;Vipul  Kharbanda has provided an analysis of the laws and regulations that  apply to Bitcoin in India concluding that government can regulate  Bitcoin. &lt;/li&gt;
&lt;li&gt;We released the first documentary film (DesiSec) on cyber security in India in Bangalore on December 11.&lt;/li&gt;
&lt;li&gt;In  the module on Global Histories of the Internet (part of the Knowledge  Repository on Internet Access project) Nishant Shah analyses the  understanding of the internet, cyberspace and everyday life and why do  we need to know the history of the internet.&lt;/li&gt;
&lt;li&gt;The second "Institute on Internet and Society" will be held in Yashada, Pune from February 11 to 17, 2014.&lt;/li&gt;
&lt;li&gt;As  part of the Making Change project, Denisse Albornoz provides an  analysis of the benefits and limitations of increasing access to  information to enable citizenship and political participation.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4615&amp;amp;qid=367159"&gt;Jobs&lt;/a&gt;&lt;br /&gt;-----------------------------------------------&lt;br /&gt;CIS is seeking applications for the posts of Program Officer (Access to Knowledge) and Program Officer (Internet Governance): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4616&amp;amp;qid=367159"&gt;http://bit.ly/1aA57K6&lt;/a&gt;.  There are two vacancies each for these posts and these are full-time  based in Delhi. To apply, please send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;) and Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;)  with three writing samples of which at least one demonstrates your  analytic skills, and one that shows your ability to simplify complex  policy issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4617&amp;amp;qid=367159"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;br /&gt;----------------------------------------------&lt;br /&gt;As  part of our project (under a grant from the Hans Foundation) on  creating a national resource kit of state-wise laws, policies and  programmes on issues relating to persons with disabilities in India, we  bring you draft chapters for the states of Madhya Pradesh and Arunachal  Pradesh, and the union territory of Daman and Diu. With this we have  completed compilation of draft chapters for 27 states and 5 union  territories. Feedback and comments are invited from readers for the  following chapter:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► National Resource Kit Chapter&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Gujarat Chapter (by Anandhi Viswanathan, December 31, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4618&amp;amp;qid=367159"&gt;http://bit.ly/Kxbg3b&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;All of the chapters published so far in this project are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Media Coverage&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;An “Advocacy” Saga and the Inspiring Legacy of Rahul Cherian (by Shamnad Basheer, Spicy IP, December 16, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4619&amp;amp;qid=367159"&gt;http://bit.ly/1a5B7sU&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;National Policy on Universal Electronic Accessibility – An Analysis (by Anandhi Viswanathan, December 27, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4620&amp;amp;qid=367159"&gt;http://bit.ly/1dfCW3I&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4621&amp;amp;qid=367159"&gt;Access to Knowledge&lt;/a&gt;&lt;br /&gt;-----------------------------------------------------------&lt;br /&gt;The  Access to Knowledge programme addresses the harms caused to consumers  and human rights, and critically examines Open Government Data, Open  Access to Scholarly Literature, and Open Access to Law, Open Content,  Open Standards, and Free/Libre/Open Source Software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Submission&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Comments  on Proposed WIPO Treaty for the Protection of Broadcasting  Organizations (by Nehaa Chaudhari, December 7, 2013). CIS submitted its  comments to the Ministry of Human Resource Development: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4622&amp;amp;qid=367159"&gt;http://bit.ly/1hpWeuu&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;3rd  Global Congress on IP and the Public Interest &amp;amp; Open A.I.R.  Conference on Innovation and IP in Africa (organized by University of  Cape Town, December 9-13, 2013). Sunil Abraham participated as a speaker  in the sessions on Bridging into the Global Congress: Global Issues,  Local Answers?, User Rights Track: What Medicines Can Teach Tech:  Exploring Patent Pooling and Compulsory Licensing in the Indian Mobile  Device Market (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4623&amp;amp;qid=367159"&gt;http://bit.ly/1f74yir&lt;/a&gt;),  User Rights Track: Reclaiming the World Trade Organisation: A Modest  Proposal for a WTO Agreement on the Supply of Global Public Goods (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4623&amp;amp;qid=367159"&gt;http://bit.ly/1f74yir&lt;/a&gt;), and was a keynote speaker on The Freedom Continuum (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4624&amp;amp;qid=367159"&gt;http://bit.ly/1dH1WEM&lt;/a&gt;). Nehaa Chaudhari also participated in this event: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4625&amp;amp;qid=367159"&gt;http://bit.ly/1bJArFJ&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Twenty-Sixth  Session of the Standing Committee on Copyrights and Related Rights  (organized by WIPO, Geneva, December 16 – 20, 2013). CIS gave its  statement on Limitations and Exceptions for Libraries and Archives (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4626&amp;amp;qid=367159"&gt;http://bit.ly/JWnjq7&lt;/a&gt;) and on Limitations and Exceptions for Education, Teaching and Research Institutions and Persons with Other Disabilities (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4626&amp;amp;qid=367159"&gt;http://bit.ly/JWnjq7&lt;/a&gt;). Nehaa Chaudhari participated as a speaker. India and the United States introduced 6 proposals on the WIPO Broadcast Treaty: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4627&amp;amp;qid=367159"&gt;http://bit.ly/1edqvr3&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The following has been done under grant from the Wikimedia Foundation (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4628&amp;amp;qid=367159"&gt;http://bit.ly/SPqFOl&lt;/a&gt;). As part this project (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4629&amp;amp;qid=367159"&gt;http://bit.ly/X80ELd&lt;/a&gt;),  we held 3 workshops in the month of December, published a detailed  report of key accomplishments of the work done in Konkani Wikipedia, a  report on Train the Trainer Program held in the month of October and  published an article in DNA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Article&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Telugu Wikipedia completes 10 years (by Rahmanuddin Shaik, DNA, December 16, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4630&amp;amp;qid=367159"&gt;http://bit.ly/19OAvUV&lt;/a&gt;.  The article was edited by Rohini Lakshané. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Report&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS-A2K: Work Accomplished on Konkani Wikipedia (by Nitika Tandon, December 31, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4631&amp;amp;qid=367159"&gt;http://bit.ly/1l6ttmp&lt;/a&gt;. The report throws some light on the work accomplished on Konkani Wikipedia from September to December 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;First ever Train-the-Trainer Program in India (by Nitika Tandon, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4632&amp;amp;qid=367159"&gt;http://bit.ly/1euwSXt&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The  following are videos of participants from the Konkani Vishwakosh  Digitization project (jointly organised by CIS-A2K and Goa University)  speaking on their experiences with Wikimedia projects&lt;/i&gt;.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Priyadarshini Tadkodkar on Konkani language (by Subhashish Panigrahi, November 17, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4633&amp;amp;qid=367159"&gt;http://bit.ly/1hldNM8&lt;/a&gt;. &lt;i&gt;We are featuring this here as we didn’t carry this in the last newsletter&lt;/i&gt;. &lt;/li&gt;
&lt;li&gt;Varsha Kavlekar on Konkani Wikipedia Incubator (by Nitika Tandon, December 12, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4634&amp;amp;qid=367159"&gt;http://bit.ly/KmxyFo&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Darshan Kandolkar on Konkani Vishwakosh Digitization Process (by Nitika Tandon, December 13, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4635&amp;amp;qid=367159"&gt;http://bit.ly/1cqKyQ2&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Darshana Mandrekar speaks on Konkani Wikipedia (by Nitika Tandon, December 16, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4636&amp;amp;qid=367159"&gt;http://bit.ly/1keWyya&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Pooja Tople on Wikimedia Projects (by Nitika Tandon, December 17, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4637&amp;amp;qid=367159"&gt;http://bit.ly/1hlbubU&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;You  Too Can Write on Wikipedia! — Training workshop (National Institute of  Tourism and Hotel Management, Gachibowli, Hyderabad, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4638&amp;amp;qid=367159"&gt;http://bit.ly/1edmx1z&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Telugu Wikipedia Training Workshop (KBN College, Vijaywada, December 16, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4639&amp;amp;qid=367159"&gt;http://bit.ly/1i8ScnL&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Kannada  Wikipedia Workshop at Alvas Vishva Nudisiri Virasat (Moodabidre,  December 19 – 22, 2013). Dr. U.B. Pavanaja gave a presentation about  Kannada Wikipedia and also conducted a workshop on Kannada Wikipedia as a  parallel track. The event was covered by Prajavani (December 22),  Hosadigantha (December 22), and Deccan Herald (December 22): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4640&amp;amp;qid=367159"&gt;http://bit.ly/1dGTBkw&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Co-organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Wikipedia Orientation Workshop (organised by CIS-A2K and Christ University, Bangalore, December 2, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4641&amp;amp;qid=367159"&gt;http://bit.ly/1lrkwEy&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Wikipedia  Training Session @ Tiruvur (organised by CIS-A2K and Telugu Wikipedia  community, Srivahini College, Tiruvur, December 19, 2013). T. Vishnu  Vardhan and Rahmanuddin Shaik conducted the workshop: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4642&amp;amp;qid=367159"&gt;http://bit.ly/1e3oQX7&lt;/a&gt;. It was covered by Andhraprabha (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4643&amp;amp;qid=367159"&gt;http://bit.ly/1bU5VsQ&lt;/a&gt;), Eenadu (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4644&amp;amp;qid=367159"&gt;http://bit.ly/19fsttf&lt;/a&gt;), Sakshi (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4645&amp;amp;qid=367159"&gt;http://bit.ly/1e3pQdU&lt;/a&gt;), and Prajasakthi (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4646&amp;amp;qid=367159"&gt;http://bit.ly/JJs7ja&lt;/a&gt;) on December 19, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Event Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A  Wikipedia Workshop at IISC (organised by the Assamese Wikipedia  community, Bangalore, December 1, 2013). CIS-A2K team and Wikipedian  Shiju Alex supported this event: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4647&amp;amp;qid=367159"&gt;http://bit.ly/1dSutY2&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Media Coverage&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs for the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Feature on Telugu Wikipedia (Namaste Telengana Newspaper, December 8, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4648&amp;amp;qid=367159"&gt;http://bit.ly/19Yjwj6&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Odisha: Odia Wikipedia reaching 5000 article mark! (Odisha Diary Bureau, December 17, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4649&amp;amp;qid=367159"&gt;http://bit.ly/1dGU2vc&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4650&amp;amp;qid=367159"&gt;Internet Governance&lt;/a&gt;&lt;br /&gt;-----------------------------------------------&lt;br /&gt;CIS  is doing a project (under a grant from Privacy International and  International Development Research Centre (IDRC)) on conducting research  on surveillance and freedom of expression (SAFEGUARDS). So far we have  organised seven privacy round-tables and drafted the Privacy  (Protection) Bill. This month we bring you an analysis on whether  Bitcoin can be banned by the government and a blog post on misuse of  surveillance powers in India. As part of its project (funded by Citizen  Lab, Munk School of Global Affairs, University of Toronto and support  from the IDRC) on mapping cyber security actors in South Asia and South  East Asia a film DesiSec: Episode 1was screened. We also did an  interview with Pranesh Prakash on cyber security. With this we have  completed a total of 13 video interviews so far:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;#  Analysis&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Can Bitcoin Be Banned by the Indian Government? (by Vipul Kharbanda, December 24, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4651&amp;amp;qid=367159"&gt;http://bit.ly/1lJrnGF&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Misuse of Surveillance Powers in India (Case 1) (by Pranesh Prakash, December 6, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4652&amp;amp;qid=367159"&gt;http://bit.ly/1donbaJ&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Brochures from Expos on Smart Cards, e-Security, RFID &amp;amp; Biometrics in India (by Maria Xynou, December 18, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4653&amp;amp;qid=367159"&gt;http://bit.ly/1f714fN&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;India’s  Identity Crisis (by Malavika Jayaram, December 31, 2013 Internet  Monitor Annual Report: Reflections on the Digital World, published by  Harvard's Berkman Center for Internet and Society): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4654&amp;amp;qid=367159"&gt;http://bit.ly/1lTRuuz&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Upcoming Events&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Digital  Citizens: Why Cyber Security and Online Privacy are Vital to the  Success of Democracy and Freedom of Expression (CIS, Bangalore, January  14, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4655&amp;amp;qid=367159"&gt;http://bit.ly/KucEU5&lt;/a&gt;. Michael Oghia will give a talk. &lt;/li&gt;
&lt;li&gt;CPDP 2014 Reforming Data Protection: The Global Perspective (Brussels, January 22 – 24, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4656&amp;amp;qid=367159"&gt;http://bit.ly/KsgCws&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Nullcon  Goa Feb 2014 — International Security Conference (organised by Nullcon,  Bogmallo Beach Resort, Goa, February 12 – 15, 2014). CIS is one of the  sponsors for this event: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4657&amp;amp;qid=367159"&gt;http://bit.ly/1lrBu5I&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Events Organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Democracy: Big Surveillance - A talk by Maria Xynou (CIS, Bangalore, December 3, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4658&amp;amp;qid=367159"&gt;http://bit.ly/19YnA31&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;DesiSec: Episode 1 - Film Release and Screening (CIS, December 11, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4659&amp;amp;qid=367159"&gt;http://bit.ly/1lJt2fm&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Legal Issues pertaining to Cloud Computing (NLSIU Campus, Bangalore, December 14-15, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4660&amp;amp;qid=367159"&gt;http://bit.ly/1cvcmGq&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Biometrics  or Bust? Implications of the UID for Participation and Inclusion (CIS,  Bangalore, January 10, 2014). Malavika Jayaram will give a talk: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4661&amp;amp;qid=367159"&gt;http://bit.ly/1lJZhuK&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Events Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Convention  on Crisis of Capitalism and brazen onslaught on Democracy (organized by  INSAF, December 6, 2013). Snehashish Ghosh participated as a speaker: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4662&amp;amp;qid=367159"&gt;http://bit.ly/1gAxmNy&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;International  View of the State-of-the-Art of Cryptography and Security and its Use  in Practice (IV) (jointly organized by Microsoft Research India, Indian  Institute of Science, and Indian Institute of Technology Madras,  December 6, 2013). Sunil Abraham was a panellist: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4663&amp;amp;qid=367159"&gt;http://bit.ly/1eAXl5t&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Technology  in Government and Topics in Privacy (organized by Data Privacy Lab,  CGIS Cafe, Cambridge Street, Harvard University Campus, December 9,  2013). Malavika Jayaram participated as a speaker on Biometrics in Beta –  India's Identity Experiment: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4664&amp;amp;qid=367159"&gt;http://bit.ly/1bJDqht&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Cyberscholars  Working Group at MIT (organized by the Berkman Center for Internet  &amp;amp; Society, Harvard University, December 12, 2013): Malavika Jayaram  made a presentation on Biometrics or Bust - India’s Identity Crisis: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4665&amp;amp;qid=367159"&gt;http://bit.ly/1eIpHef&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Seventh  NLSIR Symposium on “Bridging the Security-Liberty Divide” (organised by  National Law School, Bangalore, December 21-22). Chinmayi Arun and  Bhairav Acharya were speakers at this event: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4666&amp;amp;qid=367159"&gt;http://bit.ly/1gjsxYe&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4667&amp;amp;qid=367159"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;MongoDB startup hired by Aadhaar got funds from CIA VC arm (by Lison Joseph, Economic Times, December 3, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4668&amp;amp;qid=367159"&gt;http://bit.ly/1f77bRg&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A Three-Way Race Draws Delhi’s Young, and Everyone Else, Out to Vote (by Betwa Sharma, New York Times, December 4, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4669&amp;amp;qid=367159"&gt;http://bit.ly/1gAxoFf&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;India for UN body to resolve internet governance issues (by Kim Arora, The Times of India, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4670&amp;amp;qid=367159"&gt;http://bit.ly/JWESqe&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Card  transactions with Aadhaar validation need more time: experts (by Kirti  V. Rao and Moulishree Srivastava, Livemint, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4671&amp;amp;qid=367159"&gt;http://bit.ly/1hq35UL&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Indian government wakes up to risk of Hotmail, Gmail (originally published by AFP, December 7, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4672&amp;amp;qid=367159"&gt;http://bit.ly/19LrlOS&lt;/a&gt;. This was also mirrored in The Times of India (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4673&amp;amp;qid=367159"&gt;http://bit.ly/1hpYEJu&lt;/a&gt;), Reuters (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4674&amp;amp;qid=367159"&gt;http://bit.ly/1gaHhZk&lt;/a&gt;), Dawn (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4675&amp;amp;qid=367159"&gt;http://bit.ly/1azuV95&lt;/a&gt;), NDTV (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4676&amp;amp;qid=367159"&gt;http://bit.ly/19Ys7lS&lt;/a&gt;), Yahoo News (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4677&amp;amp;qid=367159"&gt;http://yhoo.it/JCSreE&lt;/a&gt;), The Malaysian Insider (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4678&amp;amp;qid=367159"&gt;http://bit.ly/1eAPAMW&lt;/a&gt;) and Asia One Digital (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4679&amp;amp;qid=367159"&gt;http://bit.ly/JWuw9R&lt;/a&gt;). A slightly modified version was published by Silicon India on December 11: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4680&amp;amp;qid=367159"&gt;http://bit.ly/1gAtzjd&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Announcement&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Pranesh  Prakash has been elected as the Asia-Pacific representative to the  executive committee of the NonCommercial Users Constituency (NCUC) (part  of the Non-Commercial Stakeholders Group, which is in turn part of the  Generic Names Supporting Organization, which is in turn part of ICANN): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4681&amp;amp;qid=367159"&gt;http://bit.ly/KuIVeC&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4682&amp;amp;qid=367159"&gt;Telecom&lt;/a&gt;&lt;br /&gt;-------------------------------&lt;br /&gt;Shyam  Ponappa, a Distinguished Fellow at CIS is a regular columnist with the  Business Standard. The articles published on his blog Organizing India  Blogspot is mirrored on our website:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Newspaper Column&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;For a Telecom Revival (by Shyam Ponappa, Business Standard, December 4, 2013 and Organizing India Blogspot, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4683&amp;amp;qid=367159"&gt;http://bit.ly/1avRDii&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4684&amp;amp;qid=367159"&gt;Digital Humanities&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;CIS  is building research clusters in the field of Digital Humanities. The  Digital will be used as a way of unpacking the debates in humanities and  social sciences and look at the new frameworks, concepts and ideas that  emerge in our engagement with the digital. The clusters aim to produce  and document new conversations and debates that shape the contours of  Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;#  Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Conflict of Konigsberg (by Anirudh Sridhar, December 17, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4685&amp;amp;qid=367159"&gt;http://bit.ly/1cEXhhU&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4686&amp;amp;qid=367159"&gt;&lt;br /&gt;Digital Natives&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;CIS  is doing a research project titled “Making Change”. The project will  explore new ways of defining, locating, and understanding change in  network societies. Having the thought piece 'Whose Change is it Anyway'  as an entry point for discussion and reflection, the project will  feature profiles, interviews and responses of change-makers to questions  around current mechanisms and practices of change in South Asia and  South East Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Making Change Project&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Tactical Technology: Information is Power?  (by Denisse Albornoz, December 26, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4687&amp;amp;qid=367159"&gt;http://bit.ly/1cEUrcY&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Tactical Technology: Designing Activism (by Denisse Albornoz, December 27, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4688&amp;amp;qid=367159"&gt;http://bit.ly/1a9IuzH&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Newspaper Column&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Digital Native (by Nishant Shah, Indian Express, December 22, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4689&amp;amp;qid=367159"&gt;http://bit.ly/1f7mU2P&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;------------------------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4690&amp;amp;qid=367159"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;br /&gt;------------------------------------------------------------&lt;br /&gt;CIS  in partnership with the Ford Foundation is executing a project to  create a knowledge repository on Internet and society. This repository  will comprise content targeted primarily at civil society with a view to  enabling their informed participation in the Indian Internet and ICT  policy space. The repository is available at the Internet Institute  website: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4691&amp;amp;qid=367159"&gt;http://bit.ly/1iQT2UB&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Upcoming Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Institute on Internet and Society (organised by Ford Foundation and CIS, Yashada, Pune, February 11-17, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4692&amp;amp;qid=367159"&gt;http://bit.ly/180mQi9&lt;/a&gt;. Registrations are closed for this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Modules&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;History of the Internet: Building Conceptual Frameworks (by Nishant Shah, December 31, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4693&amp;amp;qid=367159"&gt;http://bit.ly/19WRHLb&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Internet Privacy in India (by Elonnai Hickok, December 31, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4694&amp;amp;qid=367159"&gt;http://bit.ly/19SNk6v&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------------&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4695&amp;amp;qid=367159"&gt;&lt;br /&gt;About CIS&lt;/a&gt;&lt;br /&gt;-----------------------------------------------------&lt;br /&gt;The  Centre for Internet and Society is a non-profit research organization  that works on policy issues relating to freedom of expression, privacy,  accessibility for persons with disabilities, access to knowledge and IPR  reform, and openness (including open government, FOSS, open standards,  etc.), and engages in academic research on digital natives and digital  humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4696&amp;amp;qid=367159"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook group: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4697&amp;amp;qid=367159"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at:&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4698&amp;amp;qid=367159"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please  help us defend consumer / citizen rights on the Internet! Write a  cheque in favour of ‘The Centre for Internet and Society’ and mail it to  us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;br /&gt;We  invite researchers, practitioners, and theoreticians, both  organisationally and as individuals, to collaboratively engage with  Internet and society and improve our understanding of this new field. To  discuss the research collaborations, write to Sunil Abraham, Executive  Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS  is grateful to its donors, Wikimedia Foundation, Ford Foundation,  Privacy International, UK, Hans Foundation and the Kusuma Trust which  was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian  origin, for its core funding and support for most of its projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2013-bulletin'&gt;https://cis-india.org/about/newsletters/december-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-02-25T13:51:47Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
