<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2466 to 2480.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/speak-easy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/october-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/kids-on-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/a-net-of-hatred"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/internet-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/all-night-for-hackers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/medical-privacy-conference-report"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/speak-easy">
    <title>Speak Easy: Citizenship, Freedom of Expression and Online Governance</title>
    <link>https://cis-india.org/news/speak-easy</link>
    <description>
        &lt;b&gt;The event organised by the YP Foundation, Youth Ki Awaaz, Change.Org and RTI Anonymous was held at the American Centre in Kasturba Gandhi Marg, Connaught Place, New Delhi on July 31, 2012. Chinmayi Arun, a Fellow at the Centre for Internet &amp; Society &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event focused on exploring the freedom of expression vis-a-vis its impact on accessibility and connectivity across multiple youth movements focused on gender, speciality, education, governance and arts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were group discussions with Venkatesh Nayak (Commonwealth Human Rights Initiative), Anja Kovacs (Internet Democracy Project), Chinmayi Arun (Centre for Internet &amp;amp; Society) among others.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;2.00  2.30 &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Registrations open for workshops!&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.30  2.45 &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Getting started – ‘Why Speak Easy?’&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.45 4.30&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Speak Easy | Learn: Workshops on advocating online, citizenship journalism, filing the Right to  Information (RTI) application, and participating in online legislation with Youth Ki Awaaz, Change.Org, Get Up 4 Change, The YP Foundation and PRS Legislative.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.30  6.00  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Speak Easy | Converge: Exploring the Freedom of Expression vis-à-vis its impact on accessibility and connectivity across multiple youth movements focused on gender, sexuality, education, governance and arts. Group Discussions with Venkatesh Nayak (Commonwealth Human Rights Initiative), Anja Kovacs (Founder, Internet Democracy Project), Chinmayi Arun (Centre for Internet and Society) and many others.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.00 7.00&lt;/td&gt;
&lt;td&gt;Speak Easy | Demand: How can young people dialogue with decision makers?&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Venue Partner: The American Center&lt;br /&gt;Read the original published in the YP Foundation &lt;a class="external-link" href="http://www.theypfoundation.org/speakeasy/"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/speak-easy'&gt;https://cis-india.org/news/speak-easy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-08-01T04:56:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance">
    <title>Role of the US Tech Companies in Government Surveillance: A Lecture by Christopher Soghoian </title>
    <link>https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance</link>
    <description>
        &lt;b&gt;Christopher Soghoian will deliver a lecture on the role US tech companies play in assisting government surveillance at the Centre for Internet &amp; Society office in Bangalore on August 27, 2012, from 5.00 p.m. to 7.00 p.m.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Your internet, phone and web application providers are all, for the most part, in bed with US and other foreign government agencies. They all routinely disclose their customers' communications and other private data to law enforcement and intelligence agencies. Worse, firms like Google and Microsoft specifically log data in order to assist the government. How many government requests does your ISP get for its customers' communications each year? How many do they comply with? How many do they fight? How much do they charge for the surveillance assistance they provide? Who knows? Most companies have a strict policy of not discussing such topics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The differences in the privacy practices of the major players in the telecommunications and internet applications market are significant. Some firms retain identifying data for years, while others retain no data at all; some voluntarily provide the government access to user data, while other companies refuse to voluntarily disclose data without a court order; some companies charge government agencies when they request user data, while others disclose it for free. For an individual, later investigated by the police or intelligence services, the data retention practices adopted by their phone company or email provider can significantly impact their freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, although many companies claim to care about end-user privacy, and some even that they compete on their privacy features, none seem to be willing to compete on the extent to which they assist or resist the government in its surveillance activities. Because information about each firms' practices is not publicly known, consumers cannot vote with their wallets, and pick service providers that best protect their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This talk will pierce the veil of secrecy surrounding these practices. Based upon a combination of Freedom of Information Act requests, off the record conversations with industry lawyers, and investigative journalism, the practices of many of these firms will be revealed.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Christopher's Personal Experience&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the year 2006, the Federal Bureau of Investigation (FBI) raided Christopher’s home at 2.00 a.m. seizing his personal documents and computers. Two attorneys, Stephen Braga and Jennifer Granick came to his defence. With their expert assistance, Christopher was able to get back his possessions within three weeks, and FBI’s criminal and TSA’s civil investigations were closed without any charges being filed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jennifer Granick came to Christopher’s assistance once again (joined by Steve Leckar) in 2010 after the Federal Trade Commission’s Inspector General investigated Christopher for using his government badge to attend a closed-door surveillance industry conference. It was at that event that Christopher recorded an executive from wireless carrier ‘Sprint’ bragging about the eight million times his company had obtained GPS data on its customers for law enforcement agencies in the previous years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To know more, read Christopher Soghoian’s dissertation titled "&lt;a href="https://cis-india.org/internet-governance/spies-we-trust" class="internal-link"&gt;The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance&lt;/a&gt;". [PDF, 1056 Kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About Christopher Soghoian&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Christopher Soghoian is a privacy researcher and activist, working at the intersection of technology, law and policy. He is a Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union and is based in Washington, D.C.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soghoian completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice &lt;i&gt;pro se&lt;/i&gt;, and used several other investigative research methods. His research has appeared in publications including the &lt;i&gt;Berkeley Technology Law Journal &lt;/i&gt;and been cited by several federal courts, including the Ninth Circuit Court of Appeals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between the years, 2009-2010, he was the first ever in-house technologist at the Federal Trade Commission's Division of Privacy and Identity Protection, where he worked on investigations of Facebook, Twitter, MySpace and Netflix. Prior to joining the FTC, he co-created the Do Not Track privacy anti-tracking mechanism now adopted by all of the major web browsers.&lt;/p&gt;
&lt;p&gt;He is a TEDGlobal 2012 Fellow, was an Open Society Foundations Fellow between the years, 2011-2012, and was a Student Fellow at the Berkman Center for Internet &amp;amp; Society, Harvard University between 2008 and 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance'&gt;https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-26T11:03:19Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/october-2011-bulletin">
    <title>October 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/october-2011-bulletin</link>
    <description>
        &lt;b&gt;Welcome to the Centre for Internet and Society newsletter! In this issue we bring you the updates of our research, events, media coverage and videos of some past events organized by us during October 2011.&lt;/b&gt;
        &lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital  Natives with a Cause? examines the changing landscape of social change  and political participation in light of the role that young people play  through digital and Internet technologies, in emerging information  societies. Consolidating knowledge from Asia, Africa and Latin America,  it builds a global network of knowledge partners who critically engage  with discourse on youth, technology and social change, and look at  alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3 align="LEFT"&gt;Key Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/digital-natives/front-page/blog/digital-natives-and-politics-in-asia"&gt;On 	Fooling Around: Digital Natives and Politics in Asia&lt;/a&gt;&lt;br /&gt;by 	Nishant Shah,  Director-Research&lt;br /&gt;Youths are not only 	actively participating in the politics of its times but also 	changing the way in which we understand the political processes of 	mobilisation, participation and transformation, writes Nishant. The 	paper was presented at the Digital Cultures in Asia conference at 	the Academia Sinica, Taipei, Taiwan.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 align="LEFT"&gt;Links in the Chain&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/digital-natives/volume-8-issue-4.pdf"&gt;Analog 	Relics in the Digital Age&lt;/a&gt;, volume 8, issue 	4&lt;br /&gt;Guest Editor: Nilofar Ansher&lt;br /&gt;“The 	scale of inventions has not really leaped, so much as mutated. We 	had Twitter and Facebook ... (remember notice boards, community 	centers and pamphlets); they just weren’t so instant, hyperlinked 	and global in scale. We still use the medium of a mouthpiece and 	speaker to talk to each other long distance, the difference is in 	the changed aesthetics of the 21st century – it’s all squarish 	curves and scratch-proof glass that are more appealing today. 	Blackboards, writing material, listening devices and memory aids 	have undergone unprecedented transformations of function and usage, 	but it’s still about having a blank canvas to write upon with a 	chalk, pen, paper or iClick”, writes Nilofar in this issue of the 	Digital Natives newsletter.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 align="LEFT"&gt;Articles/Columns&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/digital-natives/in-search-of-the-other-decoding-digital-natives"&gt;In 	Search of the Other: Decoding Digital Natives&lt;/a&gt;: 	 Nishant Shah charts the trajectories of our research at the Centre 	for Internet and Society (Bangalore, India) and Hivos (The Hague, 	The Netherlands) to see how alternative models of understanding 	these relationships can be built. This blog post by Nishant Shah was 	published in DML central on 24 October 2011. &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h3&gt;Staff 	Quoted in the Media&lt;a href="http://www.cis-india.org/news/write-stuff"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.cis-india.org/news/write-stuff"&gt;The 	Write Stuff&lt;/a&gt;&lt;a href="http://www.cis-india.org/news/write-stuff"&gt; &lt;/a&gt;, Deccan 	Chronicle, 14 November 2011. Nishant Shah has been quoted in this article.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility" class="external-link"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;/p&gt;
&lt;h3&gt;Publication&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/accessibility/e-accessibility-handbook-in-russian"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; (Russian Version)&lt;br /&gt;Edited by Nirmita Narasimhan&lt;br /&gt;The e-Accessibility Policy Handbook for Persons with Disabilities is now available in Russian. The handbook is a joint publication of ITU, G3ict and the Centre for Internet and Society, in cooperation with the Hans Foundation. Dr. Hamadoun I. Toure, Secretary-General, International Telecommunication Union wrote the preface,  Dr. Sami Al-Basheer, Director, ITU-D wrote the introduction and Axel Leblois, Executive Director, G3ict wrote the foreword.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://www.cis-india.org/accessibility/accessible-banking"&gt;The 	case for Accessible Banking&lt;/a&gt; by Dinesh Kaushal.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/a2k" class="external-link"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Key Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/a2k/jesters-clowns-pranksters"&gt;Of 	Jesters, Clowns and Pranksters: YouTube and the Condition of 	Collaborative Authorship&lt;/a&gt;&lt;a href="http://www.cis-india.org/a2k/jesters-clowns-pranksters"&gt; &lt;/a&gt;&lt;br /&gt;by Nishant Shah, Director-Research, 	Centre for Internet and Society&lt;br /&gt;The idea of a single author 	creating cinematic objects in a well-controlled scheme of support 	system and production/distribution infrastructure has been 	fundamentally challenged by the emergence of digital video sharing 	sites like YouTube, writes Nishant in this essay published in the 	Journal of Moving Images.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/openness" class="external-link"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/openness/blog/know-your-users"&gt;Know Your Users, Match their Needs!&lt;/a&gt;&lt;br /&gt;As Free Access to Law initiatives in the Global South enter into a new stage of maturity, they must be certain not to lose sight of their users’ needs. This blog post gives a summary of the “Good Practices Handbook”, a research output of the collaborative project Free Access to Law — Is it Here to Stay? undertaken by LexUM (Canada) and the South African Legal Institute in partnership with the Centre for Internet and Society. Rebecca Schild and Prashant Iyengar from CIS were part of the research team.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.cis-india.org/openness/events/open-access-to-academic-knowledge-at-the-iisc"&gt;Open Access to Academic Knowledge&lt;/a&gt;&lt;span&gt;, organised by the Indian Institute of Science and CIS&lt;/span&gt;&lt;span&gt; at National Centre for Science Information, Indian Institute of Science, Bangalore on 2 November 2011. Tom Dane participated in this event.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/canadian-science-policy-conference"&gt;3rd Canadian Science Policy Conference&lt;/a&gt;, organised by Canadian Science Policy Conference from16 to 18 November 2011 at the Ottawa Convention Centre. Sunil Abraham spoke in the session on Global Implications of Open and Inclusive Innovation.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Announcement&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/announcement-of-wikimedia-india-program-trust"&gt;The Wikimedia India Program Trust&lt;/a&gt;. A new entity, the “Wikimedia India Program Trust”, has been registered in Delhi. Sunil is a trustee.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  Internet Governance programme conducts research around the various  social, technical, and political underpinnings of global and national  Internet governance, and includes online privacy, freedom of speech, and  Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Comments / Submissions&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/comments-on-finance-committee-statements"&gt;CIS 	Comments on Finance Committee Statements to Open Letters on Unique 	Identity&lt;/a&gt;: 	The Parliamentary Finance Committee responded to the six open 	letters sent by CIS through an email on 12 October 2011. CIS has 	commented on the points raised by the Committee.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/comments-national-policy-information-technology"&gt;Comments 	on the National Policy of Information Technology&lt;/a&gt;: 	The NPIT 2011 has the laudable goal of making India a ‘knowledge 	economy with a global role’ by developing and deploying ICT 	solutions in all sectors to foster development within India and at a 	global level. CIS appreciates this initiative of the Department of 	Information Technology and offers brief comments to strengthen the 	draft.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/comments-draft-national-policy-on-electronics"&gt;CIS 	Comments on the Draft National Policy on Electronics&lt;/a&gt;: 	CIS submitted its comments to the request for comments put out by 	the Department of Information Technology on its draft 'National 	Policy on Electronics'.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Statement&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/blog/india-statement-un-cirp"&gt;India's 	Statement Proposing UN Committee for Internet-Related Policy&lt;/a&gt;: 	 India made its statement at the 66th session of the United Nations 	General Assembly, its proposal for the UN Committee for 	Internet-Related Policy was presented.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Podcast&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/openness/professor-balaram-talks-open-access"&gt;Professor 	Balaram talks Open Access&lt;/a&gt; : Tom Dane spoke with Professor P 	Balaram, Director of the Indian Institute of Science about the Open 	Access movement. A podcast of the interview is available for 	download.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/ijlt-cis-lecture-series-report"&gt;The 2nd IJLT-CIS Lecture Series — A Post-event Report&lt;/a&gt; : The 2nd IJLT-CIS Lecture Series was organised by the Indian Journal of Law and Technology and CIS on the 21st and 22nd of May 2011 at the National Law School of India University, Nagarbhavi, Bangalore. The main theme for this year was Emerging Issues in Privacy Law: Law, Policy and Practice.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Peer Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/material-cyborgs-asserted-boundaries"&gt;Material Cyborgs; Asserted Boundaries&lt;/a&gt;&lt;br /&gt;by Nishant Shah, Director-Research &lt;br /&gt;Nishant explores the possibility of formulating the cyborg as an author or translator who is able to navigate between the different binaries of ‘meat–machine’, ‘digital–physical’, and ‘body–self’, using the abilities and the capabilities learnt in one system in an efficient and effective understanding of the other. The essay was published in the European Journal of English Studies, Volume 12, Issue 2.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Articles / Columns&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/what-is-dilligaf"&gt;What 	is Dilligaf?&lt;/a&gt; On the web, time moves at the speed of thought: Groups emerge, 	proliferate and are abandoned as new trends and fads take 	precedence. Nowhere else is this dramatic flux as apparent as in the 	language that evolves online. While SMS lingo – like TTYL (Talk To 	You Later) and LOL (Laughing Out Loud)– has endured and become a 	part of everyday language, new forms of speech are taking over. This 	article by Nishant Shah was published in GQ India.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/book-of-jobs"&gt;The 	Book of Jobs&lt;/a&gt; The man who made the computer personal, who changed the face of the 	digital media industry, who was inspired by Zen philosophy to create 	an eight-billion-dollar empire, Steve Jobs, died last month. Just a 	few weeks before his death, in the midst of his painful illness, he 	told Walter Isaacson, the man chosen to write his authorised 	biography, “I really want to believe that something survives”. 	And Isaacson wrote him a fairy tale which will make sure that Jobs 	will be remembered beyond the gizmos and gimmicks, writes Nishant 	Shah in this article published in the Indian Express on 12 November 	2011.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 align="LEFT"&gt;Staff Quoted in the Media&lt;a href="http://www.cis-india.org/news/facebook-tracking-footprints"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/facebook-tracking-footprints"&gt;Is 	Facebook tracking your virtual footprints?&lt;/a&gt; by Sheetal Sukhija in MidDay, 22 November 2011. Sunil Abraham was 	quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/m-governance"&gt;M-governance 	gains momentum&lt;/a&gt; by Vasudha Venugopal in the Hindu, 20 November 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/learn-it-yourself"&gt;Learn 	it Yourself&lt;/a&gt;: 	The peer-to-peer world of online learning encourages conversations 	and reciprocal learning, writes Nishant Shah. The article was 	published by the Indian Express on 30 October 2011. Nishant Shah is quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/bill-could-kill-internet"&gt;SOPA: 	The bill that could kill the Internet&lt;/a&gt; by Suw Charman-Anderson in Firstpost.Technology, 16 November 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/broadband-long-way-to-go"&gt;Broadband 	user base still has a long way to go&lt;/a&gt;, 	by Leslie D’Monte &amp;amp; Deepti Chaudhary in Livemint, 15 November 	2011. Sunil Abraham has been quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/maids-guards-get-fingerprinted"&gt;Not 	mandatory’ but maids, guards get fingerprinted&lt;/a&gt; by Hemanth Kashyap in Bangalore Mirror, 9 November 2011. Sunil 	Abraham has been quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/netizen-report"&gt;Netizen 	Report: Transparency Edition&lt;/a&gt; by Rebecca MacKinnon in Global Voices Online, 7 November 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/blocking-content-google-gets-more-requests"&gt;Blocking 	online content: Google gets more requests than govt&lt;/a&gt; by Pallavi Polanki in Firstpost.com, 2 November 2011. Pranesh 	Prakash has been quoted in this article.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3 align="LEFT"&gt;Blog Entries&lt;a href="http://www.cis-india.org/internet-governance/sources-cis-funding"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.cis-india.org/internet-governance/sources-cis-funding"&gt;Sources 	of CIS Funding&lt;/a&gt; by 	Pranesh Prakash on 9 November 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="LEFT"&gt;&lt;a href="http://www.cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking"&gt;TRAI 	urged to take action against P2P throttling and DNS hijacking&lt;/a&gt; by Anand on 9 November 2011.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/art-activism"&gt;&lt;span&gt;Exposing 	Data: Art Slash Activism&lt;/span&gt;&lt;/a&gt;&lt;span&gt; organised by Tactical Tech and CIS at CIS office in Bangalore on 28 	November 2011. Ward Smith and Stephanie Hankey (Co-founders of TTC), 	Ayisha Abraham (Filmmaker, Srishti School of Art Design) and Zainab 	Bawa (Research Fellow, CIS) gave a lecture.&lt;/span&gt;&lt;a href="http://www.cis-india.org/internet-governance/events/droidcon-india"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/events/droidcon-india"&gt;&lt;span&gt;Droidcon 	India, first Android Conference in Bangalore&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, 	organised by CIS in collaboration with Droidcon.com, Bangalore 	Android User Group, MobileMonday Bangalore and Android Advices on 18 	and 19 November 2011 at the MLR Convention Centre, Bangalore.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 align="LEFT"&gt;Events Participated&lt;a href="http://www.cis-india.org/news/bio-diversity-informatics-workshop"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/bio-diversity-informatics-workshop"&gt;Western 	Ghats Portal: Workshop on Biodiversity Informatics&lt;/a&gt; organised by 	the Western Ghats Portal team at the Ashoka Trust for Research in 	Ecology and Environment, 25 November 2011. Sunil Abraham spoke in 	the session on Scientific Commons and Policy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/names-not-numbers"&gt;Names 	Not Numbers Mumbai&lt;/a&gt;, 	26 November 2011. Nishant Shah spoke in a panel on “The New 	Digital Individual: Is New Technology Liberating or Enslaving?”. 	The event was organised by Editorial Intelligence and partners which 	included the British Council and Financial Times, BBC World News, 	Mumbai first, Vodafone, Trident and Godrej India Cultural Lab.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 align="LEFT"&gt;Video&lt;a href="http://www.cis-india.org/events/facebook-resistance"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/events/facebook-resistance"&gt;Facebook Resistance Workshop at CIS&lt;/a&gt;&lt;span&gt;. This was a workshop for people to learn on how to think beyond the rules and limitations of Facebook, to tweak and play around the features and design to generate useful, creative, and funny concepts and explore how this creative intervention can be turned into a real software developed by the Facebook Resistance.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While  the potential for growth and returns exist for telecommunications in  India, a range of issues need to be addressed. One aspect is more  extensive rural coverage and the other is a countrywide access to  broadband which is low. Both require effective and efficient use of  networks and resources, including spectrum:&lt;/p&gt;
&lt;h3 align="LEFT"&gt;Article / Column&lt;a href="http://www.cis-india.org/telecom/telecom-path-breaker"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/telecom/telecom-path-breaker"&gt;Telecom 	Path-Breaker?&lt;/a&gt;&lt;br /&gt;Does the draft National Telecom Policy-2011 reflect true 	brilliance or smoke-and-mirrors? It will be a game-changer if a 	shared network is implemented effectively, writes Shyam Ponappa in 	this article published in the Business Standard on 3 November 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://cis-india.org/"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit our website &lt;a href="https://cis-india.org/"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="LEFT"&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/october-2011-bulletin'&gt;https://cis-india.org/about/newsletters/october-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-25T04:53:06Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2011-bulletin">
    <title>November 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/november-2011-bulletin</link>
    <description>
        &lt;b&gt;Welcome to the Centre for Internet and Society newsletter! In this issue we bring you the updates of our research, events, media coverage and videos of some past events organized by us during the month of November 2011.&lt;/b&gt;
        &lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives" class="external-link"&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3&gt;Key Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/digital-natives/front-page/blog/digital-natives-and-politics-in-asia" target="_blank"&gt;On Fooling Around: Digital      Natives and Politics in Asia&lt;/a&gt;&lt;br /&gt; by Nishant Shah, Director-Research&lt;br /&gt; Youths are not only actively participating in the politics of its times      but also changing the way in which we understand the political processes      of mobilisation, participation and transformation, writes Nishant. The      paper was presented at the Digital Cultures in Asia conference at the      Academia Sinica, Taipei, Taiwan.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Links in the Chain&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/digital-natives/volume-8-issue-4.pdf" target="_blank"&gt;Analog Relics in the Digital Age&lt;/a&gt;, volume 8, issue 4&lt;br /&gt; Guest Editor: Nilofar Ansher&lt;br /&gt; “The scale of inventions has not really leaped, so much as mutated. We had      Twitter and Facebook ... (remember notice boards, community centers and      pamphlets); they just weren’t so instant, hyperlinked and global in scale.      We still use the medium of a mouthpiece and speaker to talk to each other      long distance, the difference is in the changed aesthetics of the 21st      century – it’s all squarish curves and scratch-proof glass that are more      appealing today. Blackboards, writing material, listening devices and      memory aids have undergone unprecedented transformations of function and      usage, but it’s still about having a blank canvas to write upon with a      chalk, pen, paper or iClick”, writes Nilofar in this issue of the Digital      Natives newsletter.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Articles/Columns &lt;a href="http://www.cis-india.org/digital-natives/in-search-of-the-other-decoding-digital-natives" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/digital-natives/in-search-of-the-other-decoding-digital-natives" target="_blank"&gt;In Search of the Other: Decoding      Digital Natives&lt;/a&gt;: Nishant Shah charts      the trajectories of our research at the Centre for Internet and Society      (Bangalore, India) and Hivos (The Hague, The Netherlands) to see how      alternative models of understanding these relationships can be built. This      blog post by Nishant Shah was published in DML central on 24 October 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Staff Quoted in the Media &lt;a href="http://www.cis-india.org/news/write-stuff" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.cis-india.org/news/write-stuff" target="_blank"&gt;The Write Stuff&lt;/a&gt;,      Deccan Chronicle, 14 November 2011. Nishant Shah has been quoted in this      article.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h2&gt;&lt;b&gt;Pathways for Learning in Higher Education&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Pathways Project for Learning in Higher Education is a collaboration between the Higher Education Innovation and Research Applications (HEIRA) at the Centre for the Study of Culture and Society (CSCS) and the Centre for Internet and Society (CIS). The project is supported by the Ford Foundation and works with disadvantaged students in 9 undergraduate colleges in Maharashtra, Karnataka and Kerala, to explore relationships between Technologies, Higher Education and the new forms of social justice in India.&lt;/p&gt;
&lt;h3&gt;Article Published by the Media&lt;/h3&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/digital-natives/pathways/learn-it" target="_blank"&gt;Learn it Yourself&lt;/a&gt;: The peer-to-peer world of online learning encourages      conversations and reciprocal learning, writes Nishant Shah. The article      was published by the Indian Express on 30 October 2011.&lt;/p&gt;
&lt;h3&gt;Video of Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/digital-natives/pathways/mobility-shifts-2011" target="_blank"&gt;Mobility Shifts 2011 — An      International Future of Learning Summit&lt;/a&gt;:      The summit was organised by the New School and sponsored by MacArthur      Foundation and Mozilla. It was held from October 10 to October 16, 2011 at      the New School, New York City. Nishant Shah participated in the summit and      spoke on Digital Outcasts: Social Justice, Technology and Learning in      India. The video of the event is online.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility" class="external-link"&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Publication&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/accessibility/e-accessibility-handbook-in-russian" target="_blank"&gt;e-Accessibility Policy Handbook      for Persons with Disabilities&lt;/a&gt; (Russian Version) &lt;br /&gt; Edited by Nirmita Narasimhan&lt;br /&gt; The e-Accessibility Policy Handbook for Persons with Disabilities is now      available in Russian. The handbook is a joint publication of ITU, G3ict      and the Centre for Internet and Society, in cooperation with the Hans      Foundation. Dr. Hamadoun I. Toure, Secretary-General, International      Telecommunication Union wrote the preface. Dr. Sami Al-Basheer, Director,      ITU-D wrote the introduction and Axel Leblois, Executive Director, G3ict      wrote the foreword.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Post&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.cis-india.org/accessibility/accessible-banking" target="_blank"&gt;The case for Accessible Banking&lt;/a&gt; by Dinesh Kaushal.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/a2k" class="external-link"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to  consumers, developing countries, human rights, and creativity/innovation  from excessive regimes of copyright, patents, and other such  monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3&gt;Key Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/a2k/jesters-clowns-pranksters" target="_blank"&gt;Of Jesters, Clowns and      Pranksters: YouTube and the Condition of Collaborative Authorship&lt;/a&gt;&lt;br /&gt; by Nishant Shah, Director-Research,      Centre for Internet and Society&lt;br /&gt; The idea of a single author creating cinematic objects in a      well-controlled scheme of support system and production/distribution      infrastructure has been fundamentally challenged by the emergence of      digital video sharing sites like YouTube, writes Nishant Shah in this      essay published in the Journal of Moving Images.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Posts&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.cis-india.org/a2k/books-vs-cigarettes" target="_blank"&gt;CIS Hosts Scanned Version of George Orwell’s Books vs.      Cigarettes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Comments / Statement&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/a2k/blog/ace-7-future-work-cis-intervention" target="_blank"&gt;CIS Intervention on Future Work      of the WIPO Advisory Committee on Enforcement&lt;/a&gt;: The seventh      session of the World Intellectual Property Organization's Advisory      Committee on Enforcement (ACE) is being held in Geneva on November 30 and      December 1, 2011. Pranesh Prakash intervened during the discussion of      future work of the ACE with this comment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/a2k/blog/ace-7-french-charter-cis-comment" target="_blank"&gt;Comment by CIS at ACE on      Presentation on French Charter on the Fight against Cyber-Counterfeiting&lt;/a&gt;:      The seventh session of the World Intellectual Property Organization's      Advisory Committee on Enforcement is being held in Geneva on November 30      and December 1, 2011. Pranesh Prakash responded to a presentation by Prof.      Pierre Sirinelli of the École de droit de la Sorbonne, Université Paris 1      on 'The French Charter on the Fight against Cyber-Counterfeiting of      December 16, 2009' with this comment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/a2k/blog/sccr-23-broadcast-cis-statement" target="_blank"&gt;Statement of CIS on the WIPO      Broadcast Treaty at the 23rd SCCR&lt;/a&gt;: The twenty-third session of      the Standing Committee on Copyright and Related Rights is being held in      Geneva from November 22, 2011 to December 2, 2011. Pranesh Prakash      delivered this statement on a new proposal made by South Africa and Mexico      (SCCR/23/6) on a treaty for broadcasters.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/openness" class="external-link"&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing  regimes of intellectual property rights, and transparency and  accountability. Under this programme, we study Open Government Data,  Open Access to Scholarly Literature, Open Content, Open Standards, Open  Access to Law, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/openness/blog/know-your-users" target="_blank"&gt;Know Your Users, Match their      Needs!&lt;/a&gt;&lt;br /&gt; As Free Access to Law initiatives in the Global South enter into a new      stage of maturity, they must be certain not to lose sight of their users’      needs. This blog post gives a summary of the “Good Practices Handbook”, a      research output of the collaborative project Free Access to Law — Is it      Here to Stay? undertaken by LexUM (Canada) and the South African Legal      Institute in partnership with the Centre for Internet and Society. Rebecca      Schild and Prashant Iyengar from CIS were part of the research team.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/openness/events/open-access-to-academic-knowledge-at-the-iisc" target="_blank"&gt;Open Access to Academic Knowledge&lt;/a&gt;, organised by the Indian Institute of Science and CIS      at National Centre for Science Information, Indian Institute of Science,      Bangalore on 2 November 2011. Tom Dane participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/canadian-science-policy-conference" target="_blank"&gt;3rd Canadian Science Policy      Conference&lt;/a&gt;, organised by Canadian      Science Policy Conference from16 to 18 November 2011 at the Ottawa      Convention Centre. Sunil Abraham spoke in the session on Global      Implications of Open and Inclusive Innovation. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Announcement&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/announcement-of-wikimedia-india-program-trust" target="_blank"&gt;The Wikimedia India Program Trust&lt;/a&gt;.      A new entity, the “Wikimedia India Program Trust”, has been registered in      Delhi. Sunil Abraham is one of the trustees. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/internet-governance" class="external-link"&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various  social, technical, and political underpinnings of global and national  Internet governance, and includes online privacy, freedom of speech, and  Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;Comments / Submissions&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/comments-on-finance-committee-statements" target="_blank"&gt;CIS Comments on Finance      Committee Statements to Open Letters on Unique Identity&lt;/a&gt;: The Parliamentary Finance Committee responded to the      six open letters sent by CIS through an email on 12 October 2011. CIS has      commented on the points raised by the Committee. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/comments-national-policy-information-technology" target="_blank"&gt;Comments on the National Policy      of Information Technology&lt;/a&gt;: The NPIT      2011 has the laudable goal of making India a ‘knowledge economy with a      global role’ by developing and deploying ICT solutions in all sectors to      foster development within India and at a global level. CIS appreciates      this initiative of the Department of Information Technology and offers      brief comments to strengthen the draft. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/comments-draft-national-policy-on-electronics" target="_blank"&gt;CIS Comments on the Draft      National Policy on Electronics&lt;/a&gt;: CIS      submitted its comments to the request for comments put out by the      Department of Information Technology on its draft 'National Policy on      Electronics'.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Statement&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/blog/india-statement-un-cirp" target="_blank"&gt;India's Statement Proposing UN      Committee for Internet-Related Policy&lt;/a&gt;:      India made its statement at the 66th session of the United Nations General      Assembly, its proposal for the UN Committee for Internet-Related Policy      was presented.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Podcast&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/openness/professor-balaram-talks-open-access" target="_blank"&gt;Professor Balaram talks Open      Access&lt;/a&gt; : Tom Dane spoke with Professor P Balaram, Director of      the Indian Institute of Science about the Open Access movement. A podcast      of the interview is online.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/ijlt-cis-lecture-series-report" target="_blank"&gt;The 2nd IJLT-CIS Lecture Series      — A Post-event Report&lt;/a&gt; : The 2nd      IJLT-CIS Lecture Series was organised by the Indian Journal of Law and      Technology and CIS on the 21st and 22nd of May 2011 at the National Law      School of India University, Nagarbhavi, Bangalore. The main theme for this      year was Emerging Issues in Privacy Law: Law, Policy and Practice. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Essay in Peer Reviewed Journal&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/material-cyborgs-asserted-boundaries" target="_blank"&gt;Material Cyborgs; Asserted      Boundaries&lt;/a&gt; &lt;br /&gt; by Nishant Shah, Director-Research &lt;br /&gt; Nishant explores the possibility of formulating the cyborg as an author or      translator who is able to navigate between the different binaries of      ‘meat–machine’, ‘digital–physical’, and ‘body–self’, using the abilities      and the capabilities learnt in one system in an efficient and effective      understanding of the other. The essay was published in the European      Journal of English Studies, Volume 12, Issue 2.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Articles/Columns&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/what-is-dilligaf" target="_blank"&gt;What is Dilligaf?&lt;/a&gt; On the web, time moves at the speed of thought:      Groups emerge, proliferate and are abandoned as new trends and fads take      precedence. Nowhere else is this dramatic flux as apparent as in the      language that evolves online. While SMS lingo – like TTYL (Talk To You      Later) and LOL (Laughing Out Loud)– has endured and become a part of      everyday language, new forms of speech are taking over. This article by Nishant      Shah was published in GQ India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/book-of-jobs" target="_blank"&gt;The Book of Jobs&lt;/a&gt; The man who made the computer personal, who changed the face of the      digital media industry, who was inspired by Zen philosophy to create an      eight-billion-dollar empire, Steve Jobs, died last month. Just a few weeks      before his death, in the midst of his painful illness, he told Walter      Isaacson, the man chosen to write his authorised biography, “I really want      to believe that something survives”. And Isaacson wrote him a fairy tale      which will make sure that Jobs will be remembered beyond the gizmos and      gimmicks, writes Nishant Shah in this article published in the Indian      Express on 12 November 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Staff Quoted in the Media &lt;a href="http://www.cis-india.org/news/facebook-tracking-footprints" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/facebook-tracking-footprints" target="_blank"&gt;Is Facebook tracking your      virtual footprints?&lt;/a&gt; by Sheetal      Sukhija in MidDay, 22 November 2011. Sunil Abraham was quoted in this      article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/m-governance" target="_blank"&gt;M-governance gains momentum&lt;/a&gt; by Vasudha Venugopal in the Hindu, 20 November 2011.      Nishant Shah was quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/bill-could-kill-internet" target="_blank"&gt;SOPA: The bill that could kill      the Internet&lt;/a&gt; by Suw Charman-Anderson      in Firstpost.Technology, 16 November 2011.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.cis-india.org/news/broadband-long-way-to-go" target="_blank"&gt;Broadband user base still has a      long way to go&lt;/a&gt;, by Leslie D’Monte      &amp;amp; Deepti Chaudhary in Livemint, 15 November 2011. Sunil Abraham has      been quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/maids-guards-get-fingerprinted" target="_blank"&gt;‘Not mandatory’ but maids,      guards get fingerprinted&lt;/a&gt; by Hemanth      Kashyap in Bangalore Mirror, 9 November 2011. Sunil Abraham has been      quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/netizen-report" target="_blank"&gt;Netizen Report: Transparency Edition&lt;/a&gt; by Rebecca MacKinnon in Global Voices Online, 7      November 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/blocking-content-google-gets-more-requests" target="_blank"&gt;Blocking online content: Google      gets more requests than govt&lt;/a&gt; by      Pallavi Polanki in Firstpost.com, 2 November 2011. Pranesh Prakash has      been quoted in this article.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Posts &lt;a href="http://www.cis-india.org/internet-governance/sources-cis-funding" target="_blank"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/sources-cis-funding" target="_blank"&gt;Sources of CIS Funding&lt;/a&gt; by Pranesh Prakash on 9 November 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking" target="_blank"&gt;TRAI urged to take action      against P2P throttling and DNS hijacking&lt;/a&gt; by Anand on 9 November 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/art-activism" target="_blank"&gt;Exposing Data: Art Slash      Activism&lt;/a&gt; organised by Tactical Tech      and CIS at CIS office in Bangalore on 28 November 2011. Ward Smith and      Stephanie Hankey (Co-founders of TTC), Ayisha Abraham (Filmmaker, Srishti      School of Art Design) and Zainab Bawa (Research Fellow, CIS) gave a      lecture. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/events/droidcon-india" target="_blank"&gt;Droidcon India, first Android      Conference in Bangalore&lt;/a&gt;, organised by      CIS in collaboration with Droidcon.com, Bangalore Android User Group,      MobileMonday Bangalore and Android Advices on 18 and 19 November 2011 at      the MLR Convention Centre, Bangalore. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/bio-diversity-informatics-workshop" target="_blank"&gt;Western Ghats Portal: Workshop on      Biodiversity Informatics&lt;/a&gt; organised by the Western Ghats Portal      team at the Ashoka Trust for Research in Ecology and Environment, 25      November 2011. Sunil Abraham spoke in the session on Scientific Commons      and Policy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/news/names-not-numbers" target="_blank"&gt;Names Not Numbers Mumbai&lt;/a&gt;, 26 November 2011. Nishant Shah      spoke in a panel on “The New Digital Individual: Is New Technology      Liberating or Enslaving?”. The event was organised by Editorial      Intelligence and partners which included the British Council and Financial      Times, BBC World News, Mumbai first, Vodafone, Trident and Godrej India      Cultural Lab.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Upcoming Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/dialogue-cafe" target="_blank"&gt;Dialogue Cafe @ Centre for      Internet and Society&lt;/a&gt;, 2 December 2011, Centre for Internet      &amp;amp; Society, 4 p.m. to 6 p.m.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/high-level-privacy-conclave" target="_blank"&gt;The High Level Privacy Conclave&lt;/a&gt;,      3 February 2011, Paharpur Business Centre, Nehru Place Greens New Delhi, 4      p.m. to 6 p.m. This is a closed-door meeting. For participation, get in      touch with Elonnai (&lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/internet-governance/privacy-symposium" target="_blank"&gt;All India Privacy Symposium&lt;/a&gt;,      4 February 2011, India International Centre, New Delhi. This is a public      meeting. For participation, get in touch with Elonnai (&lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/events/facebook-resistance" target="_blank"&gt;Facebook Resistance Workshop at CIS&lt;/a&gt;. This was a workshop for people to learn on how to      think beyond the rules and limitations of Facebook, to tweak and play      around the features and design to generate useful, creative, and funny      concepts and explore how this creative intervention can be turned into a      real software developed by the Facebook Resistance. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom" class="external-link"&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications  in India, a range of issues need to be addressed. One aspect is more  extensive rural coverage and the other is a countrywide access to  broadband which is low. Both require effective and efficient use of  networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;Column&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cis-india.org/telecom/telecom-path-breaker" target="_blank"&gt;Telecom Path-Breaker?&lt;/a&gt; (by Shyam Ponappa): Does the draft National Telecom Policy-2011 reflect      true brilliance or smoke-and-mirrors? It will be a game-changer if a      shared network is implemented effectively, writes Shyam Ponappa in this      article published in the Business Standard on 3 November 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Follow CIS on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=457&amp;amp;qid=46981" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=458&amp;amp;qid=46981" target="_blank"&gt;Facebook&lt;/a&gt;\&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2011-bulletin'&gt;https://cis-india.org/about/newsletters/november-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-24T02:37:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2011-bulletin">
    <title>December 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2011-bulletin</link>
    <description>
        &lt;b&gt;Welcome to the newsletter issue of December 2011. This issue carries a special section on Freedom of Expression as there was much discussion regarding the Union Minister for Communications and Information Technology, Mr. Kapil Sibal’s proposal for pro-active censorship of social media.&lt;/b&gt;
        &lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives" class="external-link"&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS, India and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscapes of social change and political participation and the role that young people play through digital and internet technologies, in emerging information societies. The collaboration has produced &lt;a href="https://cis-india.org/digital-natives/front-page/blog/dnbook"&gt;a four book collective&lt;/a&gt; around ‘digital revolutions’ in a post Arab spring world, &lt;a href="https://cis-india.org/digital-natives/front-page/blog/position-papers"&gt;a position paper&lt;/a&gt;, &lt;a href="https://cis-india.org/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report"&gt;a scouting report&lt;/a&gt; and three international workshops in &lt;a href="https://cis-india.org/digital-natives/blog/talking-back"&gt;Taipei&lt;/a&gt;, &lt;a href="https://cis-india.org/digital-natives/blog/my-bubble-my-space-my-voice-workshop-perspective-and-future"&gt;Johannesburg&lt;/a&gt; and &lt;a href="https://cis-india.org/digital-natives/blog/santiago-workshop-an-after-thought"&gt;Santiago&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/the-digital-other"&gt;The Digital Other&lt;/a&gt;: Nishant Shah raises his concerns that increasingly, Digital Natives are acting as pure consumers of technology and gadgets, and seem willing to do so. The blog post was published in DML Central, 14 December 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3&gt;Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/digital-natives-contest"&gt;Digital Native Video Contest&lt;/a&gt;, jointly organised by CIS and Hivos. Submission guidelines and FAQs are online. Submit your proposal online by 26 January 2012.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/events/tweet-a-review"&gt;Digital AlterNatives Tweet-a-Review&lt;/a&gt;, 17 – 26 December 2011: 'Digital Natives with a Cause?' Project invites readers to review essays from the 'Digital AlterNatives with a Cause', a four-book collective published by Centre for Internet &amp;amp; Society and Hivos.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Book Reviews&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/unpacking-from-shiny-packaging"&gt;Unpacking Digital Natives from their Shiny Packaging&lt;/a&gt;: “The ‘Digital Natives’ concept is neither necessarily nor inherently positive, as YiPing Tsou highlights in her chapter Digital Natives in the Name of a Cause: From Flash Mob to "Human Flesh Search.” &lt;i&gt;—&lt;/i&gt; &lt;b&gt;Argyri Panezi&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/on-natives-and-norms"&gt;On Natives, Norms and Knowledge&lt;/a&gt;:&lt;i&gt; &lt;/i&gt;“It is a text I strongly recommend, especially to those interested in the reasons behind contemporary policies that try to regulate digital activism such as the US SOPA Act.” &lt;i&gt;— &lt;/i&gt;&lt;b&gt;Philip Ketzel&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/twin-manifestations"&gt;Digital Native: Twin Manifestations or Co-Located Hybrids&lt;/a&gt;: “Ben-David’s piece is a well-articulated and informed attempt to resolve two of the several conceptual fuzziness of the term Digital Native. She attempts this in a philosophical manner: trying to move away from the ontological who are Digital Natives? to an epistemological when and where are Digital Natives?”&lt;i&gt; &lt;/i&gt;&lt;i&gt;— &lt;/i&gt;&lt;b&gt;Samuel Tettner&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Pathways for Learning in Higher Education&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Pathways Project for Learning in Higher Education is a collaboration between the Higher Education Innovation and Research Applications (HEIRA) at the Centre for the Study of Culture and Society (CSCS) and the Centre for Internet and Society (CIS). The project is supported by the Ford Foundation and works with disadvantaged students in nine undergraduate colleges in Maharashtra, Karnataka and Kerala, to explore relationships between technologies, higher education and the new forms of social justice in India.&lt;/p&gt;
&lt;h3&gt;Workshop Report&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/pathways/facultyworkshop"&gt;The Digital Classroom: Social Justice and Pedagogy&lt;/a&gt;: Nishant Shah captures some of the questions that were thrown up and discussed at the 2 day Faculty Training workshop for participant from colleges included in the Pathways to Higher Education programme, supported by Ford Foundation and collaboratively executed by the Higher Education Innovation and Research Application and the Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Post &lt;a href="https://cis-india.org/digital-natives/pathways/blog/higher-education"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/pathways/blog/higher-education"&gt;Technology, Social Justice and Higher Education&lt;/a&gt; by Nishant Shah, 7 December 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt; &lt;/b&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/events/pathways-third-faculty-workshop"&gt;Pathways 3rd Faculty Workshop      &amp;amp; Regional Facilitators Meeting at CSCS&lt;/a&gt;, 8–10 December      2011, CSCS, Bangalore, Nishant Shah participated in the workshop&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility" class="external-link"&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies. So far we have organised Right to Read campaigns in the four metro cities of &lt;a href="https://cis-india.org/accessibility/blog/right-to-read-campaign-chennai"&gt;Chennai&lt;/a&gt;, &lt;span&gt;Kolkata&lt;/span&gt;, &lt;a href="https://cis-india.org/accessibility/blog/right-to-read-campaign"&gt;Delhi&lt;/a&gt; and &lt;a href="https://cis-india.org/accessibility/blog/mumbai-phase-of-right-to-read-campaign"&gt;Mumbai&lt;/a&gt;, made a &lt;a href="https://cis-india.org/accessibility/front-page/blog/comments-on-copyright-and-print%20impaired"&gt;submission to amend the Indian Copyright to the HRD Ministry&lt;/a&gt;, researched on &lt;a href="https://cis-india.org/accessibility/front-page/making-mobile-phones-accessible/making-phones-accessible.pdf"&gt;accessible mobile handsets in India&lt;/a&gt;, analysed the &lt;a href="https://cis-india.org/accessibility/blog/working-draft"&gt;Working Draft of the Rights of Persons with Disabilities Act&lt;/a&gt;, and published a &lt;a href="https://cis-india.org/accessibility/front-page/blog/e-accessibility-handbook"&gt;policy handbook on e-accessibility&lt;/a&gt; and a book on &lt;span&gt;&lt;a href="https://cis-india.org/universal-service-for-persons-with-disabilities"&gt;universal service for persons with disabilities&lt;/a&gt;&lt;/span&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;Publications&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/universal-service-for-persons-with-disabilities"&gt;Universal Service for Persons with Disabilities&lt;/a&gt;: Published by G3ict and CIS in cooperation with the Hans Foundation. The book is co-authored by Axel Leblois, Executive Director, G3ict, Deepti Bharthur and Nirmita Narasimhan.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/business-case-for-web-accessibility"&gt;The Business Case for Web Accessibility&lt;/a&gt;: NASSCOM Foundation has published a handbook on web accessibility titled “Understanding Web Accessibility — A Guide to Create Accessible Work Environments”. Nirmita Narasimhan authored a chapter “The Business Case for Web Accessibility”&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/accessibility-new-telecom-policy-2011"&gt;Accessibility in the New Telecom Policy 2011&lt;/a&gt;: CIS was part of the 27 organisations that responded to the call for comments on NTP 2011. The submission was made to the Department of Telecommunications, Ministry of Communications &amp;amp; Information Technology, Government of India on 9 December 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Interview&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/interview-with-nirmita"&gt;An Interview of Nirmita Narasimhan on ITU Portal&lt;/a&gt;: ITU Girls in ICT is now online! ITU interviewed Nirmita and published her profile on their website.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Award&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/nirmita-nivh-award"&gt;Nirmita receives NIVH Award&lt;/a&gt;: Nirmita Narasimhan received the NIVH Excellence Award from Justice AS Anand (retd), former chairman of the National Human Rights Commission, on International Day of Persons with Disabilities at the National Institute for the Visually Handicapped in Dehradun on Saturday, 3 December 2011. The Tribune covered the award ceremony and published this in their newspaper on 3 December 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/accessibility/itu-tutorial-delhi"&gt;ITU Meeting and Tutorial on Audiovisual Media Accessibility&lt;/a&gt;&lt;/span&gt;, organized by the International Telecommunication Union, India International Centre, 13 – 15 March 2012. CIS is hosting the workshop in collaboration with the ITU-APT Foundation. More information and registration are available at the &lt;span&gt;&lt;a href="http://www.itu.int/cgi-bin/htsh/edrs/ITU-T/studygroup/edrs.registration.form?_eventid=3000348"&gt;ITU website&lt;/a&gt;&lt;/span&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/a2k" class="external-link"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Access to Knowledge is a campaign to promote the fundamental principles of justice, freedom, and economic development. It deals with issues like copyrights, patents, and trademarks, which are an important part of the digital landscape. We prepared the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=960&amp;amp;qid=124241" target="_blank"&gt;India report for the CI IP Watchlist&lt;/a&gt;, made &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=961&amp;amp;qid=124241" target="_blank"&gt;submission to the HRD Ministry on WIPO Broadcast treaty&lt;/a&gt;, questioned the demonization of pirates, and advocated against laws (such as the PUPFIP Bill) that privatize public funded knowledge.&lt;/p&gt;
&lt;h3&gt;Comments&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/a2k/blog/ace-7-future-work-cis-intervention"&gt;CIS Intervention on Future Work of the WIPO Advisory Committee on Enforcement&lt;/a&gt;&lt;/span&gt;&lt;br /&gt; The seventh session of the World Intellectual Property Organization's Advisory Committee on Enforcement (ACE) was held in Geneva on 30 November and 1 December 2011. Pranesh Prakash participated in the event and made the intervention.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/ace-7-french-charter-cis-comment"&gt;Comment by CIS at ACE on Presentation on French Charter on the Fight against Cyber-Counterfeiting&lt;/a&gt;: Pranesh Prakash responded to a presentation by Prof. Pierre Sirinelli of the École de droit de la Sorbonne, Université Paris 1 on 'The French Charter on the Fight against Cyber-Counterfeiting of 16 December 2009 during the seventh session of the World Intellectual Property Organization's Advisory Committee on Enforcement (ACE) held in Geneva&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Post&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/books-vs-cigarettes"&gt;CIS Hosts Scanned Version of George Orwell’s Books vs. Cigarettes&lt;/a&gt;: Verbindingen/Jonctions (V/J), the bi-annual multidisciplinary festival organised by Constant took place on 1 December 2011. CIS hosted the scanned pages of the essay in public domain.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/openness" class="external-link"&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Innovation and creativity should be fostered through openness and collaboration. The advent of&lt;i&gt; &lt;/i&gt;Internet has radically defined what it means to be open and collaborative. The Internet itself is built upon open standards and free/libre/open source software. Our endeavour has resulted in a report on &lt;a href="https://cis-india.org/openness/front-page/blog/open-government-data-study"&gt;open government data&lt;/a&gt;, a report on &lt;a href="https://cis-india.org/openness/front-page/online-video-environment-in-india"&gt;online video environment in India&lt;/a&gt; and a &lt;a href="https://cis-india.org/openness/front-page/blog/people-are-knowledge"&gt;film on oral citations on the Wikipedia&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;Award&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/news/ept-award-for-open-access"&gt;Inaugural EPT Award for Open Access&lt;/a&gt;&lt;/span&gt;: The Electronic Publishing Trust for Development is pleased to announce the winners of a new annual award to be made to individuals working in developing countries who have made a significant personal contribution to advancing the cause of open access (OA) and the free exchange of research findings. The winner of the inaugural award is Dr Francis Jayakanth of the National Centre for Science Information, Indian Institute of Science, Bangalore, India&lt;i&gt;.&lt;/i&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/internet-governance" class="external-link"&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Tunis Agenda of the second World Summit on the Information Society has defined internet governance as the development and application by governments, the private sector and civil society, in their respective roles of shared principles, norms, rules, decision-making procedures and programmes that shape the evolution and use of the internet. CIS partnered with Privacy International and Society in Action Group which has produced outputs in &lt;a href="https://cis-india.org/internet-governance/front-page/blog/privacy/privacy-banking" target="_blank"&gt;banking&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/front-page/blog/privacy/privacy-telecommunications" target="_blank"&gt;telecommunications&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/front-page/blog/privacy/consumer-privacy?searchterm=Consumer+Privacy+++How+to+Enforce+an+Effective+Protective+Regime+" target="_blank"&gt;consumer rights&lt;/a&gt;,&lt;a href="https://cis-india.org/internet-governance/front-page/blog/privacy/privacy-media-law" target="_blank"&gt; media law&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/front-page/privacy-sexual-minorities" target="_blank"&gt;sexual minorities&lt;/a&gt;, etc., and submitted &lt;a href="https://cis-india.org/internet-governance" target="_blank"&gt;seven open letters&lt;/a&gt; to Parliamentary Finance Committee on UID covering several aspects, feedbacks on &lt;a href="https://cis-india.org/internet-governance/front-page/blog/cis-feedback-to-nia-bill" target="_blank"&gt;NIA Bill&lt;/a&gt;, and &lt;a href="https://cis-india.org/internet-governance" target="_blank"&gt;IT Rules&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;Peer Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/streaming-on-your-nearest-screen" target="_blank"&gt;Now Streaming on Your Nearest Screen&lt;/a&gt; by Nishant Shah, Journal of      Chinese Cinemas, Volume 3, Issue 1.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/internet-society-challenges-next-steps" target="_blank"&gt;Internet and Society in Asia: Challenges and Next Steps&lt;/a&gt; by Nishant Shah, Inter-Asia Cultural      Studies, Volume 11, Number 1.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/historian-wins-over-biographer" target="_blank"&gt;The Historian Wins Over the Biographer&lt;/a&gt;&lt;i&gt; “In Walter Isaacson's eponymous biography of Steve Jobs, the multibillion dollar man who is credited with single handedly changing the face of computing and the digital media industry, we face the dilemma of a biographer: how do you make sense of a history that is so new, it is still unfolding.” &lt;/i&gt;&lt;br /&gt;Nishant Shah's detailed review of Steve Jobs' biography was published in the Biblio Vol. XV Nos. 11 &amp;amp; 12, November- December 2011&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Newspaper / Magazine Articles&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/spy-in-web" target="_blank"&gt;Spy      in the Web&lt;/a&gt; The      government’s proposed pre-censorship rules undermine the intelligence of      an online user and endanger democracy, Nishant Shah, Indian Express, 18      December 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/what-is-dilligaf" target="_blank"&gt;What is Dilligaf?&lt;/a&gt; On      the web, time moves at the speed of thought: Groups emerge, proliferate      and are abandoned as new trends and fads take precedence. Nowhere else is      this dramatic flux as apparent as in the language that evolves online,      Nishant Shah, GQ India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/surrogate-futures-scattered-temporalities" target="_blank"&gt;Of Surrogate Futures and Scattered Temporalities&lt;/a&gt;:      Nishant Shah responds to Michael Edwards through this blog post published      in the Broker on 27 December 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Interview&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/interview-with-anne-cavoukian" target="_blank"&gt;An Interview with Dr. Ann Cavoukian&lt;/a&gt;: Elonnai Hickok      interviews Dr. Ann Cavoukian, Information and Privacy Commissioner,      Ontario, Canada&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/when-digital-spills-into-physical" target="_blank"&gt;When the      digital spills into the physical&lt;/a&gt;: Nishant Shah tells us why      flash mobs are an interesting sign of our times, and not just a passing      fad. MidDay published this interview in their newspaper on 18 December      2011&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/phishing-attacks-on-rise" target="_blank"&gt;Phishing      Attacks on the Rise&lt;/a&gt;: Sunil Abraham was on the TV Channel News 9      on 2 December 2011 speaking about two visual cues to distinguish between      the fake and the real websites&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/web-censorship" target="_blank"&gt;India’s      dreams of web censorship&lt;/a&gt;, Financial Time's beyondbrics, 6      December 2011, Sunil Abraham was quoted in this post&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/did-he-didnt-he" target="_blank"&gt;Did He, Didn’t He&lt;/a&gt; by Rahul Bhatia, Open Magazine      (issue: 7-14 December 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/much-at-stake-for-tech-sector" target="_blank"&gt;Much at      stake for tech sector in UID project&lt;/a&gt; by Pranav Nambiar, Economic      Times, 12 December 2011. Sunil Abraham was quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/red-herring" target="_blank"&gt;On the net, red herring&lt;/a&gt; by Javed Anwer, The Times of      India, 4 December 2011. Sunil Abraham was quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/twitter-facebook-lead-in-blogosphere" target="_blank"&gt;Twitter,      Facebook take the lead in blogosphere as blog searches fall by half&lt;/a&gt; by Ameya Chumbhale, Economic      Times, 17 November 2011. Pranesh Prakash was quoted in this article&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/art-slash-activism" target="_blank"&gt;Exposing Data: Art Slash Activism &lt;/a&gt;organised      by Tactical Tech and CIS in Bangalore on 28 November 2011. Zainab Bawa,      Ayisha Abraham, Ward Smith and Marek Tuszinsky gave a talk. Videos of the      event are now online&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/right-to-privacy-bill-conference" target="_blank"&gt;Privacy Matters — Analyzing the "Right to Privacy Bill"&lt;/a&gt;:      Privacy India in partnership with International Development Research      Centre, Canada, Indian Institute of Technology, Bombay, the Godrej Culture      Lab, Tata Institute of Social Sciences, Mumbai and the Centre for Internet      and Society, Bangalore is organising "Privacy Matters", a public      conference at IIT, Bombay on 21 January 2012&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-privacy-conclave" target="_blank"&gt;The High Level Privacy Conclave&lt;/a&gt;: Privacy India in      partnership with the International Development Research Centre, Canada,      Society in Action Group, Gurgaon and Privacy International, UK is      organizing the High Level Privacy Conclave at the Paharpur Business      Centre, Nehru Place Greens in New Delhi on Friday, 3 February 2012&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-symposium" target="_blank"&gt;All India Privacy Symposium&lt;/a&gt;&lt;span&gt;:&lt;/span&gt; Privacy India in      partnership with the International Development Research Centre, Canada,      Society in Action Group, Gurgaon, Privacy International, UK and      Commonwealth Human Rights Initiative is organizing the All India Privacy      Symposium at the India International Centre, New Delhi on Saturday, 4      February 2012&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/dialogue-cafe" target="_blank"&gt;Dialogue Cafe @ Centre for Internet and Society&lt;/a&gt;, 2 Dec      2011, Kavita Philip gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Special Section on Freedom of Expression&lt;/b&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;We usually cover Freedom of Expression under Internet Governance. However, this month there has been much discussion regarding the Union Minister for Communications and Information Technology, Mr. Kapil Sibal’s proposal for pro-active censorship of social media. This special section covers reportage and original content from CIS&lt;i&gt;:&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;Newspaper / Magazine Articles&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/invisible-censorship" target="_blank"&gt;Invisible Censorship: How the Government Censors Without Being Seen&lt;/a&gt; by Pranesh Prakash: The Indian      government wants to censor the Internet without being seen to be censoring      the Internet. The article was translated into Marathi and featured in      Lokmat, 18 December 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/us-clampdown" target="_blank"&gt;US Clampdown Worse than the Great Firewall&lt;/a&gt; by Sunil Abraham: If you thought      China’s Internet censorship was evil, think again. American moves to clean      up the Web could hurt global surfers. Sunil Abraham wrote this article in      Tehelka, Volume 8, Issue 50, 17 December 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/unkindest-cut-mr-sibal" target="_blank"&gt;That’s the Unkindest Cut, Mr. Sibal&lt;/a&gt; by Sunil Abraham: There’s      Kolaveri-di on the Internet over Kapil Sibal’s diktat to social media      sites to prescreen users’ posts. That diktat goes far beyond the      restrictions placed on our freedom of expression by the IT Act. But, says      Sunil Abraham of the Centre for Internet and Society, India is not going      to be silenced online. Deccan Chronicle, 11 December 2011&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Posts&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/online-pre-censorship-harmful-impractical" target="_blank"&gt;Online Pre-Censorship is Harmful and Impractical&lt;/a&gt; by Pranesh Prakash: The Union      Minister for Communications and Information Technology, Mr. Kapil Sibal      wants Internet intermediaries to pre-censor content uploaded by their      users. Pranesh Prakash takes issue with this and explains why this is a      problem, even if the government's heart is in the right place.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/press-coverage-online-censorship" target="_blank"&gt;Press Coverage of Online Censorship Row&lt;/a&gt;: We are      maintaining a rolling blog with press references to the row created by the      proposal by the Union Minister for Communications and Information      Technology to pre-screen user-generated Internet content.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Radio Broadcast&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Social media sites refuse      Indian censorship request: Sunil Abraham spoke to Radio Australia. Follow      the broadcast &lt;a href="https://cis-india.org/news/social-media-sites-refuse-indian-censorship" target="_blank"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3&gt;Live Chat&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ibn-live-chat-with-pranesh" target="_blank"&gt;Is      the govt bid to regulate content on the Internet a good thing?&lt;/a&gt;:      Pranesh Prakash answered questions freedom of expression vis-a-vis      objectionable content live on CNN-IBN's chat feature, 7 December 2011&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/caught-in-web" target="_blank"&gt;Caught      in the Web&lt;/a&gt;: &lt;i&gt;“As it is the status of      freedom of speech in India is in a bad shape. Sibal's new rules will only      make it worse.”— &lt;/i&gt;&lt;b&gt;Sunil      Abraham in Hindu Business Line&lt;/b&gt;, 13 December 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/online-gag" target="_blank"&gt;Online gag: Existing rules give      little freedom&lt;/a&gt;: &lt;i&gt;“Our criticism is of the      policy and not of the websites and Internet entities that are forced to      err on the side of caution when faced by such notices.” — &lt;/i&gt;&lt;b&gt;Sunil Abraham in the Times of      India&lt;/b&gt;&lt;i&gt;,&lt;/i&gt; 9 December 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/facebook-google-tell-india-they-won2019t-screen-for-derogatory-content" target="_blank"&gt;Facebook, Google tell India they won’t screen for derogatory      content&lt;/a&gt;: &lt;i&gt;“Researchers sent mock      take-down notices to seven sites, complaining about their content... six      sites immediately deleted content. They did not even verify the validity      of our flawed complaint. They over-complied.” — &lt;/i&gt;&lt;b&gt;Sunil Abraham in Washington Post&lt;/b&gt;,      6 December 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/any-normal-human-being-would-be-offended" target="_blank"&gt;‘Any Normal Human Being Would Be Offended’&lt;/a&gt;: &lt;i&gt;“&lt;/i&gt;&lt;i&gt;Indian law seems to state that it has global jurisdiction but that      is not really true. An Indian court might give an order that is      unenforceable in the United States or anywhere else.” — &lt;/i&gt;&lt;b&gt;Sunil Abraham in the New York      Times&lt;/b&gt;, 6 December 2011&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/it-inc-oppose-sibals-firewall-proposal" target="_blank"&gt;IT Inc oppose Sibal’s ‘great’ firewall proposal&lt;/a&gt;: &lt;i&gt;“You wouldn’t want to end up with a situation where you are denied      access to, say, the website of the University of Sussex because the      address contains the word ‘sex’.” — &lt;/i&gt;&lt;b&gt;Nishant Shah in Indian Express&lt;/b&gt;,      7 December 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/online-at-india" target="_blank"&gt;Online      @ India&lt;/a&gt;: &lt;i&gt;“I haven't yet heard of      anybody in India going on a rampage because somebody in Pakistan started      an 'India hate' page.” — &lt;/i&gt;&lt;b&gt;Nishant Shah in the Hindustan Times&lt;/b&gt;,      10 December 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/private-censorship-making-online-content-disappear-quietly" target="_blank"&gt;How ‘private-censorship’ is making online content disappear,      quietly&lt;/a&gt;: &lt;i&gt;“Google’s self-reported      compliance rate of 51 per cent shows that they are probably over-stepping      the law in order to appease the Indian government’s requests.” — &lt;/i&gt;&lt;b&gt;Pranesh Prakash in FirstPost&lt;/b&gt;,      15 December 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/chilling-it-act" target="_blank"&gt;Kapil Sibal to sterilise Net but      undercover sting shows 6 of 7 websites already trigger-happy to censor      under ‘chilling’ IT Act&lt;/a&gt;, Legally India, 7 December 2011. Sunil      Abraham was quoted in this blog post.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/2018chilling2019-impact-of-india2019s-april-internet-rules" target="_blank"&gt;‘Chilling’      Impact of India’s April Internet Rules&lt;/a&gt; by Heather Simmons, New York      Times, 7 December 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/scrub-the-internet-clean" target="_blank"&gt;Govt wants to scrub the Internet      clean&lt;/a&gt;, Livemint, 7 December 2011. Sunil Abraham was quoted in      this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/techies-angered-over-censorship" target="_blank"&gt;India's      Techies Angered Over Internet Censorship Plan&lt;/a&gt;, NPR, 20 December      2011. Pranesh Prakash was quoted in this blog post.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-social-media-access-should-not-be-blocked-ban" target="_blank"&gt;Internet,      social media access should not be blocked: Ban&lt;/a&gt;, Oman Tribune,      10 December 2011. Sunil Abraham was quoted in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/minority-report-age" target="_blank"&gt;India entering the Minority      Report age?&lt;/a&gt;, ioL scietech. Sunil Abraham was quoted in this.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/internautas-indios-se-oponen" target="_blank"&gt;Los      internautas indios se oponen a la censura a través de la Red&lt;/a&gt;,      Diario de Navarra, 7 December 2011. Sunil Abraham was quoted in the      Spanish newspaper.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/technological-beasts-impossible-to-control" target="_blank"&gt;Technological      beasts like Facebook, Orkut, YouTube &amp;amp; Google impossible to control&lt;/a&gt; by Sunanda Poduwal &amp;amp; Kamya      Jaiswal, Economic Times, 11 December 2011. Sunil Abraham was quoted in the      article.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/google-vs-kapil" target="_blank"&gt;Google V/s Kapil Sibal&lt;/a&gt; by Sundeep Dougal in Outlook, 8      December 2011. Pranesh Prakash's work at CIS has been extensively quoted      in this blog post.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/india-bid-to-censor-net-draws-flak" target="_blank"&gt;India bid      to censor Internet draws flak&lt;/a&gt; Phil      Hazlewood spoke to Sunil Abraham and published this article for AFP.      France 24, Khaleej Times, Physorg.com, TimesLive, Bangkok Post, Yahoo      News, MSN News, Emirates 24/7, Business Live and Jakarta Globe also      carried the news on their websites, 9 December 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;Videos&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/internet-censorship" target="_blank"&gt;Censorship      — A Death Knell for Freedom of Expression Online&lt;/a&gt;: On 8 December      2011&lt;i&gt;, &lt;/i&gt;NDTV aired an interesting discussion on internet censorship.      Shashi Tharoor, Soli Sorabjee, Shekhar Kapoor, Ken Ghosh and Sunil Abraham      participated in this discussion with NDTV's Sonia Singh&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/censor-social-networking-sites" target="_blank"&gt;FTN: Should social networking      sites be censored?&lt;/a&gt;: Telecom Minister Kapil Sibal met the      representatives of Facebook, Google and others seeking to device a      screening mechanism. Sunil Abraham was on CNN-IBN from 10.00 p.m. to 10.30      p.m. speaking about freedom of expression in India&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/online-content-row" target="_blank"&gt;Debate: Online content row-1&lt;/a&gt;:      Sunil Abraham was on Times Now from 9.05 p.m.      to 9.45 p.m. on 6 December 2011 speaking about freedom of expression in      India&lt;i&gt;.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt; &lt;/b&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/free-speech-online-in-india-under-attack" target="_blank"&gt;Free Speech Online in India under Attack? A Panel Discussion&lt;/a&gt;,      21 December 2011. Achal Prabhala, Anja Kovacs, Lawrence Liang and Sunil      Abraham gave lectures&lt;i&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom" class="external-link"&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. In this connection, Shyam Ponappa continues to write his monthly column for the Business Standard.&lt;/p&gt;
&lt;h3&gt;Newspaper Article&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/healing-self-inflicted-wounds" target="_blank"&gt;Healing self-inflicted wounds&lt;/a&gt; by Shyam Ponappa, Business      Standard, 1 December 2011: A spate of dysfunctional actions and retrograde developments has led to an      unimaginable mess for India. Can the damage to growth prospects be undone?      Does it need to be? If so, how?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=457&amp;amp;qid=46981" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=458&amp;amp;qid=46981" target="_blank"&gt;Facebook&lt;/a&gt;\&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2011-bulletin'&gt;https://cis-india.org/about/newsletters/december-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-23T08:35:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/kids-on-facebook">
    <title>The kids are all on Facebook</title>
    <link>https://cis-india.org/news/kids-on-facebook</link>
    <description>
        &lt;b&gt;In one photo, Prerna stands in front of the mirror, back slightly arched, a fringe covering her left eye, one hand on her hip, pursing her lips. The other hand holds the camera in a steadfast grip. Below this picture are almost a hundred likes and comments. There is nothing unusual as such about this photo on Facebook. Prerna, however, is just 11.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Shikha Kumar was published in &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report_the-kids-are-all-on-facebook_1712078"&gt;Daily News &amp;amp; Analysis&lt;/a&gt; on July 8, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Stop looking so pretty" and "OMG! You’re so thin" are some of the comments that appear under the picture of this young girl.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another picture, Diksha’s wavy hair cascades around her face as she fixes the camera with an unwavering stare. The caption reads — "I love my hair. I know I sound like a conceited bitch." Diksha is 12.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Children like Prerna and Diksha, who are under the age of 13, are officially not allowed to open accounts on Facebook. But they are among the 7.5 million under-13 users of the popular social networking website, according to a study released by Consumer Reports last year. The study further revealed that among such users, 5 million were under the age of 10. Closer home, a McAfee-Synovate survey conducted across various cities in India revealed that 64% kids in the age group of 9-12 are members of social networking sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You may find the trend daunting since ‘kids’ are supposed to step out and socialise, rather than chat online. However, it’s a reality that we have no choice but to accept as a modern reality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internally, Facebook seems to have accepted the trend. As revealed by a news reports last month, the company is readying a technology that will allow children younger than 13 to open accounts and operate them in a secure manner. Possible approaches include connecting the children’s Facebook accounts with their parents’, and giving parents the control over who befriends their children on the website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The New ways of being in touch with ‘friends’&lt;/b&gt;&lt;br /&gt; The move has once again put the spotlight on the ways in which social networking is changing the way children interact with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Namrata Bhoomkar, 13, logs on to the website at least two to three times a day. "I check my news feeds and see what my friends are up to. If you’re not on Facebook, you can’t be updated with what’s happening with everybody," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from finding out what their friends are up to, kids also spend a lot of time sharing their pictures, and are proficient at photo editing software like Photoshop, Picasa and Photobooth to make their pictures more striking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another way of standing out is to give pictures creative captions. "I google random quotes on love and life and then put those up as captions on the pictures. I get a lot of likes for it, which makes me feel nice," says 13-year old Sakshi Shrivastav.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Having No clue about privacy settings&lt;/b&gt;&lt;br /&gt; However, while the kids use many of Facebook’s features, few are aware of the risks or the privacy settings available on the website that can protect them. In the McAfee-Synovate survey, 32% of the kids were not aware of any online threats, such as cyber hacking, stalking, bullying and identity thefts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result, lessons are often learnt the hard way. "A 39-year-old man started sending me messages saying that I’m very pretty. My father found out and told me to disable my account. I was very upset since all my friends are on Facebook. So finally, my sister helped me activate my privacy settings," says an underage girl on the condition of anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anandita Mishra, a security expert at McAfee Cybermum India, says that she does not advocate kids’ presence on Facebook. "There are several dangers; there might be paedophiles lurking, strangers pretending to be younger or your child may be a victim of online abusing or bullying," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the new timeline format, even though one’s account is protected, the cover pictures are always visible to everybody. In such cases, Mishra recommends either keeping no cover photo or keeping pictures of favourite cartoon characters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the face of so many risks, some experts believe that Facebook’s move to officially allow younger kids under some form of parental supervision is a step in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Children’s interaction online should always be under parental supervision. Censorship and control is not the responsibility of the government, but of parents," points out Sunil Abraham, director, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham believes that if this technology comes into force, children will consume content more responsibly. This will also give them the chance to go out in the real world and get some real communication experience, the old-fashioned way.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"They will even behave responsibly. If the account is supervised, they are less likely to engage in bullying, abusing, sexting or any other unacceptable forms of social behaviour," he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While she is not totally in favour of this development, McAfee’s Mishra sees no other way because parents are unable to control their children. "Seven million kids are online with or without parental supervision. You cannot have cyber policing of children. It is important to inculcate the right values about responsible internet usage," she says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/kids-on-facebook'&gt;https://cis-india.org/news/kids-on-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-20T06:24:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/a-net-of-hatred">
    <title>A Net of Hatred</title>
    <link>https://cis-india.org/news/a-net-of-hatred</link>
    <description>
        &lt;b&gt;Citizens worlwide have been resisiting the threat of internet censorship that governments seek to impose — and justifiably so. But while we have seen democratic revolutions such as the Arab Spring emerge from the power of the net, it is increasingly becoming clear to even the most ardent defender 
&lt;/b&gt;
        &lt;p&gt;This article by Samar Khurshid was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/technology/SocialMedia-Updates/A-net-of-hatred/SP-Article1-889152.aspx"&gt;Hindustan Times&lt;/a&gt; on July 14, 2012. Pranesh Prakash is quoted in it.&lt;/p&gt;
&lt;h3&gt;The Problem&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the internet, anyone can say anything and largely get away with it, making it a near-perfect means for fanatics. India, in particular, with its religious diversity and history of communal tension, constantly struggles with this issue. Earlier this week, the phrase ‘Internet Hindus’ was trending on popular social media website, Twitter, brought to the fore by a discussion about online religious fundamentalism on Al Jazeera, a news network based in Qatar. The panelists sought to put in context the largely vocal community of internet users who support right-wing Hindu ideology. These ‘Internet Hindus’ have become synonymous with an "abusive, vocal, uncouth group of people who subscribe to Hindu nationalism," said one panellist. The tribe of ‘Twitter jihadis’ is now responding with equal fervour with mostly anonymous fundamentalists who are vocal with their message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The problem," says Pranesh Prakash, programme manager at the Bangalore-based Centre for Internet and Society (CIS), "is that internet conversations become extreme. Liberals don’t get embroiled in heated arguments while fundamentalists, dedicated to extreme ideologies, tend to win out." Web censorship, he adds, is in vain as the net is too vast to control.&lt;br /&gt;&lt;br /&gt;Online fanaticism is not limited to Hindus. For long, extremist Islamic groups have taken their jihad on to the world wide web. Of late, jihadist groups have mushroomed on social media to expand their base of support. The trend was observed by BBC Islamic Groups Analyst, Murad Batal al-Shishani, on Twitter. Even the recent arrest of Lashkar-e-Toiba’s handler of the 26/11 Mumbai terror attacks, Syed Zabiuddin Ansari alias Abu Jundal, was possible after he was tracked on Facebook trying to recruit young Muslims for 'the cause'. The Afghanistani Taliban, in fact, has its own news website with a running Twitter feed. The site offers the ‘voice of jihad’ with events propagandised from the Taliban perspective – American and Afghan soldiers are referred to as puppets, minions, cowards and even terrorists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic groups, however, are not a major cause of concern for India, according to Prasanto K Roy, a tech analyst and social media commentator. "Jihadist groups are a relatively small minority in India. But right wing Hindu groups have majority support."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The greatest issue, says CIS’s Prakash, is that these fundamentalists are increasingly well-organised and make great efforts to build a stronger extremist position. They are encouraged, he says, by the likes of Janata Party president Subramanian Swamy, who believes that minorities in India should only be given political rights after they acknowledge their Hindu ancestry; Francois Gautier, a French-Indian writer and journalist who supports the cause of Hindutva; and Zakir Naik, a Mumbai-born Islamic televangelist whose controversial opinions often attracts criticism. Prakash also says that on the net, "Many people are not only manufacturing opinion but also manufacturing facts as the basis of that opinion. These falsities are fuelling Right-wing anger."&lt;/p&gt;
&lt;h3&gt;The Solution&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments are hard pressed to effectively censor and discourage otherwise reprehensible dialogue. The UPA attempted to tackle what they see as ‘objectionable content’. In December 2011, based on a petition, the government prosecuted internet giants like Yahoo, Google, Twitter and Facebook for hosting offensive material.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legally, various sections of the Indian penal code, notably 153A – promoting enmity between communities – can be applied in cases of hate speech. But online speech falls short of being prosecutable, says sociologist Dipankar Gupta. "Something can only be (considered) hate speech if it directly incites people or results in violence, like statements made by Varun Gandhi in the 2009 Lok Sabha elections. Online fundamentalist speech does not cross the boundaries of the law. And we cannot prosecute someone for their opinion."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When a Twitter post asked the question whether certain people could be violating section 153A, the response was far from reasonable, or even civil. One person wrote, "We p*ss on you and your secular section." Another urged others to report the user to Twitter as spam and have him blocked. And of course all this comes with the barrage of by now infamous Twitter terms like 'sickular', 'pseudo secular' or 'Congress Dirty Tricks Department'. They have thousands of followers, even their own websites and are extremely organised.&lt;br /&gt;&lt;br /&gt;"The larger question is whether we should tackle this legally or develop other methods," says Siddharth Narayan, a lawyer with the Alternative Law Forum. "Hate-speech laws have been misused in the past. We don’t need a clampdown on internet freedom. We just need a more nuanced application of existing legislation," he says.&lt;br /&gt;&lt;br /&gt;When looking at net-speak, it is tough to distinguish between generic statements of hate and a genuine call to violence. The internet has no intermediaries; no editors to censure your posts. Then perhaps it bodes ill for India’s secular democracy, and for secularism in the world at large, that uncurbed dialogue, which seeks to crystallise hate between communities, is spreading like an epidemic. CIS’s Prakash says the government cannot cope with this. “But we as society should be strong enough to respond, even if we disagree."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/a-net-of-hatred'&gt;https://cis-india.org/news/a-net-of-hatred&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-20T06:09:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy">
    <title>Fifth Meeting of the two Sub-Groups on Privacy Issues under the Chairmanship of Justice AP Shah</title>
    <link>https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy</link>
    <description>
        &lt;b&gt;The fifth meeting of the two sub-groups on privacy issues will be held on July 22, 2012 under the chairmanship of Justice AP Shah, former chief justice of Delhi High Court.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The next meeting of the two Sub-Groups (5th Meeting) on privacy issues under the Chairmanship of Justice A.P. Shah, former Chief Justice of Delhi High Court is scheduled to be held on July 22, 2012 at 11.00 a.m. This was announced vide notice No. M-13040/47/2011-CIT&amp;amp;I, dated the 10th June, 2012.&lt;/p&gt;
&lt;p&gt;A copy of the notice was sent to the following individuals:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Justice AP Shah, Chairman&lt;/li&gt;
&lt;li&gt;Dr. Kamlesh Bajaj&lt;/li&gt;
&lt;li&gt;Usha Ramanathan&lt;/li&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;li&gt;Prashant Reddy&lt;/li&gt;
&lt;li&gt;Prof. Arghya Sengupta&lt;/li&gt;
&lt;li&gt;Shri Som Mittal&lt;/li&gt;
&lt;li&gt;Shri Gulshan Rai&lt;/li&gt;
&lt;li&gt;Mala Dutt&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy'&gt;https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Meeting</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-07T10:11:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet">
    <title>Session M4 – International Public Policy and Internet Governance Issues Pertaining to the Internet</title>
    <link>https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet</link>
    <description>
        &lt;b&gt;The Asia Pacific Regional Internet Governance Forum 2012 is being organised at Aoyama Campus, Aoyama Gakuin University in Tokyo on July 20, 2012. Sunil Abraham will be speaking in the session on international public policy and internet governance issues pertaining to the internet. The event is organised by APrIGF.Asia&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Internet is a vital strategic communications infrastructure for the Asia Pacific region, and so the future evolution of the Internet is a hugely important policy issue for individuals, business and government alike across the region. The region is the most  diverse and dynamic in the world and the formulation of a unified and coherent regional view on such an important policy issue is very challenging.  With internet governance becoming increasingly important, efforts are underway by some countries in Asia Pacific and elsewhere to change the nature of internet governance; moving from a relatively open multi-stakeholder model to a more closed, government led system of governance. What is the best evolution Internet governance path for Internet users of Asia Pacific to follow?  This workshop will discuss the competing paths currently under discussion and seek to offer delegates a comprehensive understanding of the issues.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Panel&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Moderator &lt;/b&gt;– Mr. Jeremy Malcolm, Consumers International&lt;/p&gt;
&lt;h3&gt;Speakers&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Hasanul Aaq Inu,  &lt;i&gt;Member, Bangladesh National Parliament; Chairman, Parliamentary Standing Committee for Ministry of Posts and Telecommunications&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Atsushi Umino, &lt;i&gt;Director for International Policy Coordination, Global ICT Strategy Bureau (MIC)&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Sunil Abraham, &lt;i&gt;Centre for Internet &amp;amp; Society, India&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;David Farrar, &lt;i&gt;Director of Curia Market Research&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Naoya Bessho, &lt;i&gt;General Counsel, Chief Compliance Officer, Yahoo Japan Corporation&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;William Drake, &lt;i&gt;International Fellow &amp;amp; Lecturer, Media Change &amp;amp; Innovation Division, IPMZ, University of Zurich, Switzerland&lt;/i&gt;&lt;/li&gt;
&lt;hr /&gt;
&lt;/ul&gt;
&lt;p&gt;For the full agenda, &lt;a class="external-link" href="http://2012.rigf.asia/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet/"&gt;click here&lt;br /&gt;Click&lt;/a&gt; to read the original&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet'&gt;https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-19T05:59:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton">
    <title>Open letter to Hillary Clinton on Internet Freedom</title>
    <link>https://cis-india.org/internet-governance/open-letter-to-hillary-clinton</link>
    <description>
        &lt;b&gt;Last month I wrote an open letter to Hillary Clinton. It was based on a presentation I that I made during a panel discussion at a Google sponsored conference titled Internet at Liberty 2012 in Washington DC on May 24, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham's article was &lt;a class="external-link" href="http://thinkingaloud.in/ArticleComments.aspx?ArtId=1097"&gt;published&lt;/a&gt; in Thinking Aloud on July 17, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The question that my panel tried to grapple with was "In a world where nearly nine out of ten Internet users are not American, what is the responsibility of United States institutions in promoting internet freedom?" My co-panelists were Cynthia Wong who is with the Centre for Democracy and Technology, Mohamed El Dahshan a writer and journalist, Dunja Mijatovic the OSCE Representative on Freedom of the Media.&lt;br /&gt;&lt;br /&gt;Internet freedom is a curious subject. It is a technology specific liberty - for a moment consider television freedom. The US has more Muslims than India has Christians. But Indian television in the average hotel comes in hundreds and there are at least 3 channels of Christian preaching. But US television in hotels is usually less than 50 channels with no channels of Islamic preaching. In fact even the reception of secular channels from the Islamic World like Al Jazeera is still difficult in America. Can we accuse the US of not having television freedom since their television features Christian evangelists but not Muslim evangelists? Should it be part of India's foreign policy to evangelize television freedom given that there is a large domestic industry with clear international potential?&lt;br /&gt;&lt;br /&gt;In an ideal world - citizens will possess technology-neutral freedom to communication and expression. But nothing can be farther from the truth. Communication technologies are regulated using a plethora of policies and practices and very often these have a chilling effect on freedoms.&lt;br /&gt;&lt;br /&gt;The following is my response to the technology-specific demands for deregulation from the US Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Text of the Open Letter[2]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise Access to Knowledge (A2K) as pre-condition for freedom of expression&lt;/b&gt;: There is no difference between aggressive enforcement of imbalanced and obsolete intellectual property laws and censorship. The need of the moment is not more enforcement to protect obsolete business models against the everyday practices of ordinary netizens but rather the reform of intellectual property law (levies, broader exceptions and limitations, pools, statutory and compulsory licenses, prizes etc.) to keep pace with innovations in technology and the production of knowledge and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise privacy as pre-condition for security:&lt;/b&gt; The alleged tension between privacy and security is a false dichotomy. Blanket surveillance by design compromises security. &lt;b&gt;Surveillance is like salt in cooking — essential in very small quantities but dangerous even if slightly in excess. Blanket surveillance technologies are only going make things easier for — and will only serve as targets for — current and future online villains.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't lose the moral high-ground:&lt;/b&gt; Remember, with great power comes great responsibility. Other countries are waiting to cherry pick from your worst practices. Also don't use trade agreements to selectively export components of US policy without the accompanying safeguards for civil liberties and rights. Citizens in oppressive and authoritarian states are depending on the US government, courts and civil society to protect their rights online. Don't undermine their capacity to shame their governments by holding up the US as the example of 'how to get things right'. They urgently need the US government to lead by example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise that freedom of expression has become a trade issue:&lt;/b&gt; This is unfortunate but this is true — thanks to the precedent set by the developed world when it came to asymmetric trade negotiations. Just as the US is interested in protecting the interests of its corporations in global markets — other governments are keen protect the interests of their own corporations. The optimal solution in this case is where all countries and corporations are equally unsatisfied. This will remain a continuing discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Address developing country anxieties around critical internet infrastructure:&lt;/b&gt; Security by obscurity will no longer do — security by transparency through open standards, technologies and governance is the only way to fears and build a trust-worthy and secure Internet for all of us. For example, there is urgent need to develop standards for supply chain audits of information infrastructure. The US has dealt with the fear of back doors by banning the use of hardware and software from countries it does not trust. The developing world is not sure if there are back-doors in hardware and software manufactured by US corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Time has comes to address this and other related anxieties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Appreciate diversity in nomenclature:&lt;/b&gt; 'Freedom' and 'liberty' may be appropriate terms to use in the United States of America. But openness may be more in countries that are not yet full and robust liberal democracies. The Internet Governance Forum for example uses 'openness' instead of 'freedom'. Openness is also preferred because it includes 'freedom of expression', 'freedom of information' (also known as right to information, access to information or public and 'free knowledge' (free software, open standards, open content, open access, open data, open educational resources, etc.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't be too instrumental in your interventions:&lt;/b&gt; Don't undermine the local credibility of like-minded civil society, think-tanks and research organisations by being too directive in your support. Managerialism will undermine reform of policies and practices in information societies and so does inappropriate/premature monitoring and evaluation (for example, looking for explicit attribution in terms of casual connections between your actions and outcomes). There is a need to support greater reflexivity in the global information society by developing institutional capacity in developing countries through unrestricted funding. True critical thinking is the foundation of both scientific progress and open societies. Go out of your way to find and support those who disagree with you. Protect the plural foundation of our networked society!&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker along with Cynthia Wong, Mohamed El Dahshan and Dunja Mijatovic in Plenary IV Debate 3 at the &lt;b&gt;Internet at Liberty 2012 &lt;/b&gt;event&lt;b&gt; &lt;/b&gt;organised by Google on May 24, 2012. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/9YMte4hdYu0" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=9YMte4hdYu0"&gt;View the video on YouTube&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/open-letter-to-hillary-clinton'&gt;https://cis-india.org/internet-governance/open-letter-to-hillary-clinton&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-09-04T08:28:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules">
    <title>Constitutional Analysis of the Information Technology (Intermediaries' Guidelines) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules</link>
    <description>
        &lt;b&gt;Ujwala Uppaluri provides a constitutional analysis of the Information Technology (Intermediaries' Guidelines) Rules notified in April 2011, and examines its compatibility with Articles 14, 19, 21 of the Constitution of India.&lt;/b&gt;
        &lt;h2&gt;Summary of Salient Provisions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;Information Technology (Intermediaries’ Guidelines) Rules, 2011&lt;/b&gt; (‘&lt;b&gt;the Intermediary Guidelines&lt;/b&gt;’)&lt;b&gt; &lt;/b&gt; were notified in April, 2011 as rules enacted in exercise of powers conferred under section 87(2)(zg) read with Section 79 of the Information Technology Act, 2000 (as amended) (‘&lt;b&gt;the IT Act&lt;/b&gt;’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 2 of the Intermediary Guidelines imports definitions for key terms from the IT Act. Notably, this includes an importation of Section 2 (w) by &lt;b&gt;Rule 2 (i)&lt;/b&gt;, which defines “intermediary” broadly in the following terms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt; “intermediary”, with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes;&lt;/i&gt;”&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 whose margin note indicates that it is limited to due diligence measures to be adhered to by intermediaries nevertheless also raises other liabilities by creating a regime to censor content, pre-publication as well as once content has been made publically available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (2) of Rule 3&lt;/b&gt; inventories the classes of content which are deemed actionable, with only clause (i), clause (c), clause (e) and, arguably clause (h), of that rule addressing the national interest, public order and security restrictions cognizable under Article 19(2) of the Constitution. The remainder of grounds includes private claims such as content which “belongs to another person”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;, or otherwise infringes proprietary rights&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;, or is “defamatory”&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;. Still others are terminologically indeterminate and purely subjective, with the terms “grossly harmful”, “harassing” and “disparaging” being examples.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule also includes a number of redundancies. While there is reference to libelous as well as defamatory content in clause (b), it is well established that Indian law does not admit of the former concept, instead dissolving the common law distinction between the two to treat them alike.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; There is also clause (e), which prohibits content which is all ready illegal for violating the provisions of an existing statute and the residuary phrasing of the clause (b)’s reference to content which is “otherwise unlawful in any manner whatever”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sub-rules immediately following the list in Rule 3(2) address the consequences of users publishing content listed in that rule:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (3) of rule 3&lt;/b&gt; provides that intermediaries will not knowingly deal in any manner whatsoever, whether by hosting, publication, transmission or otherwise, with any content of the types that are listed in the previous clause.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (4) of rule 3&lt;/b&gt; creates a complaints mechanism in respect of content incompatible with Rule 3 (2) by requiring intermediaries to disable access to offending content within 36 hours of obtaining knowledge themselves or on being brought to “actual knowledge” by an “affected person”. The Intermediaries Guidelines do nothing to clarify what would amount to “actual knowledge”, to indicate in unambiguous terms, which parties would have sufficient &lt;i&gt;locus&lt;/i&gt; to bring complaints in order to be deemed an “affected person” for the purposes of these provisions or to suggest that there is a procedure or timeline for action by the intermediary, such that requirements such notice to the author of the content and time for the preparation of a defence by the author and/or the intermediary are accounted for.  Rule 3 (4) also requires that all information which is taken down be preserved, along with “associated records” for a duration of atleast ninety days for investigative purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (5) of rule 3 &lt;/b&gt;mandates that intermediaries inform users that non-compliance with the Intermediary Guidelines, &lt;i&gt;inter alia&lt;/i&gt;, is a ground for the exercise of their right to terminate access or usage rights and remove non-compliant content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, &lt;b&gt;sub-rule (11) of rule 3 &lt;/b&gt;requires intermediaries to name Grievance Officers to receive complaints on any matters relating to the computer resources made available by the intermediary, including for non-compliance or harm in terms of Rule 3 (2). This officer is bound to respond to the complaint within one month from the date of receipt of the complaint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the result, the Intermediary Guidelines create a two-track system by which private censorship is legitimized online. In the first place, intermediaries can take down content on their own motion where they are of the opinion that the content falls under any of the grounds enumerated in Rule 3 (2) or, alternatively, do so in response to a complaint, in terms of Rule 3 (4).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the provisions relating to censorship, the Intermediary Guidelines also provide for information to be given over to government agencies making a request with lawful authority and in writing under &lt;b&gt;sub-rule (7) of rule 3&lt;/b&gt;, for data protection measures in accordance with the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Information) Rules, 2011 notified under Section 43A of the IT Act to be adhered to (&lt;b&gt;sub-rule (8) of rule 3&lt;/b&gt;) and for intermediaries to report and share information realting to cyber security with CERT-In (&lt;b&gt;sub-rule (9) of rule 3&lt;/b&gt;).&lt;/p&gt;
&lt;h2&gt;Areas of Infirmity&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is doubtful whether the Intermediary Guidelines could pass constitutional muster, on several grounds:&lt;/p&gt;
&lt;h3&gt;Compatibility with Article 19 (1) (a) and (2)&lt;/h3&gt;
&lt;p&gt;&lt;i&gt;(a) Applicability of Article 19 (2) to Rule 3 (2) Grounds&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Romesh Thappar v. State of Madras&lt;/i&gt;&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; the Supreme Court held that the freedom of speech and expression under Article 19(1)(a) includes the freedom to propogate and disseminate ideas. It also held that very narrow and stringent limits govern the permissibility of legislative abridgment of the right of free speech. Ordinarily, any abridgement of free speech by means of censorship must be compatible with one or more of the grounds provided for under Article 19 (2), and the Supreme Court held in &lt;i&gt;Express Newspapers (Private) Ltd. v. Union of India&lt;/i&gt;&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;that limitations on the exercise of the Article 19(1)(a) right which do not fall within Article 19(2) cannot be upheld.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the right to free speech applies across all media, and the internet is no exception. In &lt;i&gt;Secretary, Ministry of Information and Broadcasting v. Cricket Association of Bengal&lt;/i&gt;&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;, the Supreme Court reflected the understanding that where media are different, such that the treatment accorded to them must be different in accordance with that indicia of difference, it will treat them as such in order to uphold fundamental rights. More specifically, in &lt;i&gt;Ajay Goswami v. Union of India&lt;/i&gt;&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, the Supreme Court opined (in &lt;i&gt;obiter&lt;/i&gt;) that the internet, as a unique medium of expression, deserved a different standard of protection than other mediums that have preceded it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 (2) of the Intermediary Guidelines, which lists the grounds for censorship, is not complaint with Article 19 (2) for two reasons:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, many of the grounds mentioned have no constitutional basis whatsoever. Rule 3 (2) prohibits, &lt;i&gt;inter alia&lt;/i&gt;, content which “grossly harmful”, “harassing”, “invasive of another’s privacy”, “hateful”, “disparaging”, “grossly offensive” or “menacing”, in addition to content which is simply illegal, and should be actionable &lt;i&gt;ex post&lt;/i&gt; rather than prohibited &lt;i&gt;ex ante &lt;/i&gt;(content infringing intellectual property under Rule 3 (2) (d), for example). Most of the terms employed are not legal standards, but merely subjective indicators of personal sensitivities, while still others though legal do not figure in Article 19 (2). Since the whole scheme of the Intermediary Guidelines is premised on these extra-constitutional grounds, they are, as a whole, subject to being to being struck down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the restriction is unreasonable because instead of preserving rights online in accordance with &lt;i&gt;Ajay Goswami&lt;/i&gt;, the Intermediary Guidelines unjustifiably abridge the right to speak and receive information on the internet. The Intermediary Guidelines overreach in their scope, by including as actionable content which is not itself punishable when communicated via any other medium. For example, disparaging speech, as long as it is not defamatory, is not criminalised in India, and cannot be because the Constitution does not allow for it. Similarly, content about gambling in print is not unlawful, but now all Internet intermediaries are required to remove any content that promotes gambling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) Nature of Censorship: Directness of Censorship and Legitimacy of Private and Prior Censorship&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In judging whether a statute is constitutional, the effect that the statute will have on the fundamental rights of citizens must be examined. The Supreme Court held in &lt;i&gt;Bennett Coleman &amp;amp; Co. v. Union of India&lt;/i&gt;&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; that the test was to examine whether the &lt;i&gt;effect&lt;/i&gt; of an impugned action was to abridge a fundamental right, notwithstanding its object.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, while it is true in light of the Supreme Court’s holdings in &lt;i&gt;Prakash Jha Productions v. Union of India&lt;/i&gt;&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;that pre-censorship is permissible within the Indian constitutional scheme, this permissibility is qualified. Prior censorship may be undertaken only within closely regulated circumstances, such as under the grounds in the Cinematograph Act, 1952, and even then, only by an appropriately empowered governmental entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines create mechanisms for the abridgement of the freedom of speech which amount to indirect and unjustifiable prior censorship, contrary to Article 19 (2):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Firstly&lt;/i&gt;, while the state does not itself censor under these rules, it has empowered private, commercial entities to do so &lt;i&gt;vide &lt;/i&gt;the Intermediary Guidelines. These rules thus transfer the executive power of censorship to private intermediaries. This amounts to an indirect form of censorship for the purposes of the &lt;i&gt;Bennett Coleman &lt;/i&gt;test and has the result of increased censorship on the Internet because the state granted legislative sanction to such a system, although it does not censor by itself or through a state agency. The Intermediary Guidelines, and specifically Rule 3 (4) read with Rule 3 (2), place a burden on intermediaries to decide on the lawfulness of content as a pre-condition for their statutory exemption from liability. An intermediary, on receiving a complaint, to ensure that it continues to receive the protection offered by Section 79 of the IT Act, will be forced to disable access to the content posted by a user. Thus, the direct effect of the rules will be strict censoring of content posted on-line by users. The rules will have a direct effect on the fundamental right of freedom of speech and expression guaranteed under Article 19(1) of the Constitution unreasonable restrictions on fundamental rights, that are imposed by a statute or executive orders are liable to be struck down as unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Secondly&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;while prior censorship is permissible only in a strictly limited range of cases, the Intermediary Guidelines allow for an unrestrained and unlimited degree of prior and arguably invisible censorship. Rule 3 of the Intermediary Guidelines clearly envisages such a system of prior censorship. Whereas the consequences for passively displaying content incompatible with Rule 3(2) would be a complete waiver and dissolution of the Section 79 immunity that would ordinary accrue to neutral intermediaries, intermediaries or complainants have no obligation in respect of ensuring the tenability of complaints and the grounds cited in them. The Intermediary Guidelines do not draw a distinction between arbitrary actions of an intermediary and take-downs subsequent to a request. Further, the inclusion of a residuary clause in Rule 3 (2) (b) allowing pre-censorship of content which is “unlawful in any manner whatever”, also indicates that the Intermediary Guidelines allow the use of the exceptional instrument of not only allows private censorship, but that they actively encourage it as the default rule rather than the exception without any justification whatsoever.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(c)&lt;/i&gt;&lt;i&gt; Vagueness and Overbreadth: Possibility for Over-Censorship&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vagueness in the terms of a restriction to free speech is grounds for it to be struck down, even where the ground is apparently broadly constitutional. The Supreme Court held in &lt;i&gt;Sakal Papers (P) Ltd. v. Union of India&lt;/i&gt;&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; that the Constitution must be interpreted in order to enable citizens to enjoy their rights to fullest measure, subject to limited permissible restrictions. In &lt;i&gt;Romesh Thapar&lt;/i&gt;&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;the Supreme Court also held that a legislation authorizing the imposition of restrictions on free speech in language wide enough to cover restrictions which are permissible as well as extra-constitutional will be held to be wholly unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The grounds listed in Rule 3 (2) of the Intermediary Guidelines are highly subjective, private interest grounds which are not defined either in the Intermediary Guidelines or in the IT Act itself. These include terms such as “grossly harmful”, “harassing”, “invasive of another’s privacy”, “hateful”, “disparaging”, “grossly offensive” or “menacing”. Consequently, the Intermediary Guidelines constitute unreasonable restrictions on freedom of speech, with Rule 3 (2) containing vague terms which, in addition to falling beyond the purview of Article 19(2), cover only private and subjective grounds, incapable of objective definition or application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Intermediary Guidelines do no precisely define the term “affected person” employed in Rule 3 (4). Thus, complaints from &lt;i&gt;any&lt;/i&gt; party, including those uninvolved or unaffected by content must all be complied with, without qualification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the result, the vagueness of the grounds in Rule 3 (2) and the diffuse terminology of “affected person” leaves Rule 3 (2) grounds serving as placeholders for whatever claim a complainant, having no &lt;i&gt;locus&lt;/i&gt; whatsoever, chooses to bring, without regard for whether it is constitutional or even legal. Online content is thus treated as presumptively illegal and take down of content as the presumptive course of action. Additionally, there is a further consequence to the vagueness and overbreadth of the terms in Rule 3 (2): because of the indeterminacy in the grounds listed thereunder, intermediaries tasked with enforcing the law will tend to err on the side of caution and censor, rather than keep speech accessible online. There is empirical evidence to show that cautious intermediaries will over-censor and over comply with complaints in order to avoid liability under Section 79 of the IT Act.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(d) Contravention of International Human Rights Norms &amp;amp; Horizontal Application&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The censorship regime constructed by the Intermediary Guidelines is non-compliant not only with domestic requirements under the Constitution, but also with India’s obligations under international human rights law under Articles 19 of the Universal Declaration of Human Rights (‘&lt;b&gt;UDHR&lt;/b&gt;’) and the International Covenant on Civil and Political Rights (‘&lt;b&gt;ICCPR&lt;/b&gt;’), under the UN Human Rights Council’s  Report of the Special Rapporteur Frank La Rue on the Promotion and Protection of the Right to Freedom of Opinion and Expression (2011)&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;(‘&lt;b&gt;Special Rapporteur’s Report&lt;/b&gt;’) and the UN Human Rights Council Resolution on Internet Freedom (2012)&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; (‘&lt;b&gt;UN Internet Freedom Resolution&lt;/b&gt;’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the ICCPR as well as the UDHR guarantee a right to free speech “through any…media of…choice” in their respective Articles 19, the Special Rapporteur’s Report and the UN Internet Freedom Resolution recognize the need for special efforts to be undertaken by states to preserve free speech on the internet. The former document justifies censorship only in the most limited circumstances and makes specific mention of the commercial interests that may be implicated in delivering free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the Intermediary Guidelines,  the Indian state creates a system by which the right to free speech can be systematically violated by private and undisclosed entities and even empowers them to do so, without imposing any constitutional safeguards whatsoever. Thus, egregious violations of the right to free speech and expression are a direct and inevitable consequence of the Intermediary Guidelines. To the degree that the Indian Supreme Court has enagaged with free speech online, it appears from &lt;i&gt;Ajay Goswami &lt;/i&gt;that it would apply standards consistent with international law obligations to rectify the Intermediary Guidelines to meet them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Indian Supreme Court has held, where necessary for their true enjoyement, that fundamental rights may involve a degree of horizontality in their application. In other words, private action could be guided by fundamental rights, such as in &lt;i&gt;Vishaka v. State of Rajasthan&lt;/i&gt;&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; which evidences the Supreme Court’s willingness to hold that private entities could be held to constitutional and international human rights law standards where that is necessary for the real rather than illusory enjoyment of fundamental rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result, the Intermediary Guidelines are also liable to be struck down for their failure to recognize and account for the role of private interests while empowering them with the right to curtail fundamental rights.&lt;/p&gt;
&lt;h3&gt;Compatibility with Article 21&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; (a) Adverse Impact on Privacy (and consequently on Free Speech)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A constitutional right to privacy has been read into Article 21’s guarantee of life and personal liberty in several instances by the Supreme Court. The State is consequently under an obligation to refrain from interfering, whether by itself or through any of its agencies, with private lives and spaces. By the same coin, laws which encourage unwarranted state or societal intrusions into private life will contravene the victim’s Article 21 right. In &lt;i&gt;People’s Union for Civil Liberties v. Union of India&lt;/i&gt;,&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; the Supreme Court held that Article 21 privacy protected individuals against the interception and monitoring of private communications by the state in the absence of sufficient safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, an individual’s privacy interests in information relating to him are not dissolved merely because information is not confidential or because another entity has some property interest in that information. In &lt;i&gt;District Registrar and Collector, Hyderabad v. Canara Bank&lt;/i&gt;&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;, the Supreme Court recognized that even where the search of private documents was concerned, Article 21 protected “persons not places”, &lt;i&gt;i.e.&lt;/i&gt;, that the privacy interest did not vest in property or communications but, rather, in the rightsholder himself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines include no limits whatsoever on the scope of disclosures that government agencies can demand or expect to retain, in contravention of Article 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, Rule 3 (4), which requires data retention for a statutory minimum of ninety days of content taken down as well as “associated records”, violates users’ rights to privacy. In addition to the financial and technical burden (in storing and securing data) imposed by the Intermediary Guidelines in requiring potentially unlimited data retention by intermediaries, there is no clarity as to what or how much information precisely must be held in the form of “associated records”. Instead of subjecting data to limited and closely qualified retention by private intermediaries, and thus limiting the impairment of the fundamental right to privacy to the minimum possible degree necessary, Rule 3 (4) imposes blanket data retention requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Rule 3 (7), which makes any information held by an intermediary subject to being disclosed to the government upon request is also inconsistent with the requirement that the right to life and personal liberty be violated only in accordance with fair, just and reasonable procedures. Notwithstanding that Rule 3 (7) is consistent with Section 67C of the IT Act and specific rules framed in regard to the surveillance of communications, it is also unconstitutional because it fails to include any safeguards whatsoever in the process of surveillance. These would include, as minimum obligatory conditions in light of &lt;i&gt;PUCL&lt;/i&gt;, the requirement that the surveilled be informed of the surveillance and be allowed to challenge its propriety &lt;i&gt;ex ante &lt;/i&gt;or its procedural regularity &lt;i&gt;ex post&lt;/i&gt;, or atleast administrative or judicial review &lt;i&gt;ex parte&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b)  Non-compliance with Due Process and Natural Justice Requirements&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 21 explicitly includes a due process guarantee. This means that the right to life and personal liberty, and its constituent rights, can be interfered with only through constitutionally consistent procedures. A cornerstone of fair procedure, compliant with the rule of law, is the notion of natural justice. Consequently, Article 21 contemplates that the procedure by which fundamental rights are curtailed will satisfy natural justice principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Maneka Gandhi v. Union of India&lt;/i&gt;,&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; the Supreme Court held that natural justice was not a rigid or mechanical term, but one that referred to those practices and principles that would ensure&lt;i&gt; &lt;/i&gt;“fair play in action”&lt;i&gt;.&lt;/i&gt; In addition the Court held that all deviations&lt;i&gt; &lt;/i&gt;from natural justice requirements must be supported by a sufficiently justificatory “compelling state interest”. Specifically, in &lt;i&gt;Union&lt;/i&gt; &lt;i&gt;of&lt;/i&gt; &lt;i&gt;India&lt;/i&gt; &lt;i&gt;v.&lt;/i&gt; &lt;i&gt;Tulsiram&lt;/i&gt; &lt;i&gt;Patel&lt;/i&gt;&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;, the Supreme Court held that the principle of natural justice required the satisfaction of the &lt;i&gt;audi alteram partem&lt;/i&gt; rule, which consisted of several requirements, including the requirement that a person against whose detriment an action is taken be informed of the case against him and be afforded a full and fair opportunity to respond.  Finally, in &lt;i&gt;M.C. Mehta v. Union of India&lt;/i&gt;&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; the Supreme Court held that the absence of due notice and a reasonable opportunity to respond would vitiate any holding to the rightsholder’s detriment. &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines fail to satisfy the requirement of natural justice, and particularly the rights to prior notice as well as that of the affected party to a hearing:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By requiring that content be taken down swiftly (within 36 hours of complaint, under Rule 3 (4)) and by failing to require the author of the content to be informed of the complaint and its contents, the Intermediary Guidelines violate the author’s right to notice and consequently affect his/her right to prepare and present a defence at all. In practice, authors of content which is the subject of a complaint may never know of the complaint or even of the fact of the take down, given the absence of any mechanism under the rules by which they could have been informed. In a scheme for silent, invisible censorship, authors are never afforded an opportunity to challenge the take down, just as they have no opportunity to rebut the initial complaint. In addition, at any event, it is the intermediary, a biased private entity whose immunity under Section 79 of the IT Act could be called into question based on the outcome, who must make the determination as to the legality of the content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is nothing to prohibit intermediaries from informing authors on the receipt of a complaint, the limited time within which action must be taken means that such intermediaries would risk liability for non-compliance with the compliant and a waiver of their Section 79 immunity, where the content is not taken down, whether because communication does not occur within the 36 hour timeframe or because an author elects to resist takedown. By creating a system in which takedowns necessarily occur in response to complaints, irrespective of their legitimacy, the Intermediary Guidelines presume and rule in favour of the complainants and in favour of (private) censorship instead of presuming in favour of the preservation of the fundamental right to free speech, or even maintaining neutrality between the two ends.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Compatibility with Article 14&lt;/h3&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The guarantee of “equal protection of laws” requires equality of treatment of persons who are similarly situated, without discrimination &lt;i&gt;inter se&lt;/i&gt;. It is a corollary that that persons differently situated cannot be treated alike. &lt;i&gt;In&lt;/i&gt;&lt;i&gt; E.&lt;/i&gt;&lt;i&gt; P.&lt;/i&gt;&lt;i&gt; Royappa&lt;/i&gt;&lt;i&gt; v. State&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Tamil&lt;/i&gt;&lt;i&gt; Nadu&lt;/i&gt;&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;i&gt; the&lt;/i&gt;&lt;i&gt; Supreme&lt;/i&gt;&lt;i&gt; Court&lt;/i&gt;&lt;i&gt; held&lt;/i&gt;&lt;i&gt; that arbitrary or unfair actions necessarily run counter to Article 14. The Supreme Court explained in M/S&lt;/i&gt;&lt;i&gt; Sharma&lt;/i&gt;&lt;i&gt; Transport&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; Government&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Andhra Pradesh&lt;/i&gt;&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;i&gt; that&lt;/i&gt; arbitrary actions are actions which are unreasonable, non-rational done capriciously or without adequate determining principle, reason or in accordance with due judgment. In addition, Article 14 also requires that state action be reasonable. I&lt;i&gt;n&lt;/i&gt;&lt;i&gt; Mahesh&lt;/i&gt;&lt;i&gt; Chandra&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; Regional&lt;/i&gt;&lt;i&gt; Manager,&lt;/i&gt;&lt;i&gt; U.P.&lt;/i&gt;&lt;i&gt; Financial&lt;/i&gt;&lt;i&gt; Corporation&lt;/i&gt;&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt;&lt;i&gt; it was held that discretion must be exercised objectively, and that what is not fair or just will be unreasonable, and subject to being struck down as unconstitutional.&lt;/i&gt;Additionally, Article 14 also requires that the basis upon which classifications are undertaken for the purposes of same or differential treatment be reasoned and fair. The Supreme Court held in &lt;i&gt;Sube Singh v. State of Haryana&lt;/i&gt;&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; that the state’s failure to support a classification on the touchstone of reasonability, with the existence of intelligible differentia or the rational basis of achieving a stated object, will be ground for it to be held arbitrary and unreasonable. Finally, all state action having the potential to curtail Article 14 must be reasonable, justifiable, undertaken in &lt;i&gt;exercise of &lt;/i&gt;constitutional powers and be informed and guided by public interest. The Supreme Court held to this effect i&lt;i&gt;n&lt;/i&gt;&lt;i&gt; Kasturi&lt;/i&gt;&lt;i&gt; Lal&lt;/i&gt;&lt;i&gt; Lakshmi&lt;/i&gt;&lt;i&gt; Reddy&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; State&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Jammu&lt;/i&gt;&lt;i&gt; and&lt;/i&gt;&lt;i&gt; Kashmir&lt;/i&gt;&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines contravene Article 14 on the following grounds:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, intermediaries who are not similarly situated are treated alike. Rule 2 (i) imports the IT Act’s omnibus definition of the term “intermediary”, such that all classes of intermediaries, ranging from intermediaries which control the architecture of the internet and the hardware  which enables it to run (such as ISPs and DNS providers) to intermediaries that enable content creation, sharing and communications online (such as email clients, content aggregators, social networking services and content hosts), are empowered to censor and are required to comply with complaints regarding content. Intermediaries, for the purposes of the IT Act and the Intermediary Guidelines, thus refer to a large and disparate group of providers of services enabling access to as well as use of the Internet. Reasoned state action must recognize that their liabilities must necessarily vary with the specific type of service that each provides. The Intermediary Guidelines fail to do so, and are consequently incompatible with Article 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the Intermediary Guidelines treat the same or similar content across media differently, without apparent justification. More specifically, users of the internet are unfairly discriminated against. All of the Rule 3 (2) grounds which are not explicitly mentioned in Article 19 (2) in particular reflect this discriminatory, unreasoned treatment. To illustrate, the prohibition under Rule 3 (2) on the display of any content online when it relates to gambling treats speakers using the internet differently from speakers communicating this content via any other medium of communication. Given that nothing in the nature of the medium itself attaches a new or different character to the content, criminality or liability must attach to such content in a medium-neutral fashion. So, while content qualifying as seditious under law remains so across media, whether it be print, audio or video broadcast or online, the same as not the case for communications on the internet. In other words, while gambling itself may be prohibited under law, speech or expression involving it is nowhere prohibited under law. While such content is legal and protected across print and broadcasting media, the same content is liable to take down online. This would amount to discriminatory treatment of equal content &lt;i&gt;merely&lt;/i&gt; because speakers choose the internet, and the speech occurred online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, the Intermediary Guidelines accord unrestrained discretion in the curtailment of fundamental rights to &lt;i&gt;private &lt;/i&gt;functionaries, without any guidance whatsoever. This should have been the sole reserve of the state. In addition to the lack of guidance, the breadth of the grounds for censorship in Rule 3 (2), some of which are&lt;i&gt; themselves incapable of precise and non-subjective application&lt;/i&gt;, means that private censorship can occur to an arguably unlimited degree. Expecting compliance with such terms, and attaching liability (for intermediaries) or a curtailment of fundamental rights (for generators of content), without the provision of a right to challenge or even, more fundamentally, be informed is both unreasonable and arbitrary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Rules 3 (4) and 3 (5) empower intermediaries to take down content without providing any realistic opportunity of hearing to its author. Intermediaries are accorded an adjudicatory role to the intermediary in deciding questions whether or not authors can access their fundamental right to free speech in the process. This role is ordinarily reserved for competent courts or administrative authorities, which are subject to constitutional checks and balances and a general obligation to preserve and promote fundamental rights. Assigning such functions to a self-interested private entity without any accountability whatsoever is both unreasonable as well as arbitrary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Finally&lt;/i&gt;, the Intermediary Guidelines fail to account for the public interest because they directly restrict the public’s freedom of speech and expression, without any justifiable reason, and privilege the personal and not necessarily constitutional sensitivities of private complainants instead. Rule 3(3) in effect vests an extraordinary power of censorship in intermediaries, entities which operate on the basis of private interest and outside the limits of administrative or even the most basic human rights control. Safeguards must apply to power-bearers to the degree and in the manner required in relation to the nature of the power, rather than its holder, if fundamental rights are to be legislatively preserved. While the Supreme Court in &lt;i&gt;A.K. Kraipak v. Union of India&lt;/i&gt;&lt;a href="#_ftn27"&gt;[27]&lt;/a&gt; extended the applicability of natural justice principles from judicial bodies alone and quasi-judicial bodies to administrative bodies as well, the applicability of such principles still remains limited to state entities. In other words, there is an acknowledged difficulty in applying public law standards to private, commercial entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines thus vest the right to abridge core fundamental rights (under Articles 14, 19 and 21) in private delegates operating outside public law controls that constrain the scope in which the power can be exercised and ensure that citizen interest can be preserved. In the alternative, they also failed to provide for other safeguards to prevent abuse to the detriment of fundamental rights private delegates of governmental power, even as they granted such powers in unlimited terms. As a result, the Intermediary Guidelines evidence thoughtless, arbitrary, unreasoned and unjust state action.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Vires vis á vis the Parent Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While it is permissible within the constitutional scheme for legislative functions of the Parliament to be delegated to a degree, they may be struck down on several grounds. In general, per &lt;i&gt;Indian&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Express&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Newspapers&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;(Bombay)&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Pvt.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ltd.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Union&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;of&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;India&lt;/i&gt;&lt;a href="#_ftn28"&gt;,[28]&lt;/a&gt; subordinate legislation can be challenged not only on any of grounds on which the parent legislation is vulnerable to challenge, but also on the grounds that it does not conform to parent statute, that it is contrary to other statutes or that it is unreasonable, in the sense that it is manifestly arbitrary. Notably, the Court also held here that subordinate legislation is liable to being struck down where it fails to conform to constitutional requirements, or, specifically that “it offends Article 14 or Article 19 (1) (a) of the Constitution”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is a well-accepted proposition that delegated legislation which travels outside the scope of its enabling law will not stand as valid. It was held in &lt;i&gt;Agricultural&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Market&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Committee&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Shalimar&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Chemical&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Works&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ltd &lt;/i&gt;&lt;a href="#_ftn29"&gt;[29]&lt;/a&gt; that a delegate cannot alter the scope of the act under which it has been it has been empowered to make rules, or even of a provision or principle included there under. In &lt;i&gt;State&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;of&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Karnataka&lt;/i&gt;&lt;i&gt; v&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ganesh&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Kamath&lt;/i&gt;&lt;a href="#_ftn30"&gt;[30]&lt;/a&gt; the Supreme Court held that “it is a well settled principle of interpretation of statutes that the conferment of rule-making power by an Act does not enable the rule-making authority to make a rule which travels beyond the scope of the enabling Act or which is inconsistent there with or repugnant thereto”. Similarly, in &lt;i&gt;KSEB&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Indian&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Aluminium&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Company&lt;/i&gt;&lt;a href="#_ftn31"&gt;[31]&lt;/a&gt;, it held that“subordinate legislation cannot be said to be valid unless it is within the scope of the rule making power provided in the statute”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines were enacted under Sections 79(2) and 87(2)(zg) of the Information Technology Act, 2000 (as amended). While the latter provision explicitly grants the Central Government rule-making powers by which it can lay out guidelines to be followed by intermediaries in order to comply with Section 79(2), it appears that the rules in their current form appear to have been drafted based on a misunderstanding of Section 79.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 79(2) itself merely clarifies the circumstances in which intermediaries can claim that intermediaries are not liable for content where they do not initiate the transmission of potentially actionable content or select its recipient, modify its contents and observe all necessary “due diligence” requirements under the IT Act and rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The extent to which the Intermediary Guidelines alter the intent and scope of section 79 (or other provisions of the IT Act, in some cases) clearly leaves them &lt;i&gt;ultra vires&lt;/i&gt; the parent statute. The specific instances of deviation by the Intermediary Guidelines from the IT Act are listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, Rule 3 (3) is ultra vires section 79 of the IT Act. Where this rule expressly prohibits the hosting, publication or initiation of transmission of content described in Rule 3 (2), section 79 does not intend any prohibition. All that it does is to waive the immunity otherwise accorded to intermediaries where the conditions specified are not satisfied. In other words, the section is optional, rather than mandatory and punitive: whether or not an intermediary can claim immunity will depend on whether it chooses to comply with section 79 (2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, Rule 3 (4) requires intermediaries to take steps to disable access to within 36 hours of receiving a complaint in relation thereto. This is inconsistent with section 69B of the IT Act, which lays down in detail, the procedure to be followed to disable access to information. Since section 69B is statutory law, Rule 3 (4), being mere delegated legislation, will have to yield in its favour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, Rule 3 (7) is &lt;i&gt;ultra&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;vires&lt;/i&gt; sections 69 and 69B, and falls outside the scope of section 79 (2). Rule 3 (7) provides that intermediaries must comply with requests for information or assistance when required to do so by appropriate authorities. This provision has no relation to the contents of section 79, which regulates intermediaries’ liability for content, and under which these rules were notified. In addition, rules have already been issued under the properly relevant sections, namely sections 69 and 69B, to provide a procedure to be followed by the government for the interception, monitoring, and decryption of information held by intermediaries. Rule 3 (7) is not consistent with the rules under sections 69 and 69B, as it removes all safeguards that those rules included. Under the Information Technology (Procedure and Safeguards for Interception, Monitoring, and Decryption) Rules 2009, for instance, permission must be obtained from the competent authority before an intermediary can be directed to provide access to its records and facilities while Rule 3 (7) makes intermediaries answerable to virtually any request from any government agency.&lt;/p&gt;
&lt;p align="left"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Rule 3 (2) (a).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Rule 3 (2) (d).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Rule 3 (2) (b)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Section 499, Indian Penal Code, 1860 (“Defamation” is defined to include both written and spoken words).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. AIR 1950 SC 124.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. AIR 1958 SC 578.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. AIR 1995 SC 1236.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].(2007) 1 SCC 170.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. AIR 1973 SC 106.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. (2011) 8 SCC 372.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. AIR 1962 SC 305, ¶31.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;i&gt;Supra, &lt;/i&gt;n.5.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Centre for Internet &amp;amp; Society, &lt;i&gt;Intermediary Liability in India&lt;/i&gt;&lt;i&gt;: Chilling Effects on Free Expression on the Internet 2011&lt;/i&gt; &lt;i&gt;available at&lt;/i&gt; cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet/intermediary-liability-in-india.pdf.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. UN Document no. A/HRC/17/27.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. UN Document no. A/HRC/20/.13.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. AIR 1997 SC 3011.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. AIR 1997 SC 568.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. (2005) 1 SCC 496.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. 1978 SCR (2) 621.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. AIR 1985 SC 1416.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. AIR 1999 SC 2583.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. AIR 1974 SC 555.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. AIR 2002 SC&lt;i&gt; &lt;/i&gt;322&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. AIR 1993 SC 935&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. (2001) 7 SCC 545, 548, ¶10.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].1980 AIR 1992.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. &lt;i&gt;AIR&lt;/i&gt; 1970 SC 150.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. AIR 1986 SC 515.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. AIR 1997 SC 2502.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. (1983) 2 SCC 40.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr35" name="fn31"&gt;31&lt;/a&gt;]. AIR 1976 SC 1031.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules'&gt;https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ujwala</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-10-31T08:44:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/internet-censorship">
    <title>Internet Censorship: Anonymous Can’t be Just Harmful Hackers</title>
    <link>https://cis-india.org/internet-governance/internet-censorship</link>
    <description>
        &lt;b&gt;If there was ever an interesting time for people concerned with freedom of speech and expression to live in, it is now, and it is definitely in India. It has been a series of battles the last couple of years, where a slightly out-dated government machinery has been trying to control and contain the burgeoning online spaces, only to be put in their place by the new-age tech-ninjas that have risen as the new heroes in our digital times.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.firstpost.com/tech/internet-censorship-anonymous-protests-should-be-more-than-harmful-hacks-376564.html"&gt;published&lt;/a&gt; in the First Post on July 13, 2012&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We might not have had our Wikileaks moment in India yet, but the recent consolidation of resources by civic hacker groups and a public outrage against top-down blocking of everyday webspaces have steadily and surely put the questions of censorship and freedom on our minds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The protests have taken many forms – from civic action routes of campaigns and petitions by civil society and non-governmental organisations to guerrilla warfare in the shape of distributed denial of service attacks and hacking of government websites.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img class="wp-image-376597 size-full" height="176" src="http://www.firstpost.com/wp-content/uploads/2012/07/Anonymous_AP_NEW.jpg" title="Anonymous_AP_NEW_13JULY" width="235" /&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;Anonymous must be more than just a hacker group: AP&lt;/p&gt;
&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;A lot of these efforts have found popular interest and media attention, but they haven’t always found a solid ground for negotiation and dialogue with the policy makers and legislators designing this information regime. However, after the first off-line mobilisation of protests by Anonymous in India, the government has had to face the fact that the clicktivist users are not going to remain passive, merely venting their discontent on their blogs and social networking spaces.&lt;/p&gt;
&lt;p&gt;With the sustained and systemic attacks on government, public and  corporate websites, revealing sensitive information and taking down web  resources the new hackers have shown that they mean business. In a  recent attack, Anonymous hacked the Tamil Nadu police’s websites and  revealed information about the complaints people have made and the  actions taken on them.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;They leaked the document under their Twitter handle ‘opindia_revenge’ to show the police inaction. The documents have redacted some information but it has also revealed personally identified data about the people involved, without taking into consideration that it might affect the people involved in the cases adversely. Acts like these have the cybercrime bureau now tracking down the attackers and taking the help of Internet Service Providers and other intermediaries to punish those responsible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What the outcomes of this battle are going to be, will eventually change the ways in which our digital publics shape up. Given the lack of resistance that ISPs have shown in the past, when pressed for private information on suspicious users, the chances are that we might soon have a public spectacles of hacker-criminals. Looking at the past bungles in this arena, one also hopes that it will not be yet another instance of mixed up administration leading to wrong and misplaced prosecution.&lt;br /&gt;&lt;br /&gt;But more than anything else, one hopes that the attackers, who have seen their protests as a part of their civic action and right to protest and demonstrate, have been wise enough to protect themselves because they are going to be tracked and tried as criminals if they are caught.&lt;br /&gt;&lt;br /&gt;Much can be said about the nature of civic hacking, and much has already been said, heralding them as code warriors and berating them as a public nuisance. But in all that cacophony, we might need to separate the ideology (constitutional rights, free speech and expression) from the tactics (DDoS, hacking, parking on websites) and see what interests they eventually serve.&lt;br /&gt;&lt;br /&gt;Because even as my heart sings with these sounds of protests, there is a growing alarm that these seemingly radical guerrilla warfare might actually be more counter-productive than helpful to the cause of building an open and inclusive internet.&lt;br /&gt;&lt;br /&gt;Over the last years, many civil society and citizen collectives have realised that policies and regulation are more a dialogue than open warfare. Polarising ourselves on an axis of ‘good versus bad’, at the end of the day, only leads to more regulation and draconian measures because it makes the state feel under threat. Considerable energy has gone into building a culture of public policy consultations and dialogue that allows for different stakeholders to work towards a collective future of the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And so we come back to the question of whose interest gets served in the spate of these attacks? This is the same question that haunts us when we hear about our favourite political parties taking to destroying public property and blocking public infrastructure. It is the question that resurfaces when you realise that you might agree with the politics but the tactics are actually harming what you think is important.&lt;br /&gt;&lt;br /&gt;In the case of the Anonymous attacks, it unfortunately seems more bravado and aspiration to radical heroism than a sustained and strategic set of interventions. With this particular act they seemed to have not only hurt the people on whose behalf they are fighting, but also given the government more reasons and plausible excuses to exercise more regulation and control over the digital technologies.&lt;br /&gt;&lt;br /&gt;The attacks are a bold move to put the questions of censorship into public discourse, and force the state to acknowledge the problems with its governance. But it would be great to see if we can build on these energies and momentum and lead to a more sustained engagement with the political questions at stake, so at to construct a larger movement to protect our rights to free speech and expression that is beyond the world of ad-hoc hacking and random acts of protest.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/internet-censorship'&gt;https://cis-india.org/internet-governance/internet-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-06T06:56:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act">
    <title>Overview and Concerns Regarding the Indian Draft DNA Profiling Act</title>
    <link>https://cis-india.org/internet-governance/indian-draft-dna-profiling-act</link>
    <description>
        &lt;b&gt;The Indian Code of Criminal Procedure was amended in 2005 to enable the collection of a host of medical details from accused persons upon their arrest.  Section 53 of the Cr.PC provides that upon arrest, an accused person may be subjected to a medical examination if there are “reasonable grounds for believing” that such examination will afford evidence as to the crime.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The scope of this examination was expanded in 2005 to include “the examination of blood, blood-stains, semen, swabs in case of sexual offences, sputum and sweat, hair samples and finger nail clippings by the use of modern and scientific techniques including DNA profiling and such other tests which the registered medical practitioner thinks necessary in a particular case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Thogorani Alias K. Damayanti v. State of Orissa and Ors, 2004 Cri. LJ 4003 (Ori), the Orissa High Court affirmed the legality of ordering a DNA test in criminal cases to ascertain the involvement of persons accused. Refusal to cooperate would result in an adverse inference drawn against the accused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After weighing the privacy concerns involved, the court laid down the following considerations as relevant before the DNA test could be ordered: “(i) the extent to which the accused may have participated in the commission of the crime; (ii) the gravity of the offence and the circumstances in which it is committed; (iii) age, physical and mental health of the accused to the extent they are known; (iv) whether there are less intrusive and practical ways of collecting evidence tending to confirm or disprove the involvement of the accused in the crime; (v) the reasons, if any, for the accused for refusing consent.” Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In brief, the 2007 draft DNA Profiling Bill (hereinafter “Bill”) pending before parliament attempts to create an ambitious centralized DNA bank that would store DNA records of virtually anyone who comes within any proximity to the criminal justice system. Specifically, records are maintained of suspects, offenders, missing persons and “volunteers.” The schedule to the Bill contains an expansive list of both civil and criminal cases where DNA data can be collected including cases of abortion, paternity suits and organ transplant. In all fairness, the Bill contains provisions limiting access to and use of information contained in the database, and provides for the deletion of a person’s DNA profile upon their acquittal.&lt;/p&gt;
&lt;h2&gt;2007 Draft DNA Profiling Bill&lt;/h2&gt;
&lt;h3&gt;Preamble (§ 1)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 1 of the Bill sets out the broad policy objectives of its drafters. The most telling portion of § 1 states: “[DNA analysis] makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any, between two individuals, living or dead without any doubt.” Bill, § 1 (emphasis added). Although it later makes mention of potential harms resulting from governmental misuse of genetic information technology, it is evident that the policy animating the Bill presupposes the objective infallibility of genetic analysis. This patent mistruth underpins the policy rationale for the Bill, and as such casts a long shadow over its substantive provisions. At the very least, it tells the reader (and perhaps one day the court) to broadly interpret the Bill’s language to favor DNA analysis as the privileged solution to investigational and prosecutorial needs.&lt;/p&gt;
&lt;h3&gt;Definitions (§ 2)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A number of the Bill’s definitions are overbroad, further expanding the scope of its later provisions. The “crime scene index” is defined to include “DNA profiles from forensic material found . . . on or within the body of any person, on anything, or at any place, associated with the commission of a specified offence.” Id., § 2(1)(vii) et seq. A “specified offence” is defined as any of a number of more serious crimes, “or any other offence specified in the Schedule [to the Bill].” The so-called “Schedule,” tucked neatly on page 34 of the Bill’s 35 pages, lists a hodgepodge of various crimes from rape, to “offences relating to dowry,” defamation, and “unnatural 3 offenses.”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; Taken together, the government is empowered to conduct genetic testing on almost anyone in any way connected with even minor infractions of the criminal law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, the crucial term “suspect” is defined as anyone “suspected of having committed an offence.” Id., § 2(1)(xxxvi). By intentionally leaving out the qualifier “specified,” the drafters’ intent is plain: to sweep within the Bill’s breadth all persons suspected of any crime whatsoever. And, accordingly, the Bill defines the “suspects index” to include “DNA profiles derived from forensic material lawfully taken from suspects.” Id., § 2(1)(xxxvix). It is hard to imagine anybody of subsequent regulation that could adequately circumscribe this manifest affront to personal privacy and bodily integrity.&lt;/p&gt;
&lt;h3&gt;DNA Profiling Board (§§3 to 13)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The DNA Profiling Board (hereinafter “Board”) is responsible for administering and overseeing the Indian DNA database. §3 et seq. Among its several enumerated powers, the Board is charged with “recommend[ing] privacy protection statutes, regulations and practices relating to access to, or use of stored DNA samples or DNA analyses,” as well as “mak[ing] specific recommendations to . . . ensure the appropriate use and dissemination of DNA information [and] take any other necessary steps require to be taken to protect privacy.” §13(1)(xv) to (xvi). This provision is in lieu of any substantive principle limiting the scope of the legislation, which the bill otherwise lacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a significant omission. As expressed in the preamble, the stated purpose of the Bill is “to enhance protection of people in the society and [the] administration of justice.” §1. Taken alone, this expresses only the government’s interest in the legislation, suggesting an ambiguously wide scope for its provisions. A substantive concept of individual privacy is required to counterbalance the interests of the government and provide protections for the equally vital privacy interests of the individual. As such, a limiting privacy principle should be included alongside the expressing in §1 of the government’s security interest. Without it, the Board will effectively have carte blanche with regard to what privacy protections are—or are not—adopted.&lt;/p&gt;
&lt;h3&gt;Approval of Laboratories (§§14 to 18)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sections 14 to 18 provide for the approval by the DNA Profiling Board of DNA laboratories that will process and analyze genetic material for eventual inclusion on the DNA database. Under §14, all laboratories must be approved in writing prior to processing or analyzing any genetic material. However, a conflicting provision appears in the next section, §15(2), which permits DNA laboratories in existence at the time the legislation is enacted to process or analyze DNA samples immediately, without first obtaining approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Either an oversight on the part of the drafters, or the product of overly-vague language, the result is that established genetic laboratories—including whatever genetic material or profiles they may already have for whatever reason—are in effect “grandfathered” into the system. The only review of these laboratories is the post hoc approval of the laboratory by the DNA profiling board. The potential for abuse and error that this conflict of provisions would be best addressed in keeping with the rule articulated in §14, i.e. correcting the language of §15(2) that allows for laboratories to be “grandfathered” into the system.&lt;/p&gt;
&lt;h3&gt;Standards, Obligations of DNA Laboratory (§§19 to 28)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Chapter V, which concerns the obligations of and the standards to be observed by approved DNA laboratories, lacks adequate administrative provisions. For example, §22 requires that labs ensure “adequate security” to minimize contamination without providing for accountability in the event of contamination. Similarly, §28 provides for audits of DNA laboratories only, withholding from similar scrutiny of the DNA Profiling Board itself.&lt;/p&gt;
&lt;h3&gt;National DNA Database (§§33 to 37)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In addition on one national DNA database, the Bill sanctions the several Indian states to maintain their own DNA databases, provided these state-level databases forward copies of their content to the national database. Id., § 33(3). The national database is envisioned to comprise several sub-databases, each to contain the genetic information of a subset of persons/samples, namely: (1) unidentified crime scene samples, (2) samples taken from suspects, (3) samples taken from persons convicted or currently subject to prosecution for “subject offences,” (4) samples associated with missing persons, (5) samples taken from unidentified bodies, (6) samples taken from “volunteers,”&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; and finally (7) samples taken for reasons “as may be specified by regulations. Id., § 33(4) et seq. Putting to one side the breadth of persons subject to inclusion under subcategories (1) through (6), subsection (7) appears on its face to be a “catch all” provision, leaving one only to guess at the circumstances under which its specificities may be promulgated. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A close reading of § 33(6) strongly suggests that the agency &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;conducting conducting the forensic analyses and populating the DNA database shall retain the DNA samples thereafter. This section reads in relevant part:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DNA Data Bank shall contain . . . the following information, namely: (i) in the case of a profile in the offenders index, the identity of the person from whose body substance or body substances the profile was derived, and (ii) in case of all other profiles, the case reference number of the investigation associated with the body substance or body substances from which the profile was derived. Id., § 33(6).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rather than choose to link the DNA profile data to a specific offender or case, the drafters of the Bill instead like the “body substance or body substances” with that specific offender or case. Whether sloppy drafting or clever nuance, this provision elides the DNA profile with the DNA sample, injecting unneeded—and potentially harmful—ambiguity into the proposed law.&lt;/p&gt;
&lt;h3&gt;Confidentiality, Access to DNA Profiles, Samples, and Records (§§ 38-44)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Further compounding this ambiguity, § 36 entitled “Access to Information” opens the door to much more than DNA profiles alone being kept on the government database. In all three of its subsections it purports to govern access to “the information” contained in the database, not “the DNA profiles” contained in the database. Id., § 36(1) et seq. Subsection 2 employs even broader language, covering “the information in the offenders’ index pertaining to a convict.” Id. Taken at face value, this provision of the Bill suggests that any and all sort of “information . . . pertaining to a convict” that might be derived from his or her DNA can be stored on the database. Even if prudential oversight provisions elsewhere in the Bill suggests a tightly-controlled techno-forensic apparatus, the overbroad construction of provisions such as §§ 33 and 36 raise significant questions about the wisdom of enacting the text in this form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two further provisions regarding access to the database warrant close scrutiny. First, §§ 39 and 40 purport to confer upon the police direct access to all of the information contained in the national DNA database. While administratively expedient, this arrangement opens up the possibility for misuse. A more prudent system would place the Board (or some administrative subordinate portion thereof) between the police and the content of the DNA database, with the latter having to make specific and particular requests to the former. This would minimize the risks inherent in the more expansive model of database access the bill currently envisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, and more concerning, § 41 permits the Data Bank Manager to grant access to the database to “any person or class of persons that the Data Bank Manager considers appropriate.” This is a sweeping provision. It vests in one individual the ability to permit almost anyone access to the DNA database—without administrative review or oversight of any kind. Taken together with the general lack of administrative safeguards in the bill, § 41 again places the government’s interest in investigating crime far above individual privacy rights.&lt;/p&gt;
&lt;h3&gt;Omissions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Most notably, the bill specifically excludes a private cause of action for the unlawful collection of DNA, or for the unlawful storage of private information on the national DNA database. Nor does the bill grant an individual right to review one’s personal data contained on the database. Without these two key features, there is effectively no check against the unlawful collection, analysis, and storage of private genetic information on the database.&lt;/p&gt;
&lt;h3&gt;Best Practices Analysis&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Collection of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;With consent: only for a specific investigation (e.g. from a victim or for elimination purposes). Volunteers should not have information entered on a database&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Without consent: only from persons suspected of a crime for which DNA evidence is directly relevant i.e. a crime scene sample exists or is likely to exist. Or, broader categories?&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Requirement for an order by a court? Or allowed in other circumstances?&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Samples collected by police officers, or only medical professionals? Must take place in a secure location i.e. not on the street etc.&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Provision of information for all persons from whom DNA is taken&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scenes should be promptly examined if DNA evidence is likely to be relevant, and quality assurance procedures must protect against contamination of evidence&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Analysis of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Should take place only in laboratories with quality assurance&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Laboratories should be independent of police&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Profiling standards must be sufficient to minimise false matches occurring by chance. This must take account of increased likelihood of false matches in transboundary searches, and with relatives.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Storage of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Data from convicted persons should be separate from others e.g. missing persons’ databases&lt;/td&gt;
&lt;td&gt;Unclear&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Access to databases and samples must be restricted and there must be an independent and transparent system of governance, with regular information published e.g. annual reports, minutes of oversight meetings&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Access to database at discretion of DNA Data Bank Manager&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Personal identification information should not be sent with samples to laboratories&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Any transfer of data e.g. from police station to lab or database, must be secure&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;User Samples and Data&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses should be restricted to anonymised verification of database performance (e.g. checking false matches etc.). Third party access to data for such purposes should be allowed, provided public information on research projects is published. There should be an ethics board.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses for other purposes e.g. health research, behavioural research should not be allowed.&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Uses should be restricted by law to solving crimes or identifying dead bodies/body parts. Identification of a person is not an acceptable use. Missing persons databases (if they exist) should be separate from police databases.&lt;/td&gt;
&lt;td style="text-align: left; "&gt;Ambiguous provisions suggest much wider scope&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Familial searching should be restricted e.g. ordered by a court? Or not used? Or regulated for use in special cases?&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Destruction of DNA and Linked Datas&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;DNA samples should be destroyed once the DNA profiles needed for identification purposes have been obtained from them, allowing for sufficient time for quality assurance, e.g. six months&lt;/td&gt;
&lt;td&gt;DNA samples are retained&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;An automatic removals process is required for deletion of data from innocent persons. This must take place within a reasonable time of acquittal etc.&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;There should be limits on retention of DNA profiles from persons convicted of minor crimes&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;There should be an appeals process against retention of data&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Linked data on other databases (e.g. police record of arrest, fingerprints) should be deleted at the same time as DNA database records&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scene DNA evidence should be retained for as long as a reinvestigation might be needed (including to address miscarriages of justice)&lt;/td&gt;
&lt;td&gt;DNA evidence permitted to be retained indefinitely&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Use in Court&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to have a second sample taken from them and reanalysed as a check&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to obtain re-analysis of crime scene forensic evidence in the event of appeal&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Expert evidence and statistics must not misrepresent the role and value of the DNA evidence in relation to the crime&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Other&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Relevant safeguards must be proscribed by law and there should be appropriate penalties for abuse&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Impacts on children and other vulnerable persons (e.g. mentally ill) must be considered&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Potential for racial bias must be minimised&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. No examples are given as to which unnatural offences are intended, leaving the reader wondering. Perhaps a DNA test of witchcraft?&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Section 15(2) does mandate that such laboratories petition the DNA Profiling Board for approval within six months after the legislation is enacted.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].Per § (2)(1)(xxxxiii) of the Definitions, a “volunteer” is “a person who volunteers to undergo a DNA procedure.” The definition does not require that the “volunteer” be informed of the nature, purpose, or possible consequences of his generosity; nor is any such requirement specified elsewhere in the Bill.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].Or, as is laid out in great detail in §§ 14-32, at the privately-contracted forensics laboratory.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: § is a symbol for 'section'.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/indian-draft-dna-profiling-act'&gt;https://cis-india.org/internet-governance/indian-draft-dna-profiling-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>GeneWatch UK &amp; the Council for Responsible Genetics, US</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-11T11:30:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/all-night-for-hackers">
    <title>An all-nighter for hackers</title>
    <link>https://cis-india.org/news/all-night-for-hackers</link>
    <description>
        &lt;b&gt;Tech event management firm HasGeek is back with its Hacknight for hackers and developers willing to burn the proverbial midnight oil writing some competitive code.&lt;/b&gt;
        &lt;p class="body"&gt;&lt;b&gt;An all-nighter for hackers&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Tech event management firm HasGeek is back with its Hacknight for hackers and developers willing to burn the proverbial midnight oil writing some competitive code.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hacknight will be held between July 14 and 15, from 2 p.m. to 8 a.m. at the Centre for Internet and Society (CIS), in Bangalore, and simultaneously in Pune, at AmiWorks.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Data Hacknight was open to geeks, enthusiasts, designers, mathematicians and statisticians to work with different datasets on projects ranging from discovering unknown patterns in data to representing data in various visual forms. This event was being held in the run-up to a larger conference on big data, analytics and applications called The Fifth Elephant.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hacknight was also open to individuals who want to work with tools such as R, Pig, Excel or even Hadoop to discover the possibilities and challenges of working with data, a release from HasGeek stated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;To register for the Hacknight, visit http://beta.hacknight.in/fifthelephant/bangalore2012&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Yahoo sets up Grid Computing Lab&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Yahoo India’s Research and Development wing and the Indian Institute of Technology, Madras announced the launch of a Grid Computing Lab set up by the Internet major on the institute campus.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This cluster of high-end servers at the lab would allow researchers to access Web-scale data and conduct research on big data and cloud computing systems, a release from Yahoo stated. The lab would focus on this emerging field and encourage more researchers to take up research in the field, as well as process and analyse huge volumes of structured and unstructured data which, to date, has been limited due to significant cost barriers in getting large computing systems operational.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;D. Janakiram, Department of Computer Science, IIT-Madras, said in a release: “This opens up a new arena of exciting opportunities for our students. We are hopeful such partnerships will allow students to conduct truly breakthrough work on cloud computing and data storage systems, ultimately leading to Web innovations coming to the marketplace.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;World Class Award for iGate&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;iGATE, an integrated technology and operations company, announced that it has won the ‘World Class Award’ under the ‘large service organisations’ category at the Global Performance Excellence Awards (GPEA).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The awards were administered by the Asia Pacific Quality Organisation, a non-profit group, a release from iGate stated. Ravi Mani, senior vice-president, Organisational Excellence Group, iGATE, said the award was a testimony to the persistent effort the teams have put in to achieve the high-quality standards and processes at iGATE.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Cloud and growth: a survey&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Over the last two years, the public cloud market in India has rapidly evolved with focus on software and payments as a service, a survey by Zinnov, a consulting firm, has found.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A study titled ‘Public Cloud Opportunity in India’ found that the overall Indian market for cloud (both public and private) grew steadily in 2011. The Software as a Service (SaaS) market, largely dominated by email, collaboration tools and enterprise resource products grew by 46 per cent, a release on the survey stated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The public cloud market was expected to grow 55 per cent in the near future and become a default choice for new IT investments, especially in the small and medium businesses segment, the study observed.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/article3613800.ece"&gt;published&lt;/a&gt; in the Hindu on July 11, 2012&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/all-night-for-hackers'&gt;https://cis-india.org/news/all-night-for-hackers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-08-06T10:59:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/medical-privacy-conference-report">
    <title>Privacy Matters — Medical Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/medical-privacy-conference-report</link>
    <description>
        &lt;b&gt;On June 30, 2012, Privacy India in partnership with the Indian Network for People living with HIV/AIDS, Centre for Internet &amp; Society, IDRC, Society in Action Group, with support from London-based Privacy International, held a public discussion on "Medical Privacy" at the Yashwantrao Chavan Academy of Development Administration.&lt;/b&gt;
        &lt;p&gt;The conversation brought together a cross section of citizens, lawyers, activists, researchers, academia and students.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Prashant.jpg/@@images/4d8d4b4b-c2f1-47ed-8f8c-9799ff12f46c.jpeg" alt="Prashant Iyengar" class="image-inline" title="Prashant Iyengar" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Prashant Iyengar, Assistant Professor, Jindal Law University, opened the conference with an explanation of Privacy India’s mandate to raise awareness, spark civil action and promote democratic dialogue around privacy challenges and violations in India. He summarized the series of ten consultations previously organized across India:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary" class="external-link"&gt;Identity &amp;amp; Privacy&lt;/a&gt;, Kolkata, January 23, 2011&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore" class="external-link"&gt;Internet &amp;amp; Privacy&lt;/a&gt;, Bangalore, February 5, 2011 &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad" class="external-link"&gt;National Security &amp;amp; Privacy&lt;/a&gt;, Ahmedabad,  March 26, 2011&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report" class="external-link"&gt;Transparency &amp;amp; Privacy&lt;/a&gt;, Guwahati, June 23, 2011&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-chennai-report.pdf/view" class="external-link"&gt;Telecommunication &amp;amp; Privacy&lt;/a&gt;, Chennai, August 6, 2011&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill" class="external-link"&gt;Analyzing the Right to Privacy Bill&lt;/a&gt;, Mumbai, January 21, 2012&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-privacy-conclave" class="external-link"&gt;The High Level Privacy Conclave&lt;/a&gt;, New      Delhi, February 3, 2012&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/all-india-privacy-delhi-report" class="external-link"&gt;The All India Privacy Symposium&lt;/a&gt;, New      Delhi, February 4, 2012&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/freedom-of-expression-privacy-roundtable-discussion-goa-june-2nd" class="external-link"&gt;Freedom of Expression &amp;amp; Privacy&lt;/a&gt;, Goa, June 2, 2012&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/securing-e-governance" class="external-link"&gt;Securing e-Governance&lt;/a&gt;, Ahmedabad, June 16, 2012&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_P1.jpg/@@images/23b13d9b-7bb5-4b45-8647-f62ec9cc93f3.jpeg" alt="Participants 1" class="image-inline" title="Participants 1" /&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Elonnai Hickok, a member of Privacy India, introduced the draft book Privacy in India: A Policy Guide that Privacy India has been compiling.  Focusing on the draft chapter, Medical Privacy, she provided examples of legislation and policy containing safeguards to privacy such as Medical Council of India's Code of Ethics Regulations 2002, and pointed out legislation with missing safeguards such as in the Mental Health Act of 1987. Additionally, she gave many examples of projects being implemented in India that impact health privacy including Save the Baby Girl Project, the Mother and Child Tracking System, the UID, and a cloud based system known as Health Hiway.  &lt;br /&gt;&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/elonnai.jpg/@@images/aec795c5-4de3-471e-a0c8-1e8f5e8ded00.jpeg" alt="" class="image-inline" title="" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Medical Privacy in India&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Dharmesh.jpg/@@images/150413aa-a1f4-4f26-a0da-ec2703a2cd55.jpeg" alt="Dharmesh" class="image-inline" title="Dharmesh" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Dr. Dharmesh Lal, MBBS, DHA, MD, DNB, DVLDP, Officiating Dean, IIHMR, Delhi, discussed the correlation between medical privacy and confidentiality. Medical Privacy involves the confidentiality of patient-provider encounters, along with the secrecy and security of information memorialized in physical, electronic and graphic records created as a consequence of patient-provider encounters.  Confidentiality involves restricting information to persons belonging to a set of specifically authorized recipients.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;He went on to explain that limited financial resources in public hospitals often preclude the separate examination of one patient at a time. “In Government hospitals, large numbers of patients congregate in the doctors office,” he says. Privacy is also related to a patient's financial status and decreases as one goes down the socio-economic ladder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, he described the privacy concerns that arise due to infrastructural constraints. India's healthcare infrastructure has not kept up with the development of government health initiatives. For examples, the Janani Suraksha Yojana (JSY) initiative was launched in 2005, under the National Rural Health Mission (NRHM). JSY was implemented with the objective of reducing maternal and neo-natal mortality by promoting institutional delivery among the Poor Pregnant Woman. Financial incentives were provided to mothers. There was a phenomenal increase of institutional delivery. However, there was no proportional increase in infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He called for a change in medical education, administration and management, stating, “Privacy protection has to be established as a core value that connects organizational culture. Alarmingly, medical curriculum in India does not have formal component on medical privacy, significant curriculum reforms in undergraduate medical teaching is necessary.&lt;/p&gt;
&lt;h3&gt;Medical Privacy- Legal Aspects&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Mr. Pandit, Advocate, Pandit law Office, discussed the Hippocratic oath, which includes the duty of the caregiver to ‘keep secret’ and ‘never reveal’ ‘all that may come to my knowledge’. In other words, right to medical privacy has to be balanced with right to healthy life of another whose right will be affected unless such information is disclosed to her/him.&lt;/p&gt;
&lt;p&gt;He described the code of conduct prescribed by Indian Medical Council to its members, as a guideline to be followed is intended to preserve protect and uphold dignity of profession. Physicians should merit the confidence of patients entrusted to their care, rendering to each a full measure of service &amp;amp; devotion.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Pandit.jpg/@@images/c68199fc-dab6-42cc-9ba1-2d942cfad778.jpeg" alt="Pandit" class="image-inline" title="Pandit" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Referring to the Dr.Tokugha Yepthomi  Vs  Appollo Hospital Enterprises Ltd &amp;amp; Anr. III case, he described the Supreme Court’s verdict on the ‘Right to Life’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;The “Right to life” would positively include the right to be told that a person, with whom she was proposed to be married, was a victim of deadly disease, which was sexually communicable, since right of life includes right to lead a healthy life. Moreover where there is a clash of two fundamental rights, The RIGHT which would advance the public morality or public interest, would alone be enforced through the process of Court.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He concluded by asserting that there is considerable force in the argument that there is a need for a comprehensive legislation to protect the interest of poor patients and ordinary citizens who cannot afford to initiate a protracted legal battle to protect their medical privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Supreme Court views on Medical Negligence&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Elumalai.jpg/@@images/38c11e51-0761-4836-8833-080912e23911.jpeg" alt="Elumalai" class="image-inline" title="Elumalai" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Professor K. Elumalai, Director, School of law, IGNOU, provided numerous Supreme Court verdicts on medical negligence cases. He summarized the cases and discussed their salient features. He discussed the manner in which a Medical professional can be prosecuted for medical negligence under criminal law. It must be shown that the accused did something or failed to do something which in the given facts and circumstances, no medical professional in his ordinary senses and prudence would have done or failed to do.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Confidentiality and privacy in medical Settigs vis-a-vis PLHIV&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ms. Nitu Sanadhya, Senior Legal Officer, Lawyers Collective, HIV/ AIDS Unit, stressed the importance of a rights-based approach and integrationist legal response to the HIV epidemic. When legislations or policies discriminate or isolate persons living with HIV, for example, through mandatory testing and breach of confidentiality, it drives the epidemic underground.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;In India, there is no comprehensive law on HIV. In 2007, the National Aids Control Organization (NACO) released the Operational Guidelines for Integrated Counseling and Testing Centres. She described the salient features of the guideline especially focusing on the privacy provisions. She described the various situations that permit a health practitioner to disclose the HIV status of a patient to a partner and/ or third party.&lt;/p&gt;
&lt;p&gt;Discriminatory practices that arise out of a breach or confidentiality or privacy violation include stigmatization, denial of access to treatment, loss of employment, etc.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Nitu.jpg/@@images/235021e0-9b01-4d15-83d0-419729cc88ef.jpeg" alt="Nitu" class="image-inline" title="Nitu" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Under the RTI Act, A person’s HIV status is confidential and is protected in law and can only be disclosed to a third person in limited circumstances. The RTI Act specifically exempts the disclosure of personal information which is not of public interest; information which would cause an unwarranted invasion of privacy; and information which has been received in a fiduciary capacity. Therefore, The RTI Act 2005 cannot be used to obtain a person’s HIV report.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy in Practice&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/anand.jpg/@@images/fe79aa7d-fc55-48fe-97a8-b1cb7d555c39.jpeg" alt="Anand" class="image-inline" title="Anand" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Dr. Anand Philip, Personal Physician at NationWide Primary Healthcare Service Pvt. Ltd., drew from his personal experiences. During his presentation he emphasized how privacy is important, but it is clear that privacy does not happen the way it is theorized by. In fact there are many dichotomies in what we believe privacy is and how it is used. He pointed out that we often take for granted why privacy matters and where it comes from. He discussed how without patient autonomy and patient dignity, privacy cannot &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;be upheld. Yet, one sees a constant breach of people’s dignities in the medical system. Some people rationalize this violation of dignity by explaining that in  India, doctors are used to people who have nothing and thus, dignity is  not important. Yet, he argued, dignity is something that is inherent.  The lack of dignity practiced in India's medical system shows a problem  with how we are trained. Giving an example of how dignity is breached in  India, Dr. Philip referred to two people being treated on the same table. He pointed out that the physical aspects of privacy are non-existent. For example, the WHO recommends five feet between beds, but typically two or three feet exist between hospital beds. Furthermore, there are often no curtains in hospitals. He then moved from physical privacy to information physical. In a hospital information flows in all directions, it is not a controlled environment and the patient does not choose who sees his/her information – the hospital decided. Dr. Philip then talked about training. The health care system encompasses a larger team of people from doctors to sweepers. Training is only given to clinical staff. Thus other aspects such as the Indian culture, infrastructure, and training all impact how privacy is carried out in the medical field.   In conclusion Dr. Philip re-stated that privacy is a byproduct of autonomy and dignity. He noted that offering a patient dignity was a critical step that must be taken by service providers. Closing his presentation, he challenged the audience with the following questions:  Considering how autonomy is not important, how do we reach people with the idea? Since physical privacy is key to other forms of privacy, how do we take it more seriously? What can we do about the medical team's approach to privacy?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Best Practices of Medical Privacy in Various Health Settings&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/sriram.jpg/@@images/40bc6ebe-4ba2-45f2-9bef-abbabd77e3e1.jpeg" alt="Sriram" class="image-inline" title="Sriram" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Sriram Lakshmanan, Head Information Security, UnitedHealth Group Information Systems, spoke about the US health-care market touching on medicare, medicaid, employer-sponsored insurance, and individual insurance plans.  He also commented on the EU regime pointing out that most of the laws in the EU have a long list of identifiers indicating when your information counts as being compromised. Canada PIPEDA, is very strict and protects health privacy. In his opinion, the IT Act caters to many aspects of privacy. He also touched upon the eight OECD Privacy Principles and &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;how they can be adopted for the Indian scenario. A few of the principles  included collection limitation principle, data quality principle,  purpose specification principle, use limitation principle. For example,  if health information for treating malaria is collected, than that  information should only be used for that purpose.  Closing his  presentation, he noted that most of the technologies that we use today  for health run on IT, and thus can be used to compromise individual or  hospital wide information.&lt;/p&gt;
&lt;h3&gt;Epidemics and Privacy&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Dr. Rajib Dasgupta, Assistant Professor, Center of Social Medicine and  Community Heath at Jawaharlal Nehru University, examined conflicts of  issues of privacy, confidentiality and the role of the state in the  context of epidemics and the provisions within the Epidemic Diseases  Act. Epidemics are population-level events in contrast to illnesses that  only involve individuals; therein lies the uniqueness of the  intersection between medical privacy and public health ethics. The state  has unique responsibilities to detect, diagnose, manage and control  epidemics. This has local/regional and international ramifications. Also  linked to these are limits to the powers, rights of individuals and the  extent to which such rights may need to be suspended. &lt;br /&gt;&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Rajib.jpg/@@images/ae57a014-d5c2-45db-b7e6-2222c4ca6fd9.jpeg" alt="Rajib" class="image-inline" title="Rajib" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The exercise of  actions within the Act is not necessarily bereft of  infringement of  privacy and overt discrimination. Certain diseases, as  indeed  limitations imposed by the state, have elements of stigma that  further  confound the fuzziness of this debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When an epidemic occurs, the need for privacy in the mind of the individual goes down, as they are concerned solely with receiving treatment. He also pointed out that there are contradictory elements during epidemics. For instance an area might not want to be named as having an outbreak of a disease, but at the same time individuals will line up outside hospitals for treatment, exposing the fact that they have the disease. He also spoke about how steps taken to address epidemics can invade privacy. For example, during the SARS outbreak, it was the practice to put the patient in an infectious disease hospital. This was invasive to personal privacy as it created stigma and discrimination. Closing his presentation he explained how the conventional notions of privacy do not necessary hold in the case of epidemics because it is an emergency outbreak. Thus, protocol is established on a case-to-case basis. Despite this he believes that it is possible and valuable to protect privacy in cases of epidemics.&lt;/p&gt;
&lt;h3&gt;HIV/ AIDS and Privacy&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/KKAbraham.jpg/@@images/a9c63ec9-da24-42e0-98fd-67c8e50fe9f9.jpeg" alt="KK Abraham" class="image-inline" title="KK Abraham" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;KK Abraham, President of Indian Network for People Living with HIV/AIDS, described how privacy could be understood as a luxury, in some cases it can be understood as a right, and in other cases it is understood of responsibility. Regarding HIV patients, Mr. Abraham emphasized the need for privacy to be understood as a right.  Mr. Abraham also pointed out that as trends are changing in India, and more services are becoming available, that this is the right time to talk about privacy. Closing his presentation Mr. Abraham called for a greater understanding of patients' privacy needs and the negative effect of stigma. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;HIPPA with reference to Applicability to Patient Privacy and Clinical Data Confidentiality in India&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Dr. Lavanian Dorairaj, MD, CEO at HCIT Consultants, described how IT is a  powerful tool for health care, despite the fact that health care has  been hesitant to use IT. He explained that IT can help reduce errors in  health care; it can help increase accessibility of patient data, improve  diagnosis, treatment, and prognosis. Healthcare IT has great advantages  but needs to be handled with great responsibility. He also pointed out  that IT can lead to privacy violations if inappropriate access to  patient records takes place. He argued that though India has recognized  the need for privacy, it still needs to find a way to implement privacy protections and police the implementation of the guidelines.  Drawing on examples from HIPPA, he argued that India would benefit from establishing privacy standards and security standards for health information. He explained further that HIPPA is a flexible rule, which obligates relevant entities to comply. The Rule is designed to be flexible. Entities regulated by the rules are obligated to comply. &lt;br /&gt;&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Lavanian.jpg/@@images/48425cbf-6de0-4c8c-8c41-dbad961c4970.jpeg" alt="Lavanian" class="image-inline" title="Lavanian" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_P2.jpg/@@images/38e6121e-f6aa-4dfc-9b8c-0e9965a3d6d7.jpeg" title="Participants 2" height="234" width="220" alt="Participants 2" class="image-inline" /&gt;&lt;/th&gt;&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_P3.jpg/@@images/27159bd7-e77b-4e98-bb8d-1d00d678441e.jpeg" alt="Participants 3" class="image-inline" title="Participants 3" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_P4.jpg" alt="Participants 4" class="image-inline" title="Participants 4" /&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/P6.jpg/@@images/5983cfd4-b1be-499c-81ba-bf3339493879.jpeg" title="Participants 6" height="336" width="382" alt="Participants 6" class="image-inline" /&gt;&lt;/th&gt;&lt;th&gt;&lt;img src="https://cis-india.org/home-images/P7.jpg" alt="Participants 7" class="image-inline" title="Participants 7" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/P5.jpg/@@images/4831ad29-740b-4334-9155-5603a21605ad.jpeg" alt="Participants 5" class="image-inline" title="Participants 5" /&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/P8.jpg" alt="Participants 8" class="image-inline" title="Participants 8" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/p9.jpg" title="Logos" height="72" width="697" alt="Logos" class="image-inline" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Presentations&lt;/h2&gt;
&lt;p&gt;Click to &lt;a href="https://cis-india.org/internet-governance/presentation-files" class="internal-link"&gt;download&lt;/a&gt; the presentation files. [Zip files, 2184 Kb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/medical-privacy-conference-report'&gt;https://cis-india.org/internet-governance/blog/medical-privacy-conference-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-07-10T13:41:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
