<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2501 to 2515.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/icann-54"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-practices-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cyber-cafe-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cis-joins-global-commission-on-internet-governance-research-advisory-network"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cis-joins-the-christchurch-call-advisory-network"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/gni-annual-report-mentions-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/icann-54">
    <title>CIS Participation at ICANN 54</title>
    <link>https://cis-india.org/internet-governance/news/icann-54</link>
    <description>
        &lt;b&gt;Centre for Internet and Society (CIS), India participated in the 54th meeting of the Internet Corporation for Assigned Names and Numbers (ICANN) held at the Convention Center in Dublin from 17 October 2015 to 22 October 2015. Pranesh Prakash, Jyoti Panday and Padmini Baruah attended the meeting. &lt;/b&gt;
        
&lt;p&gt;
CIS
representation was possible at the meeting due to the generous
support of MacArthur grant, NCUC ICANN Travel Grant and financial
support from the National Internet Exchange of India (NIXI). The
issue-wise detail of CIS engagement is set out below.&lt;/p&gt;
&lt;p&gt;
At
the Public Forum, Jyoti Panday asked the ICANN Board to clarify its
role and the role of the community in the development of the proposal
with Verisign on its role as the Root Zone Maintainer. ICANN CEO
confirmed what many feared, that there will be no community
involvement on this proposal as ICANN's relationship with Verisign is
an "implementation" detail. He added the assurance that
post transition, on the decision of renewal of the contract and
whether it will be awarded to Verisign, ICANN will seek inputs from
the community.&amp;nbsp;Jyoti's
statement is replicated below:&lt;/p&gt;
&lt;p&gt;
"I
want to ask the Board why when asked by the NTIA to develop a draft
proposal for the with Verisign on its Root Zone Maintainer role, did
you not pass on that mandate to the community, to the CWG which
already exists, and ask the community to draft out the proposal with
VeriSign? Will the ICANN Board seek public comments on the final
proposal before it is approved? After all, ICANN cannot claim that it
is an inverted pyramid where all decisions start from the community
and flow up to the Board when on a crucial issue like this, the ICANN
Board and staff have not taken the community in confidence nor
invited its participation."&lt;/p&gt;
&lt;p&gt;Padmini
Baruah reiterated CIS message at the Public Forum on the lack of
diversity observed through the transition and presented new data.
Padmini's statement is replicated below: &lt;br /&gt;Today, more than 50%
of Internet users are in the Asia-Pacific region, and less than 10%
are in North America. Yet, when one studies diversity within the
ICANN community and in ICANN processes, one finds that diversity is
sorely lacking, and it is dominated by people from the United States
of America. Take the IANA transition, for instance. CIS studied
participant data from ICANN, NRO, and IETF's lists related to the
IANA transition. Of the substantive contributors, of which there were
98, we found:&lt;br /&gt;* 1 in 4 (39 of 98) were from a single country:
the United States of America.&lt;br /&gt;* 4 in 5 (77 of 98) were from
countries which are part of the WEOG grouping, which only has
developed countries.&lt;br /&gt;* None were from readily identifiable as
being based in Eastern European and Russia, and only 5 of 98 from all
of Latin American and the Caribbean.&lt;br /&gt;* 4 in 5 (77 of 98) were male
and 21 were female.&lt;br /&gt;* 4 in 5 (76 of 98) were from industry or the
technical community, and only 4 (or 1 in 25​) were identifiable as
primarily speaking on behalf of governments.&lt;br /&gt;It would be a
travesty of language to call this the "global multistakeholder
community". &lt;br /&gt;Further this problem is pervasive in the ICANN
community:&lt;br /&gt;* 66% (34 of 51) of the Business Constituency at ICANN,
as per their own data, are from a single country: the United States
of America.&lt;br /&gt;* 3 in 5 registrars are from the United States of
America (624 out of 1010, as of March 2014, according to ICANN's
accredited registrars list), with only 0.6% being from the 54
countries in Africa (7 out of 1010).&lt;br /&gt;* 45% of all the registries
are from the United States of America! (307 out of 672 registries
listed in ICANN’s registry directory in August 2015.)&lt;br /&gt;Please
take this as your top priority, since ICANN's legitimacy depends on
being able to call itself globally representative.&lt;/p&gt;
&lt;p&gt;CIS
attended also raised a series of concerns at the following sessions:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;
&lt;p&gt;
	Enhancing
	ICANN Accountability Open Engagement: CIS intervened with its stance
	on jurisdiction and their enforcement models, and our concerns about
	transparency.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	GAC
	sessions&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	NCSG
	meeting&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	IANA
	Transition Stewardship Transition Engagement Session&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	CCWG
	Accountability Working Session&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Illicit
	Internet Pharmacies&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	NCUC
	Meeting+engagement with Larry Strickling: Jyoti Panday asked about
	the dual role of Verisign as a Root zone maintainer and TLD
	operator. Padmini Baruah asked him about jurisdiction. He said the
	US Congress will not support a shift in ICANN's jurisdiction.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	NCSG/gNSO
	(CIS work on DIDP got public mention)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Contractual
	Compliance Programme Update&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	CWG
	Stewardship working session&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Role
	of Voluntary Practices in Combating Abuse and Illegal Activity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Joint
	meeting of the ICANN Board and NCSG&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/icann-54'&gt;https://cis-india.org/internet-governance/news/icann-54&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-18T12:47:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-practices-rules">
    <title>CIS Para-wise Comments on Draft Reasonable Security Practices Rules, 2011 </title>
    <link>https://cis-india.org/internet-governance/blog/security-practices-rules</link>
    <description>
        &lt;b&gt;On February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website  (The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011) in exercise of the powers conferred by Section 87(2)(ob), read with Section 43A of the Information Technology Act, 2000.  Comments were invited from the public before February 25th 2011.  Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para-wise comments for the Ministry’s consideration.&lt;/b&gt;
        &lt;h2&gt;A. Specific Objections&lt;/h2&gt;
&lt;h3&gt;Rule 3&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Sensitive personal data or information.— Sensitive personal data or information of a person shall include information collected, received, stored, transmitted or processed by body corporate or intermediary or any person, consisting of :&lt;/p&gt;
&lt;p&gt;Password;&lt;/p&gt;
&lt;p&gt;...&lt;/p&gt;
&lt;p&gt;Call data records;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We suggest that this list be expanded to include information such as sexual orientation, religion and caste. In addition, “electronic communication records” including emails, chat logs and other communications using a computer should be designated sensitive personal information.&lt;/p&gt;
&lt;h3&gt;Rule 4&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Body Corporate to provide policy for privacy and disclosure of information.— (1) The body corporate or any person who on behalf of body corporate collects, receives, possess, stores, deals or handle shall provide a privacy policy for handling of or dealing in user information including sensitive personal information and ensure that the same are available for view by such providers of information who has provided such information under lawful contract. Such policy shall provide for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Type of personal or sensitive information collected under sub-rule (ii) of rule 3;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Purpose, means and modes of usage of such information;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Disclosure of information as provided in rule 6&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that the privacy policy be made available for view to all individuals to whom the information held by the body corporate pertains. Currently the privacy policy will only be disclosed to the “providers of information” who may not be the individual concerned directly.&lt;/p&gt;
&lt;h3&gt;Rule 5&lt;/h3&gt;
&lt;p&gt;Collection of information.—&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(1) Body corporate or any person on its behalf shall obtain consent of the provider of the information regarding purpose, means and modes of uses before collection of such information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend the substitution of the term “individual to whom the data pertains” instead of the phrase “provider of the information”.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(2) Body corporate or any person on its behalf shall not collect sensitive personal information unless—&lt;/p&gt;
&lt;p&gt;the information is collected for a lawful purpose connected with a function or activity of the agency; and&lt;/p&gt;
&lt;p&gt;the collection of the information is necessary for that purpose.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend a blanket prohibition of collection of biometric data unless a heightened security interest is demonstrated.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(3) While collecting information directly from the individual concerned, the body corporate or any person on its behalf shall take such steps as are, in the circumstances, reasonable to ensure that the individual concerned is aware of.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend a simpler phrase like “The body corporate.. shall take reasonable steps to inform the individual concerned” instead of the current complex phrasing. Reasonableness has generally been interpreted by courts contextually. For instance, the Supreme Court has remarked, “`Reasonable’ means prima facie in law reasonable in regard to those circumstances of which the actor, called upon to act reasonably, knows or ought to know. See Gujarat Water Supply and Sewage Board v. Unique Erectors (Guj) AIR 1989 SC 973.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(4) Body corporate or any person on its behalf holding sensitive personal information shall not keep that information for longer than is required for the purposes for which the information may lawfully be used.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that this be converted into a mandatory obligation to delete or anonymise the information collected within a stipulated period (say 6 months) after the expiry of use for which it was collected.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(6) Body corporate or any person on its behalf shall permit the users to review the information they had provided and modify the same, wherever necessary.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Individuals should have the right to review and modify information pertaining to them whether or not they themselves had provided the information to the body corporate. This right should be provided to them wherever the information that pertains to them is incorrect.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(7) Body corporate or any person on its behalf shall provide an option to the provider of the information to opt-in or opt-out.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that the wording be changed to “individual to whom the data pertains” instead of “provider of information”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-practices-rules'&gt;https://cis-india.org/internet-governance/blog/security-practices-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-14T10:32:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cyber-cafe-rules">
    <title>CIS Para-wise Comments on Cyber Café Rules, 2011 </title>
    <link>https://cis-india.org/internet-governance/blog/cyber-cafe-rules</link>
    <description>
        &lt;b&gt;On February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website  (The Information Technology (Guidelines for Cyber Cafe) Rules, 2011) in exercise of the powers conferred by Section 87(2) (zg), read with Section 79(2) of the Information Technology Act, 2000.  Comments were invited from the public before February 25th 2011.  Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para wise comments for the Ministry’s consideration.&lt;/b&gt;
        &lt;h2&gt;A. General Objections&lt;/h2&gt;
&lt;p&gt;These rules have no nexus with their parent provision, namely s.79(2).  Section 79(1) provides for exemption from liability for intermediaries.  Section 79(2) thereupon states:&lt;/p&gt;
&lt;blockquote&gt;79. Intermediaries not to be liable in certain cases—&lt;br /&gt;
&lt;blockquote&gt;(2) The provisions of sub-section (1) shall apply if— &lt;br /&gt;
&lt;blockquote&gt;(a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hasted; or &lt;br /&gt;(b) the intermediary does not— &lt;br /&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;(i) initiate the transmission, &lt;br /&gt;(ii) select the receiver of the transmission, and &lt;br /&gt;(iii) select or modify the information contained in the transmission; &lt;br /&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;(c) the intermediary observes due diligence while discharging his duties under this Act and also observes such other guidelines as the Central Government may prescribe in this behalf. &lt;br /&gt;&lt;br /&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;Therefore, by not observing any of the provisions of the Rules, the intermediary opens itself up for liability for actions of its users.  However, the provisions contained in these rules have no rational nexus with due diligence to be observed by the intermediary to absolve itself from liability for third-party actions.&lt;/p&gt;
&lt;p&gt;While the government may have authority to regulate cybercafes, that regulation should not be promulgated as rules under s.79(2).  Doing so would be ultra vires s.79(2) itself.&lt;/p&gt;
&lt;h3&gt;Recommendation&lt;/h3&gt;
&lt;p&gt;These rules should be deleted in toto.&lt;/p&gt;
&lt;h2&gt;B. Specific Objections&lt;/h2&gt;
&lt;p&gt;These specific objections are in addition to the above-stated general objection, and do not detract from out recommendation that these rules should be deleted in their entirety.&lt;/p&gt;
&lt;h3&gt;Rule 2(c)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;(c) “Cyber Cafe” means cyber café as defined in clause (na) of sub-section (1) of section 2 of the Act&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;The Act defines a cyber cafe as meaning “any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public”.  This would include internet access provided in airports, in restaurants, and in many other places where the provisions of these rules (such as those about height of partitions, etc.) just will not be practicable.  Thus, this provision will have unintended consequences.&lt;/p&gt;
&lt;h3&gt;Rule 3&lt;/h3&gt;
&lt;blockquote&gt;Agency for issuance of license: Appropriate government will notify an agency to issue license to cyber cafes.&lt;br /&gt;&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Rule 3 requires the issuing of a license for the establishment of a cyber café. We believe this is unwarranted since cybercafes, like most commercial establishments are already subject to registration and licensing under the “Shops and Establishments Acts” which have been enacted in all states. These Acts already specify an elaborate procedure for the application, registration and monitoring of all establishments and there is no need to multiply the levels of permission a cyber café must obtain. The current rules do not specify an application procedure, fee, and a maximum or minimum time frame within which such a license must be granted or denied nor does it specify the criterion on which such license applications will be evaluated. We think that in the absence of such legislative guidance, this provision is likely to be abused.&lt;/p&gt;
&lt;p&gt;Cyber cafes in India contribute greatly to India’s increasing internet penetration and inserting a licensing regime would greatly impede access to the internet.&lt;/p&gt;
&lt;p&gt;We believe that cyber cafes should be allowed to be established in the same manner as other shops and establishments, without the requirement of a special license.&lt;/p&gt;
&lt;h3&gt;Rule 4(2)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;...When an user cannot establish his/her identify to the satisfaction of the Cyber Café as per sub-rule (1), he/she may be photographed by the Cyber Café using a web camera installed on one of the computers in the Cyber Café for establishing the identity of the user.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Sub-Rule 4 (2) Requires that if an individual is unable to establish identity, their photograph must be taken if they wish to use cyber café facilities. We believe that an individual’s photograph should be taken only as a last resort, where identity has been established.&lt;/p&gt;
&lt;h3&gt;Rule 4(3)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Children without photo identity card shall be accompanied by an adult with any of the documents as prescribed in sub-rule (1).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that children below 18 years should be specifically exempt from proving their identities to cyber café owners. Children are usually the quickest to adopt technology, and the requirement of possessing a valid identity might prove to be a deterrent to their developing computer skills. Likewise, being accompanied by an adult is also an onerous obligation since children’s access to the internet would depend on the availability of an adult/parent who may be too busy to accompany the child on every occasion the child wishes to access the internet or use a computer.&lt;/p&gt;
&lt;p&gt;To reiterate, we feel that the current provision specially and adversely targets children from poorer classes (since they are most likely to routinely access internet through cyber cafes) and denies them the opportunity of developing their computer skills which are crucial for the growth of the “knowledge economy” that India is trying to head towards.&lt;/p&gt;
&lt;p&gt;In addition, we believe that children are more susceptible to exploitation and consequently have a heightened privacy expectation which must be honoured. We recommend that the current sub-rule be deleted and replaced with a clause which specifically exempts children from proving their identity and forbids taking photographs of them under any circumstance.&lt;/p&gt;
&lt;h3&gt;Rule 5(1)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;... Log Register: After the identity of the user has been established as per sub-rule (1) of rule 4 above, the Cyber Café shall record and maintain the required information of each user in the log register for a minimum period of one year. Also, Cyber Café may maintain an online version of the log register.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Rule 5(1) Provides a minimum period of one year that Cyber Cafes must retain their log registers. The rule does not specify the details which the log register must provide. In the interests of minimising threats to privacy, we recommend that these details recorded be confined only to the name and duration of use.&lt;/p&gt;
&lt;p&gt;In addition, we believe that there should also be a coinciding mandatory deletion clause for the log register requiring details to be purged after the minimum retention period.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3&gt;Rules 5(3)and 6(2)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;5(3): “The cyber café owner shall be responsible for storing and maintaining following backups of logs and computer resource records for at least six months for each access or login by any user :&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;·    History of websites accessed using computer resource at cyber cafe&lt;/p&gt;
&lt;p&gt;·    Logs of proxy server installed at cyber café&lt;/p&gt;
&lt;p&gt;·    Mail server logs&lt;/p&gt;
&lt;p&gt;·    Logs of network devices such as router, switches, systems etc. installed at cyber café&lt;/p&gt;
&lt;p&gt;·    Logs of firewall or Intrusion Prevention/Detection systems, if installed.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;6(2): “The screen of all computers, installed other than in Partitions or Cubicles, shall face ‘outward’, i.e. they shall face the common open space of the Cyber Café.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend deletion of this rule since it is an unreasonable intrusion into a person’s privacy and an indirect attempt to censor content which users may wish to access. There are many uses of the internet for which a user may legitimately require privacy: For instance, patients, including HIV patients and those with mental illness, may wish to obtain information about their condition. Similarly sexuality minorities may wish to seek support or reach out to a larger community. Enforcing the architecture stipulated in this rule would discourage their access to such vital information. In addition, this architecture would make it easier for cyber crimes such as identity theft to take place since it would be easier to observe the login details of other users at the cyber café.&lt;/p&gt;
&lt;h3&gt;Rule 7(1)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Inspection of Cyber Café : “An officer, not below the rank of Police Inspector as authorised by the licensing agency, is authorized to check or inspect cyber café and the computer resource or network established therein at any time for the compliance of these rules. The cyber café owner shall provide every related document, registers and any necessary information to the inspecting officer on demand.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend this clause be omitted since it confers unfettered and unsupervised powers on any Police Inspector to examine any cyber café premises he may choose without any restriction on time.&lt;/p&gt;
&lt;p&gt;Additionally, the provisions of Shops and Establishments Acts of most states already prescribe a procedure for inspection of establishments and examination of records. The current rules merely add another layer of supervision to the existing laws without adequate safeguards.&lt;/p&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
 
&lt;p&gt;Sub-Rule 5(3) holds cyber café owners responsible for the storage and maintenance of back up logs concerning the following information: history of websites, logs of proxy servers, mail server logs, logs of network devices, logs of firewalls installed. We believe that the maximum length for retention of this data should be defined and a mandatory deletion clause should be inserted requiring cyber café owners to delete these logs periodically. We further believe that access to the history of websites and mail server logs is a serious invasion of a person’s privacy, and should be omitted from the back up logs.&lt;/p&gt;
&lt;p&gt;This is especially so when currently there is no requirement that cyber café owners maintain their logs under conditions of utmost secrecy and confidence.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
 
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cyber-cafe-rules'&gt;https://cis-india.org/internet-governance/blog/cyber-cafe-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-14T10:32:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cis-joins-global-commission-on-internet-governance-research-advisory-network">
    <title>CIS joins the the Global Commission on Internet Governance Research Advisory Network</title>
    <link>https://cis-india.org/news/cis-joins-global-commission-on-internet-governance-research-advisory-network</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has joined the Research Advisory Committee for the Global Commission on Internet Governance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Mark Raymond on behalf of Dr. Fen Osler Hampson and Dr. Patricia Lewis, as well as Dr. Laura DeNardis invited Sunil Abraham to join this network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Research Advisory Network for the Global Commission on Internet Governance (GCIG) is a joint project of the Centre for International Governance and Chatham House (the Royal Institute of International Affairs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GCIG, which is chaired by Swedish Foreign Minister Carl Bildt, is a two-year initiative that will present a comprehensive analysis and recommendations on the future of multi-stakeholder Internet governance. It was announced in conjunction with the World Economic Forum in Davos, Switzerland on 22 January 2014. The press release, list of commission members and Frequently Asked Questions can be found &lt;a class="external-link" href="https://webmail.chathamhouse.org/owa/redir.aspx?C=ce2942f02337492e9eed18c09a0a56dd&amp;amp;URL=http%3a%2f%2fwww.ourinternet.org"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Research Advisory Network is an indispensable component of the GCIG. It will consist of a group of distinguished scholars and experts who provide input to the Commission in several ways:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Identify and prioritize Internet governance and Internet policy related issues within the GCIG mandate;&lt;/li&gt;
&lt;li&gt;Provide expert briefings to the members of the Commission&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Conduct research and analysis on a commissioned basis, both for GCIG meeting preparatory materials and for inclusion in the companion research volume that will be issued alongside the formal commission report;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provide peer review of written materials produced in support of the Commission’s work.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The Research Advisory Network will be led by Dr. Laura DeNardis, who has agreed to serve as the Research Director for the GCIG; will be supported by Dr. Mark Raymond at CIGI and by Ms. Caroline Baylon at Chatham House.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If you would like further information or have any questions, please feel free to contact Mark Raymond at &lt;a class="mail-link" href="mailto:mraymond@cigionline.org"&gt;mraymond@cigionline.org&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cis-joins-global-commission-on-internet-governance-research-advisory-network'&gt;https://cis-india.org/news/cis-joins-global-commission-on-internet-governance-research-advisory-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-06T05:20:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cis-joins-the-christchurch-call-advisory-network">
    <title>CIS joins the Christchurch Call Advisory Network</title>
    <link>https://cis-india.org/internet-governance/news/cis-joins-the-christchurch-call-advisory-network</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society's  application for membership of the Christchurch Call Advisory Network has been accepted! As a part of this network, we, along with other civil society groups based out of various jurisdictions, would be providing inputs on making the Call a robust, human rights-centred initiative. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Christchurch Call Advisory Network membership has been drawn from interested civil society groups, who represent a range of perspectives, including human rights, freedom of expression, digital rights, counter-radicalization, victim support and public policy. Many of the Advisory Network members have been engaged on the Christchurch Call since its launch and are committed to continuing to share their expertise.&lt;/p&gt;
&lt;h3&gt;The Christchurch Call Advisory Network&lt;/h3&gt;
&lt;ul class="org-list"&gt;
&lt;li&gt;Access Now&lt;/li&gt;
&lt;li&gt;Africa Digital Policy Project&lt;/li&gt;
&lt;li&gt;Annenberg Public Policy Center, University of Pennsylvania&lt;/li&gt;
&lt;li&gt;Article 19&lt;/li&gt;
&lt;li&gt;Association for Progressive Communications&lt;/li&gt;
&lt;li&gt;Brookings Institution&lt;/li&gt;
&lt;li&gt;Center for Humane Technology&lt;/li&gt;
&lt;li&gt;Centre for Internet and Society, India&lt;/li&gt;
&lt;li&gt;Chicago Project on Security and Threats, University of Chicago&lt;/li&gt;
&lt;li&gt;Committee to Protect Journalists&lt;/li&gt;
&lt;li&gt;Council on American-Islamic Relations (CAIR)&lt;/li&gt;
&lt;li&gt;Dangerous Speech Project&lt;/li&gt;
&lt;li&gt;Data &amp;amp; Society&lt;/li&gt;
&lt;li&gt;Electronic Frontier Foundation&lt;/li&gt;
&lt;li&gt;French National Bar Council&lt;/li&gt;
&lt;li&gt;Global Disinformation Index&lt;/li&gt;
&lt;li&gt;Global Forum for Media Development (GFMD)&lt;/li&gt;
&lt;li&gt;Global Partners Digital&lt;/li&gt;
&lt;li&gt;Global Network Initiative&lt;/li&gt;
&lt;li&gt;Hedayah Center&lt;/li&gt;
&lt;li&gt;Human Rights Centre, UC, Berkeley School of Law&lt;/li&gt;
&lt;li&gt;ICT for Peace Foundation&lt;/li&gt;
&lt;li&gt;Institute for Strategic Dialogue&lt;/li&gt;
&lt;li&gt;International Cyber Policy Centre (Australian Strategic Policy Institute)&lt;/li&gt;
&lt;li&gt;Internet Governance Project, Georgia Tech&lt;/li&gt;
&lt;li&gt;Internet NZ&lt;/li&gt;
&lt;li&gt;Internet Sans Frontières&lt;/li&gt;
&lt;li&gt;Islamic Women's Council of New Zealand&lt;/li&gt;
&lt;li&gt;Life After Hate&lt;/li&gt;
&lt;li&gt;Netsafe&lt;/li&gt;
&lt;li&gt;New America's Open Technology Institute (New America Foundation)&lt;/li&gt;
&lt;li&gt;NZ Council for Civil Liberties&lt;/li&gt;
&lt;li&gt;Reporters Without Borders (RSF)&lt;/li&gt;
&lt;li&gt;Social Media Governance Initiative, Yale Law School&lt;/li&gt;
&lt;li&gt;Syrian Archive&lt;/li&gt;
&lt;li&gt;Tech Against Terrorism&lt;/li&gt;
&lt;li&gt;The International Muslim Association of New Zealand&lt;/li&gt;
&lt;li&gt;The Internet Society&lt;/li&gt;
&lt;li&gt;Tony Blair Institute for Global Change&lt;/li&gt;
&lt;li&gt;Wellington Abrahamic Council of Jews, Christians, and Muslims (NZ)&lt;/li&gt;
&lt;li&gt;WITNESS&lt;/li&gt;
&lt;li&gt;Women’s Organisation of the Waikato Muslim Association&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Elina Noor (Visiting Fellow, Institute of Strategic and International Studies Malaysia)&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Matthew Shears (Internet and telecommunications policy consultant)&lt;/small&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cis-joins-the-christchurch-call-advisory-network'&gt;https://cis-india.org/internet-governance/news/cis-joins-the-christchurch-call-advisory-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-09-25T13:57:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india">
    <title>CIS in Top 50 Tech Blogs of India</title>
    <link>https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is on the 30th position among the top technology blogs in India. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;This was published by &lt;a class="external-link" href="http://www.rebateszone.com/top-50-technology-blogs-in-india"&gt;rebateszone&lt;/a&gt; on October 7, 2015.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Infographic courtesy: Renuka Thakur&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The world of tech blogs is getting bigger and bigger, by time people are getting more and more interested in tech related items, it’s the only reason why we have seen such significant surge in tech blogs during the past few years. So the query that becomes difficult with every minute passing is that which of the tech blogs are worth your time? To help you on this we have created a list of top 50 tech bloggers in India, These weblogs are written by pros in the field, you might find numerous lists on the internet on this particular topic but you won’t be able to find more thorough and handy list that this as we have handpicked each and every blog in this list, we have organized these blogs according to the quality of posts. The other lists that you can find on the internet are sorted according to Alexa rank or number of incoming links, they have just produced those listed for the purpose of forming a new post but this list is produced according to the quality. If you want to stay updated with technology related news, developments etc., then we would recommend you to follow the following 50 tech blogs regularly:&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th class="tg-fvov"&gt;Sr No.&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Website/Blog&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Facebook&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Twitter&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;1&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.fonearena.com/"&gt;fonearena.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;165,050&lt;/td&gt;
&lt;td class="tg-14nr"&gt;34,583&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;2&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.alltechbuzz.net/"&gt;alltechbuzz.net&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;262,568&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,706&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;3&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.bgr.in/"&gt;bgr.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;143,145&lt;/td&gt;
&lt;td class="tg-14nr"&gt;190,922&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;4&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://telecomtalk.info/"&gt;telecomtalk.info&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;41,205&lt;/td&gt;
&lt;td class="tg-baqh"&gt;21,080&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;5&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.medianama.com/"&gt;medianama.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;11,238&lt;/td&gt;
&lt;td class="tg-14nr"&gt;241,121&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;6&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techulator.com/"&gt;techulator.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;9,703&lt;/td&gt;
&lt;td class="tg-baqh"&gt;238&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;7&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.infosys.com/"&gt;infosys.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;696,536&lt;/td&gt;
&lt;td class="tg-14nr"&gt;164,452&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;8&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.9lessons.info/"&gt;9lessons.info&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;23,945&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,499&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;9&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://phoneradar.com/"&gt;phoneradar.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;14,898&lt;/td&gt;
&lt;td class="tg-14nr"&gt;8,381&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;10&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.indianweb2.com/"&gt;indianweb2.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,738&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,427&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;11&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://techpp.com/"&gt;techpp.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;10,221&lt;/td&gt;
&lt;td class="tg-14nr"&gt;17,661&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;12&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://techlomedia.in/"&gt;techlomedia.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;16,578&lt;/td&gt;
&lt;td class="tg-baqh"&gt;6,452&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;13&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.techlila.com/"&gt;techlila.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;20,252&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,904&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;14&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techtricksworld.com/"&gt;techtricksworld.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;5,331&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,726&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;15&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.makingdifferent.com/"&gt;makingdifferent.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;7,424&lt;/td&gt;
&lt;td class="tg-14nr"&gt;—–&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;16&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.tipsclear.com/"&gt;tipsclear.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;687&lt;/td&gt;
&lt;td class="tg-baqh"&gt;15,007&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;17&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.hackpundit.com/"&gt;hackpundit.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;40&lt;/td&gt;
&lt;td class="tg-14nr"&gt;315&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;18&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.ampercent.com/"&gt;ampercent.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,056&lt;/td&gt;
&lt;td class="tg-baqh"&gt;413&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;19&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.nirmaltv.com/"&gt;nirmaltv.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;26,261&lt;/td&gt;
&lt;td class="tg-14nr"&gt;6,293&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;20&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://pitechnologies.org/"&gt;pitechnologies.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,965&lt;/td&gt;
&lt;td class="tg-baqh"&gt;49&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;21&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.seotechyworld.com/"&gt;seotechyworld.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;9,335&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,977&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;22&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.igt.in/"&gt;igt.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;12,997&lt;/td&gt;
&lt;td class="tg-baqh"&gt;666&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;23&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.hacktrix.com/"&gt;hacktrix.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;9,374&lt;/td&gt;
&lt;td class="tg-14nr"&gt;196&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;24&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://thebleg.com/"&gt;technodify.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;26,318&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,958&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;25&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://webtrickz.com/"&gt;webtrickz.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,906&lt;/td&gt;
&lt;td class="tg-14nr"&gt;907&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;26&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.wpxbox.com/"&gt;wpxbox.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;16,938&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,242&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;27&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.itechcode.com/"&gt;itechcode.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,666&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,749&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;28&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techfishy.com/"&gt;techfishy.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;4,791&lt;/td&gt;
&lt;td class="tg-baqh"&gt;114&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;29&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.zensar.com/"&gt;zensar.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;7,269&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,778&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;30&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://cis-india.org/"&gt;cis-india.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;—–&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,795&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;31&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://robosoftin.com/"&gt;robosoftin.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;664&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,892&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;32&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://digitaldimensions4u.com/"&gt;digitaldimensions4u.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,079&lt;/td&gt;
&lt;td class="tg-baqh"&gt;583&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;33&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.campustimespune.com/"&gt;campustimespune.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,121&lt;/td&gt;
&lt;td class="tg-14nr"&gt;278&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;34&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://msystechnologies.com/"&gt;msystechnologies.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;325&lt;/td&gt;
&lt;td class="tg-baqh"&gt;455&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;35&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://techsplurge.com/"&gt;techsplurge.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,797&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,140&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;36&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.zensoftservices.com/"&gt;zensoftservices.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;203&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,499&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;37&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.iltb.net/"&gt;iltb.net&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,994&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,675&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;38&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://savedelete.com/"&gt;savedelete.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;19,978&lt;/td&gt;
&lt;td class="tg-baqh"&gt;10,728&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;39&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.minterest.org/"&gt;minterest.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,033&lt;/td&gt;
&lt;td class="tg-14nr"&gt;12,867&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;40&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://thepockettech.com/"&gt;thepockettech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;22,346&lt;/td&gt;
&lt;td class="tg-baqh"&gt;12,375&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;41&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.thetechbulletin.com/"&gt;thetechbulletin.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,522&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,292&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;42&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.mobientech.com/"&gt;mobientech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;525&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,359&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;43&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.directingit.com/"&gt;directingit.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;98&lt;/td&gt;
&lt;td class="tg-14nr"&gt;27&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;44&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://itpreneurpune.com/"&gt;itpreneurpune.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,356&lt;/td&gt;
&lt;td class="tg-baqh"&gt;76&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;45&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://freaksense.com/"&gt;codemink.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;5,021&lt;/td&gt;
&lt;td class="tg-14nr"&gt;196&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;46&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://udayarumilli.blogspot.com/"&gt;udayarumilli.blogspot.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;103&lt;/td&gt;
&lt;td class="tg-baqh"&gt;63&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;47&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://saadhvi.com/"&gt;saadhvi.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;56&lt;/td&gt;
&lt;td class="tg-14nr"&gt;44&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;48&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.taraspan.com/global/"&gt;taraspan.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;8&lt;/td&gt;
&lt;td class="tg-baqh"&gt;310&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;49&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://cloudnowtech.com/"&gt;cloudnowtech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;145&lt;/td&gt;
&lt;td class="tg-14nr"&gt;55&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;50&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://keshavatech.com/"&gt;keshavatech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,953&lt;/td&gt;
&lt;td class="tg-baqh"&gt;18,139&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Here is the Infographic for top 50 tech blogs in India:&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Techblog50.png" alt="null" class="image-inline" title="Techblog 50" /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india'&gt;https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T06:24:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/gni-annual-report-mentions-cis">
    <title>CIS in GNI Annual Report</title>
    <link>https://cis-india.org/news/gni-annual-report-mentions-cis</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) joined the Global Network Intiative (GNI) in March 2012. Recently, GNI brought out its Annual Report. Sunil Abraham is quoted in it.&lt;/b&gt;
        &lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CISGNI.png/@@images/386c032d-ef13-4f28-ae35-6aca5d3a0da8.png" alt="CIS-GNI" class="image-inline" title="CIS-GNI" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;&lt;span class="discreet"&gt;GNI participants Sunil Abraham - Centre for Internet and Society (second from left) and Cynthia Wong - Center for Democracy and Technology (right) at the Google Internet at Liberty 2012 Conference, May 23, 2012. Also pictured (left to right): Dunja Mijatovic´ - OSCE Representative on Freedom of the Media, Judy Woodruff (Moderator) - Senior Correspondent, PBS Newshour, Mohamed El Dahshan - writer, journalist.&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span class="discreet"&gt;Credit: Tony Powell&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;An increasingly global network&lt;/h3&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"Technological  development happens too quickly for us to purely depend on govern­ment  regulation. Self-regulation has an important role to play in keeping up  with these rapid changes … we will influence GNI norms using our Indian  perspective."&lt;br /&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  key objective for GNI is increasing its membership across all  constituencies with a focus on developing countries and emerging  markets. In 2012, GNI welcomed Azerbaijani press freedom organization the  Institute for Reporters’ Freedom and Safety as the global Internet  governance community gathered in Baku, Azerbaijan for the Internet  Governance Forum. Their participation, alongside other new civil society  participant, the Centre for Internet &amp;amp; Society based in Bangalore,  India represents a step toward further internationalizing the GNI  network. Other new members include the George Washington University Law  School and Christine Bader from the Kenan Institute for Ethics at Duke  University.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gni-annual-report.pdf" class="internal-link"&gt;Click to read the GNI Annual Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gni-annual-report.pdf" class="internal-link"&gt;&lt;span class="external-link"&gt; &lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://www.globalnetworkinitiative.org/newsandevents/CIS_Joins.php"&gt;Click to read the news&lt;/a&gt; of CIS joining the GNI in 2012&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/gni-annual-report-mentions-cis'&gt;https://cis-india.org/news/gni-annual-report-mentions-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-25T07:31:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet">
    <title>CIS highlights changes ushered in by the Internet</title>
    <link>https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet</link>
    <description>
        &lt;b&gt;As part of its fifth anniversary celebrations, the Centre for Internet and Society (CIS) has organised an exhibition showcasing its accomplishments, besides a series of talks by experts on the changes ushered in by the Internet. The exhibition will remain open till Thursday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/cis-highlights-changes-ushered-in-by-the-internet/article4737997.ece"&gt;published in the Hindu&lt;/a&gt; on May 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, a talk will be held at 6 p.m. on “Cyber security, privacy  and surveillance”. Also, Laird Brown, strategic planner and writer, and  Purba Sarkar, associate producer with the cyber security film project,  will make presentations on cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The valedictory will have talks by Kannada writer Chandrashekar Kambar  on “Kannada in modern era”, while member of Kannada Software Committee  U.B. Pavanja will speak on “From palm leaf to tablet”. This will be  followed by a Carnatic music programme by Nirmita Narasimha. The CIS has  also invited the public to be its auditors by displaying its account  books and contracts, which shows how it has spent the Rs. 13.13 crore  received from donors. The exhibition is open from 10 a.m. to 8 p.m.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet'&gt;https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-22T06:06:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh">
    <title>CIS Cybersecurity Series (Part 24) – Shantanu Ghosh</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh</link>
    <description>
        &lt;b&gt;CIS interviews Shantanu Ghosh, Managing Director, Symantec Product Operations, India, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;“Remember
that India is also a land where there are a lot of people who are beginning to
use computing devices for the first time in their lives. For many people, their
smartphone is their first computing device because they have never had
computers in the past. For them, the challenge is how do you make sure that
they understand that that can be a threat too. It can be a threat not only to
their bank accounts, with their financial information, but even to their
private lives.”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twenty fourth
installment of the CIS Cybersecurity Series.”&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.&lt;/p&gt;
&lt;p&gt;Shantanu Ghosh is the Managing Director of Symantec
Product Operations, India. He also runs the Data Centre Security Group for
Symantec globally.&lt;/p&gt;
&lt;iframe src="https://www.youtube.com/embed/dFN2_R0HzbA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-07-15T14:58:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle">
    <title>CIS Cybersecurity Series (Part 23) – Justin Searle</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle</link>
    <description>
        &lt;b&gt;CIS interviews Justin Searle, security expert, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"I think that people here in India, just like everywhere else, are broadening the areas where security can be applied. We see elsewhere, like in the United States and in Europe, that a lot of security researchers are starting to get into not just control systems, but also embedded devices and hardware and wireless... And we are seeing the same trends here in India as well. It is fun to see that growth and continual development, and not only that, but we are seeing security projects and research coming out of India, that's unqiue and fresh and contributing back to what originally came more from the United States and Europe."&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twenty
third installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Justin Searle is the managing partner for Utilisec.
Utisix provides security services to the energy sector. They also assist oil,
water, gas, and manufacturing companies. Justin specializes in security
assessments and finding vulnerabilities in systems.&amp;nbsp;&lt;/p&gt;
&lt;iframe src="https://www.youtube.com/embed/ufOV8DXzQuA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development
Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-07-15T14:44:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous">
    <title>CIS Cybersecurity Series (Part 22) - Anonymous</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous</link>
    <description>
        &lt;b&gt;CIS interviews a Tibetan security researcher and information activist, as part of the Cybersecurity Series. He prefers to remain anonymous.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"I
don't know technology but I am aware of the information people share with me.
So yes, they can track you down through your mobile phone. The last time I was
in Nepal, I met a westerner. We went to this restaurant and she asked me to
take the battery out of the phone. That was the first time I had heard of this
and so when I asked why she said that it is possible that people had followed
us and it has happened to other Tibetans in Nepal..."&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twenty second installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube.com/embed/glsAFfj7tV4" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-07-13T13:40:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering">
    <title>CIS Cybersecurity Series (Part 21) – Gyanak Tsering</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering</link>
    <description>
        &lt;b&gt;CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;“I have three mobile phones but I use only one to exchange information to and from Tibet. I don't give that number to anyone and nobody knows about it. High security forces me to use three phones. Usually a mobile phone can be tracked easily in many ways, especially by the network provider but my third mobile phone is not registered so that makes sure that the Chinese government cannot track me. The Chinese have a record of all mobile phone numbers and they can block them at anytime. But my third number cannot be traced and that allows me to communicate freely. This is only for security reasons so that my people in Tibet don't get into trouble.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society presents its twenty-first installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gyanak Tsering is a Tibetan monk in exile, studying at Kirti Monastery, Dharamshala. He came to India in 1999, and has been using the internet and mobile phone technology, since 2008, to securely transfer information to and from Tibet. Tsering adds a new perspective to the cybersecurity debate and explains how his personal security is interlinked with internet security and mobile phone security.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/mqSw3cy7MEc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-06T05:08:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah">
    <title>CIS Cybersecurity Series (Part 20) – Saumil Shah</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah</link>
    <description>
        &lt;b&gt;CIS interviews Saumil Shah, security expert, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;i&gt;“If you look at the evolution of targets, from the 2000s to the present day, the shift has been from the servers to the individual. Back in 2000, the target was always servers. Then as servers started getting harder to crack, the target moved to the applications hosted on the servers, as people started using e-commerce applications even more. Eventually, as they started getting harder to crack, the attacks moved to the user's desktops and the user's browsers, and now to individual user identities and to the digital personas.”&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society presents its twentieth installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saumil Shah is a security expert based in Ahmedabad. He has been working in the field of security and security related software development for more than ten years, with a focus on web security and hacking.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/2V39K8y68mc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-06T05:03:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy">
    <title>CIS Cybersecurity Series (Part 14) – Menaka Guruswamy</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy</link>
    <description>
        &lt;b&gt;CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;div&gt;&lt;em&gt;"The courts have rarely used privacy to stop the Indian state from getting into someone's business. So jurisprudentially, it is a weak challenge when you mount a rights based or a privacy right challenge against surveillance by the state. Because the answer of the state to that has always been, and as has been Obama's answer in the United States, that there are national security concerns. And usually national security will trump individual privacy."&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its fourteenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, and a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India. She has law degrees from all three schools, with a focus on Constitutional Law and Public International Law.&amp;nbsp;Guruswamy has worked at the Office of the Attorney General of India, the highest office that represents the federal government of India in the Supreme Court of India.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
http://youtu.be/GCDD6Z-UrGI
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;iframe src="//www.youtube.com/embed/GCDD6Z-UrGI" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2014-07-21T10:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash">
    <title>CIS Cybersecurity Series (Part 13) - Pranesh Prakash</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash</link>
    <description>
        &lt;b&gt;CIS interviews Pranesh Prakash, lawyer and policy director with Centre for Internet and Society, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;div&gt;
&lt;div&gt;&lt;i&gt;"When it comes to things cyber we completely lose our sense of proportion. While killing someone by negligence only attracts two years of punishment, saying something that people can define "offensive" attracts even more under 66A of the Information Technology Act. Something that can be a nuisance, under the Criminal Laws, can attract up to six months punishment, whereas under the IT act, it is up to three years..." - Pranesh Prakash, lawyer and policy director, Centre for Internet and Society&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its thirteenth installment of the CIS Cybersecurity Series.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Pranesh is a Policy Director with the Centre, and is a graduate of the National Law School of India University, Bangalore, with a degree in Arts and Law.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/gUDeTeQ6DAg" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2014-01-20T06:20:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
