<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2696 to 2710.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/interview-with-anne-cavoukian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-symposium"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/what-is-dilligaf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/dialogue-cafe"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/here-comes-gowda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/facebook-tracking-footprints"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/bill-could-kill-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/sopa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/art-activism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-national-policy-information-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/droidcon-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/netizen-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/once-a-flash"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/interview-with-anne-cavoukian">
    <title>An Interview with Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada</title>
    <link>https://cis-india.org/internet-governance/interview-with-anne-cavoukian</link>
    <description>
        &lt;b&gt;Elonnai Hickok interviewed Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada. The full interview is reproduced below.&lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;When Canada weighed a broad privacy legislation against sectoral legislation, was the decision close?&amp;nbsp; What were the most decisive factors?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Canada’s legislative privacy regime consists of both broad and sectoral privacy legislation.&lt;br /&gt;&lt;br /&gt;Broadly, the use of personal information in Canadian commercial activities is regulated by federal legislation under the &lt;em&gt;&lt;a class="external-link" href="http://www.priv.gc.ca/leg_c/leg_c_p_e.cfm"&gt;Personal Information Protection and Electronic Documents Act (PIPEDA)&lt;/a&gt;&lt;/em&gt;, or by provincial legislation that is “substantially similar” to PIPEDA, or by provincial legislation that is “substantially similar” to &lt;em&gt;PIPEDA&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;Sectorally, a prime example is the protection of personal health information under Ontario's &lt;em&gt;&lt;a class="external-link" href="http://www.e-laws.gov.on.ca/html/statutes/english/elaws_statutes_04p03_e.htm"&gt;Personal Health Information Protection Act, 2004 (PHIPA)&lt;/a&gt;&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;Regarding the decisive factors surrounding Parliament's passing of a broad private sector privacy statute, you may know that oversight of PIPEDA falls within the jurisdiction of the &lt;a class="external-link" href="http://www.priv.gc.ca/leg_c/leg_c_p_e.cfm"&gt;Office of the Privacy Commissioner of Canada (OPC)&lt;/a&gt;. Accordingly, you may wish to focus your contact with the OPC regarding your question.&amp;nbsp; In addition, &lt;a class="external-link" href="http://www.ic.gc.ca/ic_wp-pa.htm"&gt;Industry Canada&lt;/a&gt; may have some helpful resources regarding the federal government’s decision to enact &lt;em&gt;PIPEDA&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Do you see the different perceptions and cultural understandings of privacy as something to be addressed through legislation?&amp;nbsp; If not, do you think it should be addressed at all?&amp;nbsp; How? &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;In an era marked by the widespread use of new information technologies, globalization, and the international flow of personal information, the establishment of global privacy standards is required to effectively protect personal privacy. Fortunately, an international community of data protection commissioners is hard at work contributing to the establishment of a set of global privacy principles. At the annual International Data Protection Commissioners Conference in 2005, Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, chaired a Working Group of Data Protection Commissioners that led to the &lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/gps.pdf"&gt;Creation of a Global Privacy Standard&lt;/a&gt;. Such a principled but flexible approach can also be seen, for example, in the landmark &lt;a class="external-link" href="http://www.privacybydesign.ca/content/uploads/2010/11/pbd-resolution.pdf"&gt;&lt;em&gt;Privacy by Design&lt;/em&gt; (PbD) resolution&lt;/a&gt; adopted unanimously, in 2010, by the international Privacy Authorities and Regulators at the International Conference of Data Protection and Privacy Commissioners in Jerusalem.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The resolution recognizes &lt;em&gt;&lt;a class="external-link" href="http://privacybydesign.ca/about/principles/"&gt;PbD&lt;/a&gt;&lt;/em&gt; as an “essential component of fundamental privacy protection” – an International Standard, and urges its adoption in regulations and legislation around the world. Governments that employ this internationally recognized standard will be able to both protect privacy and address local and national priorities.&lt;a name="fr2" href="#fn2"&gt;[2]&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;How does the Canadian model implement self-regulation of privacy standards? How is that balanced against legal enforcement of privacy legislation?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;In Canada, as elsewhere, private sector privacy regulation recognizes the dual purposes of protecting the individual's right to privacy, on the one hand, and recognizing the commercial need for access to personal information, on the other.&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt;&lt;em&gt;&lt;br /&gt;&lt;br /&gt;PIPEDA&lt;/em&gt; furthers these two purposes by tying a set of flexible, technology-neutral privacy principles to a statutory framework of rules governing the collection, use, and disclosure of personal information.&lt;br /&gt;&lt;br /&gt;In particular, Part I of PIPEDA provides the overarching statutory framework, while Schedule I, which was borrowed from the Canadian Standards Association’s Model Code for the Protection of Personal Information, provides flexible, technology-neutral privacy principles.&amp;nbsp; To accomplish the dual purposes that animate PIPEDA and its Schedule, Canada’s Federal Court of Appeal has directed that the interpretation and application of this regulatory framework should be guided by "flexibility, common sense and pragmatism."&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Such an approach allows organizations to address their own goals and priorities within a privacy protective framework.&amp;nbsp; Moreover, by incorporating the flexible principles of PbD, organizations can "go beyond mere legal compliance with notice, choice, access, security and enforcement requirements."&amp;nbsp; Instead, they can be empowered to design their own responsive approaches to risk management and privacy-related innovation, within the context of the relevant regulatory framework.&amp;nbsp; This approach allows organizations to develop doubly-enabling, positive-sum solutions that are win/win in nature and appropriate given the size and nature of the organization, the personal information it manages, and the range of risks, opportunities, and solutions available.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Does Canada favor private forms of redress or agency/state enforcement to prevent and remedy privacy violations?&amp;nbsp; In what circumstances is one more effective than the other?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Canadian privacy legislation includes both state enforcement and private forms of redress; neither is necessarily favoured.&lt;br /&gt;&lt;br /&gt;For example, under &lt;em&gt;PHIPA&lt;/em&gt;, the Attorney General may impose fines of up to $50,000 for individuals and $250,000 for corporations who are found to be in breach of &lt;em&gt;PHIPA&lt;/em&gt;. Further, our office has broad powers of investigation and can directly order a custodian to comply with its obligations.&amp;nbsp; An individual affected by a Commissioner’s final &lt;em&gt;PHIPA &lt;/em&gt;order may commence a proceeding in the Ontario Superior Court for damages for actual harm suffered.&lt;br /&gt;&lt;br /&gt;Another example is under &lt;em&gt;PIPEDA&lt;/em&gt; where contravention can result in fines of up to $100,000 depending upon the type and severity of the matter. Further, the federal privacy Commissioner has powers to investigate and report findings with respect to privacy complaints.&amp;nbsp; Following the release of the Commissioner’s report, a complainant may apply to the Federal Court to seek remedies that include damages and an order requiring an organization to correct its practices.&lt;br /&gt;&lt;br /&gt;Generally, fines and other penalties imposed on individuals and corporations by the government are effective in deterring certain actions and protecting the public from a variety of harmful practices.&amp;nbsp; On the other hand, a private right of action may be effective when a particular individual is harmed by an individual or corporation and is seeking damages to compensate or redress that particular harm.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;What types of privacy violations are the most common? How have these been addressed?&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;The most common types of privacy violations are inadvertent disclosures or privacy breaches of personal information, including personal health information.&amp;nbsp; In particular, these violations usually stem from the improper retention, transfer and disclosure of personal information.&lt;br /&gt;&lt;br /&gt;Privacy breaches are addressed in a variety of ways, depending on the type and amount of information disclosed.&amp;nbsp; For example, under &lt;em&gt;PHIPA&lt;/em&gt;, if health information is stolen, lost, or accessed by unauthorized persons, the health information custodian must notify the affected individual at the first reasonable opportunity and should take immediate steps to contain the breach.&amp;nbsp; Further, the Commissioner may order the health information custodian to take corrective action such as requiring the custodian to implement a certain procedure when handling personal health information or conduct privacy training.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;What forms of privacy education has Canada pursued?&amp;nbsp; What audiences have been targeted? Which efforts have been the most successful and why?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Canadian institutions and organizations have pursued a wide variety of privacy education initiatives including programs that award professional designations (e.g. &lt;a class="external-link" href="https://www.privacyassociation.org/certification/"&gt;IAPP&lt;/a&gt;, &lt;a class="external-link" href="http://capapa.org/"&gt;CAPAPA&lt;/a&gt;, &lt;a class="external-link" href="http://www.ipsi.utoronto.ca/"&gt;University of Toronto Identity, Privacy and Security Initiative&lt;/a&gt;, &lt;a class="external-link" href="http://www.extension.ualberta.ca/study/government-studies/iapp/"&gt;University of Alberta Program&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;Our Office has led a wide variety of educational initiatives to spread the word about privacy protection and freedom of information under our Ontario legislation. We have focused on a variety of audiences from the general public to individuals who deal with privacy and access to information issues as part of their daily professional role.&lt;br /&gt;&lt;br /&gt;Initiatives include frequent contact between our Information Officers and the public, and dozens of marketing materials geared to providing guidance (e.g. “&lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/circle-care.pdf"&gt;Circle of Care: Sharing of Personal Health Information for Health-Care purposes&lt;/a&gt;”, “&lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/hprivbreach-e.pdf"&gt;What to do When Faced With a Privacy Breach: Guidelines for the Health Sector&lt;/a&gt;”). Our Office has developed Educational Resource Guides (&lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Educational-Material/Educational-Material-Summary/?id=183"&gt;Grade 5&lt;/a&gt;, &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Educational-Material/Educational-Material-Summary/?id=184"&gt;Grade 10&lt;/a&gt;, &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Educational-Material/Educational-Material-Summary/?id=1110"&gt;Grades 11/12&lt;/a&gt;), which have been added to the formal Ontario curriculum to help teachers educate about privacy protection. Commissioner Cavoukian participates in extensive presentations and speeches at numerous conferences and events. As well, representatives from our Office reach out into the community to educate about our offerings and role (hospitals, conference, community events etc.). In addition, to educate Ontarians about privacy protection, the IPC also allots significant resources to many marketing initiatives including a &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Newsletters/Newsletters-Summary/?id=1100"&gt;quarterly e-newsletter&lt;/a&gt;, video production, and social media outreach. Most recently, we circulated an &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/IPC-Corporate/IPC-Corporate-Summary/?id=482"&gt;online tool kit &lt;/a&gt;(available via USB as well), to assist new Freedom of Information and Protection of Privacy Co-ordinators in the public sector. Most of our resources are available in English and French.&lt;br /&gt;&lt;br /&gt;Without a doubt, the IPC’s most successful educational effort thus far is in the area of PbD, now an international standard. This Ontario-made solution was created by Commissioner Cavoukian who has led the IPC in partnering with global stalwarts such as IBM, Intel, and Nokia to advance Privacy by Design, and to foster innovation in many fields, including &lt;a class="external-link" href="http://www.privacybydesign.ca/content/uploads/2011/02/pbd-olg-facial-recog.pdf"&gt;biometrics&lt;/a&gt;, the &lt;a class="external-link" href="http://www.privacybydesign.ca/content/uploads/2011/02/pbd-ont-smartgrid-casestudy.pdf"&gt;Smart Grid&lt;/a&gt; and even &lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/AVAwhite6.pdf"&gt;Targeted Advertising&lt;/a&gt;. &lt;em&gt;Privacy by Design&lt;/em&gt; knows no boundaries and makes sense for everyone — especially businesses. Not only is it cheaper to build in privacy before a breach occurs, it is also a compelling way to win the trust of clients and build a successful brand.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;What [have] proven to be [the main] challenges or obstacles to protecting privacy in Canada?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;The most common obstacle to protecting privacy is that key stakeholders hold on to misconceptions about privacy.&amp;nbsp; &lt;br /&gt;Misconception #1 – Privacy is dead or obsolete.&amp;nbsp; &lt;br /&gt;Misconception #2 – Privacy stops us from performing our job.&lt;br /&gt;Misconception #3 – With the massive growth of online social media, you cannot have both widespread connectivity and privacy.&lt;br /&gt;&lt;br /&gt;Not only do these misconceptions contradict each other, they are both dead wrong!&lt;br /&gt;&lt;br /&gt;Privacy is alive and well and more relevant than ever. Consider, for example, that the same technologies that serve to threaten privacy may also be enlisted to support it.&amp;nbsp; Properly understood, privacy is becoming increasingly critical to achieving success in the new economy.&amp;nbsp; In this environment, PbD offers a principled, flexible, and technology-neutral vehicle for engaging with privacy issues, and for resolving them in ways that support multiple outcomes in a full functionality, positive-sum, win-win scenario.&lt;br /&gt;&lt;br /&gt;It does so by ensuring that privacy is built in right up front, directly into the design specifications and architecture of new systems and processes.&amp;nbsp; &lt;em&gt;&lt;br /&gt;&lt;br /&gt;PbD&lt;/em&gt; seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through a dated, zero-sum approach, where unnecessary trade-offs are made. PbD avoids the pretense of false dichotomies or unnecessary trade-offs, such as privacy vs. security, demonstrating that it is possible to have both. For more on PbD, go to &lt;a class="external-link" href="http://www.privacybydesign.ca/"&gt;www.privacybydesign.ca&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Dr. Ann Cavoukian, Ph.D., Information and Privacy Commissioner, Ontario, Canada&lt;/h3&gt;
&lt;p&gt;Dr. Ann Cavoukian is recognized as one of the leading privacy experts in the world. Noted for her seminal work on Privacy Enhancing Technologies (PETs) in 1995, her concept of Privacy by Design seeks to proactively embed privacy into the design specifications of information technology and accountable business practices, thereby achieving the strongest protection possible. In October, 2010, regulators from around the world gathered at the annual assembly of International Data Protection and Privacy Commissioners in Jerusalem, Israel, and unanimously passed a landmark Resolution recognizing &lt;em&gt;Privacy by Design&lt;/em&gt; as an essential component of fundamental privacy protection. This was followed by the U.S. Federal Trade Commission’s inclusion of &lt;em&gt;Privacy by Design&lt;/em&gt; as one of its three recommended practices for protecting online privacy – a major validation of its significance.&lt;/p&gt;
&lt;p&gt;An avowed believer in the role that technology can play in the protection of privacy, Dr. Cavoukian’s leadership has seen her office develop a number of tools and procedures to ensure that privacy is strongly protected, not only in Canada, but around the world. She has been involved in numerous international committees focused on privacy, security, technology and business, and endeavours to focus on strengthening consumer confidence and trust in emerging technology applications.&lt;/p&gt;
&lt;p&gt;Dr. Cavoukian serves as the Chair of the Identity, Privacy and Security Institute at the University of Toronto, Canada. She is also a member of several Boards including, the European Biometrics Forum, Future of Privacy Forum, RIM Council, and has been conferred a Distinguished Fellow of the Ponemon Institute. Dr. Cavoukian was honoured with the prestigious &lt;em&gt;Kristian Beckman Award&lt;/em&gt; in 2011 for her pioneering work on &lt;em&gt;Privacy by Design&lt;/em&gt; and privacy protection in modern international environments. In the same year, Dr. Cavoukian was also named by&lt;em&gt; Intelligent Utility &lt;/em&gt;Magazine as one of the Top 11 Movers and Shakers for the Global Smart Grid industry, received the SC Canada Privacy Professional of the Year Award and was honoured by the University of Alberta Information Access and Protection of Privacy Program for her positive contribution to the field of privacy. Most recently in November 2011, Dr. Cavoukian was ranked by Women of Influence Inc. as one of the top 25 Women of Influence recognizing her contribution to the Canadian and global economy.&amp;nbsp; This award follows her recognition in 2007 by the Women’s Executive Network as one of the Top 100 Most Powerful Women in Canada.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;].Information and Privacy Commissioner/Ontario, Landmark Resolution passed to preserve the Future of Privacy, &lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/2010-10-29-Resolution-e_1.pdf"&gt;http://www.ipc.on.ca/images/Resources/2010-10-29-Resolution-e_1.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;].For a discussion of how governments might employ an PbD approach to privacy regulation, see Commissioner Cavoukian’s White Paper, Privacy by Design in Law, Policy, and Practice available at:&lt;br /&gt;&lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Discussion-Papers/Discussion-Papers-Summary/?id=1095"&gt;http://www.ipc.on.ca/english/Resources/Discussion-Papers/Discussion-Papers-Summary/?id=1095&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;].See the Personal Information Protection and Electronic Documents Act, S.C. 2000, c. 5 (Can.), &lt;a class="external-link" href="http://www.canlii.org/en/ca/laws/stat/sc-2000-c-5/latest/sc-2000-c-5.html"&gt;http://www.canlii.org/en/ca/laws/stat/sc-2000-c-5/latest/sc-2000-c-5.html&lt;/a&gt;.&lt;br /&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;].&lt;em&gt;Englander v. Telus Communications Inc.&lt;/em&gt;, 2004 FCA 387, Locus Para. 38-46.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/interview-with-anne-cavoukian'&gt;https://cis-india.org/internet-governance/interview-with-anne-cavoukian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-12-03T01:26:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-symposium">
    <title>All India Privacy Symposium</title>
    <link>https://cis-india.org/internet-governance/privacy-symposium</link>
    <description>
        &lt;b&gt;Privacy India in partnership with the International Development Research Centre, Canada, Society in Action Group, Gurgaon, Privacy International, UK and Commonwealth Human Rights Initiative is organizing the All India Privacy Symposium at the India International Centre, New Delhi on Saturday, February 4, 2012.&lt;/b&gt;
        
&lt;p&gt;Since June 2010, Privacy India has been engaging in discussions with policy makers, the public and sectoral experts about privacy in India. The discussions have ranged from topics of identity and privacy, to minority rights and privacy, and consumer privacy. The findings of our research show that privacy was a neglected area of study for India in the past, however, this is changing. Advancements in technology, the introduction of e-governance initiatives like the National Fibre Optic Network, the introduction of new legislations, and debates surrounding national security, have brought privacy debates to the forefront in India. Although currently sectoral legislation deals with privacy issues, e.g., the Telegraph Act or RBI guidelines for banking, India has just begun to consider a horizontal legislation that deals comprehensively with privacy across all contexts. This conference is an opportunity to look forward to what could be the future scope of privacy in India.&lt;/p&gt;
&lt;p&gt;Privacy India was set up in collaboration with the Centre for Internet and Society, Bangalore and Society in Action Group, Gurgaon, under the auspices of an international organization ‘Privacy International’. Privacy International is a non-profit group that provides assistance to civil society groups, governments, international and regional bodies, the media and the public in a number of countries. For more info, visit its &lt;a class="external-link" href="https://www.privacyinternational.org/"&gt;website. &lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is a public meeting. For participation in the event, get in touch with Elonnai (&lt;a class="external-link" href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;)&lt;/p&gt;
&lt;h2&gt;Symposium Advisors&lt;/h2&gt;
&lt;p&gt;Sunil Abraham, Centre for Internet &amp;amp;Society (&lt;a href="https://cis-india.org/" class="external-link"&gt;www.cis-india.org&lt;/a&gt;)&lt;br /&gt;Rajan Gandhi, Society in Action Group&lt;br /&gt;Phet Sayo, IDRC (&lt;a class="external-link" href="http://www.idrc.org/"&gt;www.idrc.org&lt;/a&gt;)&lt;br /&gt;Gus Hosein, Privacy International (&lt;a class="external-link" href="http://www.privacyinternational.org/"&gt;www.privacyinternational.org&lt;/a&gt;)&lt;br /&gt;
Sudhir Krishnaswamy, Centre for Law and Policy Research, Bangalore (&lt;a class="external-link" href="http://www.clpr.org.in/"&gt;www.clpr.org.in&lt;/a&gt;)&lt;br /&gt;
Vickram Crishna, Privacy International (&lt;a class="external-link" href="http://www.privacyinternational.org/"&gt;www.privacyinternational.org&lt;/a&gt;)&lt;/p&gt;
&lt;h2&gt;Agenda &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:30- &lt;br /&gt;10:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00- &lt;br /&gt;10:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Welcome &amp;amp; Introduction to Privacy India&lt;/strong&gt;&lt;br /&gt;Elonnai Hickok (Policy Advocate, Privacy India)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:15- &lt;br /&gt;10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30-&lt;br /&gt;11:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel I: Privacy and Transparency&lt;/strong&gt;&lt;br /&gt;Moderator: Sunil Abraham (Executive Director, Centre for Internet &amp;amp; Society)&lt;br /&gt;Panelists: Prashant Bhushan (Senior Advocate, New Delhi), Simon Davies (Director General, Privacy International, UK), Ponnurangam K (Assistant Prof, IIIT New Delhi), Chitra Ahanthem (Journalist, Imphal), Aruna Roy (Social &amp;amp; Political Activist), Deepak Maheshwari (Director Corporate Affairs, Microsoft)&lt;br /&gt;Poster:Srishti Goyal (Law Student)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30- &lt;br /&gt;12:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel II: Privacy and E-Governance Initiatives&lt;/strong&gt;&lt;br /&gt;Moderator: Sudhir Krishnaswamy (Professor, Azim Premji University)&lt;br /&gt;Panelists: Anant Maringanti (Independent Social Researcher), Usha Ramanathan (Advocate&amp;amp;Social Activist), Ram Sewak Sharma (Director General, UIDAI)*, Gus Hosein (Executive Director, Privacy International, UK), R K Singh (Union Home Secretary, New Delhi)*, Apar Gupta (Advocate, Supreme Court of India)&lt;br /&gt;Poster: Adrija Das (Law Student)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30- &lt;br /&gt;13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30- &lt;br /&gt;14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel III: Privacy and National Security&lt;/strong&gt;&lt;br /&gt;Moderator: Justice A P Shah (Former Chief Justice, Delhi High Court)*&lt;br /&gt;Panelists: Menaka Guruswamy (Advocate, Supreme Court, New Delhi), Amol Sharma (Journalist, Wall Street Journal)*, Saikat Datta (Journalist, DNA), Eric King (Human Rights and Technology Advisor, Privacy International, UK), Prasanth Sugathan (Legal Counsel, Software Freedom Law Center) and Oxblood Ruffin&amp;nbsp; (Cult of the Dead Cow Security and Publishing Collective)&lt;br /&gt;Poster: Suchithra Menon (Law Student)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30- &lt;br /&gt;15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel IV: Privacy and Banking&lt;/strong&gt;&lt;br /&gt;Moderator: Prashant Iyengar (Associate Professor, Jindal Law University)&lt;br /&gt;Panelists: M R Umarji (Chief Legal Advisor, IBA), N A Vijayashankar (Cyber Law Expert), Sucheta Dalal (Managing Editor, MoneyLife Magazine)*, Malavika Jayaram (Advocate, Bangalore)&lt;br /&gt;Poster: Malavika Chandu (Law Student)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30- &lt;br /&gt;15:45&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:45- &lt;br /&gt;16:45&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel V: Privacy and Health&lt;/strong&gt;&lt;br /&gt;Moderator: Ashok Row Kavi (Journalist &amp;amp; LGBT Activist)&lt;br /&gt;Panelists: K K Abraham (President, Indian Network for People with HIV), Shri Sayan Chatterjee (Secretary, National Aids Control Organization)*, Dr V M Katoch (Secretary, Department of Health Research)*, Dr B S Bedi (Advisor, CDAC &amp;amp; Media Lab Asia)&lt;br /&gt;Poster: Danish Sheikh (Alternative Law Forum)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:45- &lt;br /&gt;17:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;The Way Forward&lt;/strong&gt;&lt;br /&gt;Elonnai Hickok (Policy Advocate, Privacy India)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;strong&gt;Bios of Speakers&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;Usha Ramanathan&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Usha Ramanathan is an internationally recognized expert on the jurisprudence of law, poverty and rights. She writes and speaks on leading issues like the Bhopal gas leak tragedy, mass displacement, civil liberties, criminal law, environment and the judicial process. She is involved in the UID project and has written and debated extensively on it. She is a member of Amnesty International's Advisory Panel on Economic, Social and Cultural Rights and has been called upon by the World Health Organisation as a expert on mental health on various occasions. Her writings can be found at &lt;a class="external-link" href="http://www.ielrc.org/"&gt;http://www.ielrc.org/&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;NA.Vijayashankar&lt;/h3&gt;
&lt;p&gt;NA.Vijayashankar, more popularly known as Naavi, is a Techno Legal Information Security Consultant based in Bangalore, India. Naavi is a pioneer in the field of Cyber Law in India. He is the author of the first book (1999) and first E-Book (2003) on Cyber Laws in India. He has also authored a book titled “Cyber Laws, Corporate Mantra for the Digital Era”, “Cyber Laws Demystified” and “Cyber Laws for Engineers” as well as a book on Cyber Crimes in Kannada.&lt;br /&gt;&lt;br /&gt;Naavi is the founder of &lt;a href="https://cis-india.org/internet-governance/www.cyberlawcollege.com" class="external-link"&gt;www.cyberlawcollege.com&lt;/a&gt; which is the pioneering virtual educational institution in India dedicated to Cyber Law Education. Cyber Law College presently conducts offline and virtual courses on Cyber Laws. It has conducted several courses in association with law colleges in Karnataka such as KLE Law College, Bangalore, JSS Law College, Mysore, SDM law college Mangalore and KLE Law College Hubli.&lt;br /&gt;&lt;br /&gt;Naavi is also the founder of &lt;a href="https://cis-india.org/internet-governance/www.cyberlawcollege.com" class="external-link"&gt;www.naavi.org&lt;/a&gt; the premier Cyber Law Portal in India. Naavi has been engaged in the training of Police in Tamil Nadu and Karnataka and conducts several courses in Cyber Laws for different audiences. He has been a guest faculty in a number of institutions including NPA, IDRBT, DTRI, ISACA, NADT, LBS National Academy, Judicial Academies, NALSAR, etc., as well as several law, engineering and management institutions.&lt;br /&gt;&lt;br /&gt;Naavi has over three decades of senior Corporate executive experience behind him. He has been an ex-Banker and Consultant to several Companies in IT Services. He has conducted hundreds of training sessions to professionals of various disciplines such as bankers, lawyers, chartered accountants, engineers, software professionals, police and judicial officers through workshops and in-house training programmes in cyber laws, cyber crimes, information security and related areas.&lt;/p&gt;
&lt;h3&gt;Chitra Ahanthem&lt;/h3&gt;
&lt;p&gt;Chitra Ahanthem is a features writer with Imphal Free Press, published in Imphal, Manipur. She is also a freelance writer and researcher on issues around HIV/AIDS, child rights, conflict and gender.&lt;/p&gt;
&lt;h3&gt;Baljit Singh Bedi &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Baljit Singh Bedi did his B.Tech and M.Tech. from Indian Institute of Technology (IIT), Delhi.&amp;nbsp;&amp;nbsp;&amp;nbsp; After serving for five years in the Centre for Applied Research in Electronics (CARE) IIT, Delhi he joined the Department of Information Technology (DIT), Ministry of Communication &amp;amp; IT (MCIT), Government of India.&amp;nbsp; The major responsibilities and contributions over the years cover conceptualizing, evolving and implementation of a number of major schemes/programmes and projects in the field of electronics and IT applications with primary role in healthcare. He was instrumental in starting an integrated programme in promoting the area of Electronics, IT and Electronic Medical Records (EMR) Standards in Healthcare in India. As the head of Medical Electronics &amp;amp; Telemedicine division, he was looking after the activity of promotion of e-health &amp;amp; tele–health technology and R&amp;amp;D in medical electronics and launched a number of schemes in India. He was part of the National Task Force Telemedicine in India set up by the Ministry of Health &amp;amp; Family Welfare (MoH&amp;amp;FW), Government of India and headed the Group on Standards. He was a Member of National Knowledge Commission’s Working Group on India-Health Information Network Development (I-HIND) and is part of the Advisory Group for follow-up implementation program under the consideration of MoH&amp;amp;FW.&amp;nbsp; He is actively involved in policy, development and deployment programmes of IT in Health initiatives of DIT, MoH&amp;amp;FW, and Media Lab Asia. He is a member of the National Committee set up by MoH&amp;amp;FW for EMR Standardization and Heading its Task Group on Interoperability.&amp;nbsp; He is also International Telecommunication Union (ITU) Expert for e-Health Standardization. He is Executive Member of Indian Association of Medical Informatics (IAMI) and President, Telemedicine Society of India (TSI). At present, he is an Adviser to the Centre for Development of Advanced Computing (CDAC), Scientific Society of MCIT, Government of India.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Deepak Maheshwari &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Deepak Maheshwari is Director – Corporate Affairs with Microsoft in India and responsible for interactions with the policymakers &amp;amp; regulators as well as with industry associations &amp;amp; the civil society organizations. An active participant and a keen observer of the interplay between technological innovation and socio-economic development, he has been closely associated with &lt;strong&gt;development &amp;amp; evolution of Information &amp;amp; Communication Technology policy&lt;/strong&gt;, &lt;strong&gt;law &amp;amp; regulation&lt;/strong&gt; for more than a decade and is often invited as a speaker and a contributor of articles &amp;amp; opinions in the media.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;He has been active in several trade associations and served as committee chair &amp;amp; co-chair. He served for two consecutive terms as the elected secretary in the &lt;strong&gt;ISP Association of India&lt;/strong&gt; and co-founded &lt;strong&gt;National Internet eXchange of India (NIXI)&lt;/strong&gt; as well as the &lt;strong&gt;ITU-APT Foundation of India&lt;/strong&gt;. He is also a member on the academic board of the &lt;strong&gt;IIM Ahmedabad- IDEA Telecom Centre of Excellence&lt;/strong&gt;. &lt;br /&gt;&amp;nbsp;&lt;br /&gt;At times mistaken as a lawyer, he was actually awarded degree in engineering by one of India’s leading technical institute&lt;strong&gt; IT-BHU&lt;/strong&gt;. His professional experience of more than 2 decades spans functional responsibilities across sales, marketing, operations and last but not the least, corporate affairs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;*Participants to be confirmed&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-symposium.pdf" class="internal-link" title="Symposium"&gt;&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/all-india-privacy-symposium.pdf" class="internal-link" title="All India Privacy Symposium"&gt;Download the poster here&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-symposium.pdf" class="internal-link" title="Symposium"&gt;Download the agenda here&lt;/a&gt;&lt;strong&gt; &lt;/strong&gt;(PDF, 755 KB)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLs7gcA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLs7gcA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLtgXAA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLtgXAA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLtgz4A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLtgz4A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLtrUIA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLtrUIA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLtrl4A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLtrl4A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-symposium'&gt;https://cis-india.org/internet-governance/privacy-symposium&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-27T11:08:32Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/what-is-dilligaf">
    <title>What is Dilligaf?</title>
    <link>https://cis-india.org/internet-governance/what-is-dilligaf</link>
    <description>
        &lt;b&gt;On the web, time moves at the speed of thought: Groups emerge, proliferate and are abandoned as new trends and fads take precedence. Nowhere else is this dramatic flux as apparent as in the language that evolves online. While SMS lingo – like TTYL (Talk To You Later) and LOL (Laughing Out Loud)– has endured and become a part of everyday language, new forms of speech are taking over.&lt;/b&gt;
        
&lt;p&gt;“Leetspeak” or “L33t” (derived the word “elite”), for example, incorporate numbers in words, giving geeks their own language. One that they use to bypass firewalls and filters trained to recognize certain words – so in “l33t”-speak, porn becomes Pr0n, and onwards moves mankind.&lt;/p&gt;
&lt;p&gt;These mutations are not permanent: Like organisms, they grow to form new constellations of words and expressions demanding that users keep pace. And while purists have bled their hearts out, lamenting the savage attack on the language and grammar that digital technology has spawned, there is also a recognition of the fact that these linguistic developments are not merely experiments – they capture the spirit of a democratized knowledge system and the opening up of the information highway. User-generated content sites like Wikipedia, YouTube and Tumblr embody these acronyms and attitudes, where any attempt at regulation, control or imposition of authority is usually met with the reply – DILLIGAF (Do I Look Like I Give A F***)?&lt;/p&gt;
&lt;p&gt;DILLIGAFers – people who live a significant part of their lives online – might scoff at older forms of institutional control, but they don’t necessarily live in a space of anarchy, either. For example, academic credentials, institutional affliations and geopolitical location might not bear the same weight on Wikipedia as while writing a book, but there are other ways in which digital rank can be pulled. Your overall Internet experience, editing history and ability to garner mass support for your views are more important in determining your place in Wikipedia’s hierarchy. Any attempt at pulling rank with assets like money, influence or name are casually discarded with succinct exclamations like WTF (What The F***) and BFD (Big F****ing Deal).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;One of the defining characteristics of the DILLIGAF generation is their fiercely independent spirit. While they’re constantly connected and incessantly sharing information, they are also terribly alone. When it comes to searching for information, finding people or exploring the web, personal skills with different digital tools and platforms makes one independent. In fact, one of the deterrents for the less technically inclined to join online communities is the idea that they’re supposed to find their own way as they tread unknown digital paths. Hence, DILLIGAFers often resort to acronyms like RTFM (Read The F***ing Manual) for people (read: the rest of us) who ask for information that can be easily found. And with the rapid Googlization of the world, an obvious question is met with an obvious answer – RTFG (Read The F****ing Google).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Geeks have invented many interesting and creative acronyms to make their voices heard, and while some of the acronyms predate the Internet, they often capture the irony of online and offline existence. SNAFU (Situation Normal: All F***ed Up), an acronym that supposedly emerged in America during the Second World War, often finds its way into describing the complexity of our lives. The dramatic nature of interactions, the struggle to establish trust and the complex structure of experiences all find voice online. FML (F*** My Life), an acronym as well as a popular networking site, is a sterling example of such a space, where people share stories of how things went wrong for them, allowing other users to rate their stories on a sympathy meter.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;One of the most delicious ironies of the online space is that while irreverence might find a way into acronyms, unnecessary profanity is looked down upon. If you go around swearing on discussion pages, you will immediately be ostracized, and quite possibly asked to STFU (Shut The F*** Up).&lt;/p&gt;
&lt;p&gt;This article by Nishant Shah was&lt;a class="external-link" href="http://www.gqindia.com/content/what-dilligaf"&gt; published in GQ India &lt;/a&gt;on September 4, 2011.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/what-is-dilligaf'&gt;https://cis-india.org/internet-governance/what-is-dilligaf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-01T09:52:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/dialogue-cafe">
    <title>Dialogue Cafe @ Centre for Internet and Society</title>
    <link>https://cis-india.org/internet-governance/dialogue-cafe</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society announces the launch of its dialogue cafe, where every month, we approach seminal thinkers, scholars and practitioners to help explore knowledge paradigms that help us understand and research techno-social realities through innovative thought, concepts and frameworks.&lt;/b&gt;
        
&lt;p&gt;The dialogue cafe draws upon different disciplines, histories, perspectives and intellectual legacies in order to respond to a seminal piece of writing that has changed, challenged and shaped the contours of interdisciplinary science and technology studies.&lt;/p&gt;
&lt;p&gt;The dialogue cafe initiates several strands of dialogues — between critical thinkers and canonical texts, between different paradigm of knowledges that interact with digital and internet technologies, and between interlocutors located in different disciplines, to initiate critical thought/work for new and innovative research in the field of Internet and Society.&lt;/p&gt;
&lt;p&gt;For its first brew of conversations, the Dialogue Cafe serves you...&lt;/p&gt;
&lt;h3&gt;Computation and the Humanities: Revisiting a Silent Revolution&lt;/h3&gt;
&lt;p&gt;Steve Jobs’ comments on how “technology married with liberal arts, married with the humanities” made Apple hearts sing is today widely re-circulated, but not fully comprehended. We often take this to be the mark of one man’s genius, rather than the symptom of a broader interdisciplinary history. Noted Artificial Intelligence scholar Philip Agre recalls, “When I was a graduate student in artificial intelligence, the humanities were not held in high regard. They were vague and woolly, they employed impenetrable jargons, and they engaged in "meta-level bickering that never decides anything".&lt;/p&gt;
&lt;p&gt;What happened, in the formative decades of Jobs and Agre’s generation, to bring technology and the humanities into conversation? What have the results been, other than well-designed personal computational devices, and what is the significance for us? On December 2, 2011, the Centre for Internet and Society invites you to a Dialogue Cafe, where we engage in exploring what this all means and what kinds of labour it might take to ‘marry’ these disparate ways of knowing.&lt;/p&gt;
&lt;p&gt;As a response to Philip Agre’s seminal essay on “Critical Technology Practice”, the cafe will begin with an exposition by Kavita Philip (University of California, Irvine), opening up into a critical response spearheaded by Cherry Matthew, and leading to a larger dialogue with the audience, exploring fault lines of interdisciplinary research and challenges of integrated technology studies.&lt;/p&gt;
&lt;p&gt;For more background on these questions, audience is encouraged (but not required) to explore the materials at Agre’s home page &lt;a class="external-link" href="http://polaris.gseis.ucla.edu/pagre/"&gt;http://polaris.gseis.ucla.edu/pagre/&lt;/a&gt;, and STSrelated links from Wikipedia’s page &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Science,_technology_and_society"&gt;http://en.wikipedia.org/wiki/Science,_technology_and_society&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Science,_technology_and_society"&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLh614A.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLh614A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLigncA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLigncA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/dialogue-cafe'&gt;https://cis-india.org/internet-governance/dialogue-cafe&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-07T11:10:08Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/here-comes-gowda">
    <title>Move over Kolaveri di, here comes Gowda</title>
    <link>https://cis-india.org/news/here-comes-gowda</link>
    <description>
        &lt;b&gt;Transparency is the buzzword in governance and chief minister DV Sadananda Gowda is eager to set a new benchmark. You could soon watch what the chief minister is doing at office, live on YouTube. This article was published in dailybhaskar.com on November 28, 2011.&lt;/b&gt;
        
&lt;p&gt;Cameras are being installed at the chief minister's office in Vidhana Soudha and his home office, Krishna. The live footage will be uploaded to YouTube. "I always wanted to maintain transparency in my functioning. Very soon, I will put it to work, when people can watch me live at what I am doing when inoffice. Let the people see who come to meet me, what I do and how I work. This will set a new example, but there will be no compulsion for my colleagues to emulate me. It is entirely up to them whether to follow me or not," said Gowda on Sunday.&lt;/p&gt;
&lt;p&gt;Kerala chief minister Oommen Chandy has already set a precedent by installing cameras in his office. On July 1 this year, the day Chandy's experiment went 'live', one lakh visitors logged in. Talking to The New York Times earlier this year, Sunil Abraham, executive director of the Centre for Internet and Society, Bangalore, said "He applauded Chandy's webcams, even if the effort amounted to no more than tokenism."This type of tokenism is also quite useful," The NYT reported Abraham as saying.&lt;/p&gt;
&lt;p&gt;In Karnataka, the much-hyped Citizens' Charter would be implemented after the state legislature, which begins on December 6, ends. The cabinet had already cleared the proposal and the bill on time-bound delivery of public services would be introduced in the session, added Gowda.&lt;br /&gt;&lt;br /&gt;The proposed bill will make it mandatory for officials in government offices to deliver public services within stipulated period of time and failure to do so would make them liable for penal action and fine to be computed for every day of delay.&lt;br /&gt;&lt;br /&gt;Already, Bescom chief P Manivannan has installed a webcam in his office. The NYT earlier reported Manivannan as saying that "he was installing a 'hemispheric' camera that would capture the goings-on in his entire office rather than just show his visitors."&lt;/p&gt;
&lt;p&gt;Read the original published in dailybhaskar.com &lt;a class="external-link" href="http://daily.bhaskar.com/article/BAN-move-over-kolaveri-di-here-comes-gowda-2598214.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/here-comes-gowda'&gt;https://cis-india.org/news/here-comes-gowda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T06:58:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/facebook-tracking-footprints">
    <title>Is Facebook tracking your virtual footprints?</title>
    <link>https://cis-india.org/news/facebook-tracking-footprints</link>
    <description>
        &lt;b&gt;Social media experts claim number of cases of privacy violations against the site has increased in past few months; Facebook rubbishes the allegations. This article by Sheetal Sukhija was published in MidDay on 22 November 2011.&lt;/b&gt;
        
&lt;p&gt;If you thought your online footprints would be erased by merely clicking on the 'delete web history' option and no one would ever know about your virtual movements, think again.&lt;/p&gt;
&lt;p&gt;For, some popular social networking sites have been accused of tracking their users' movements on the Internet even when they log out from the sites.&lt;/p&gt;
&lt;p&gt;According to reports in the international media, Facebook, the virtual face of around 80 crore people across the globe, is battling a series of legal cases for alleged violating users' privacy worldwide.&lt;br /&gt;&lt;br /&gt;While the social media giant has categorically said that they have not misused any user data, internet experts have dubbed the website 'the big brother of new media'.&lt;br /&gt;&lt;br /&gt;"Many users claim that when they log onto their accounts, Facebook automatically installs a cookie onto a user's browser, which keeps tracking their movement on the internet.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;We believe that Facebook might be using this just to boost their marketing and not to sell this data to any third party," said Sunil Abraham, Executive Director, Centre For Internet and Society.&lt;br /&gt;&lt;br /&gt;Experts also believe that using such strategies have now made Facebook the world leader when it comes to credible demographic information.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;"Facebook has achieved the status of possessing the most accurate demographic information. It is a credible source to understand consumer habits of a single unique user and even user groups. However, using such information is surely a violation of privacy," he added.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Former member of NASSCOM, Pratap Reddy, believes that often people ignore the 'fine print' or the agreement page while creating an account on a social networking site or elsewhere on the net. "When users sign up on these social networking websites, they often ignore the fine print.&lt;br /&gt;&lt;br /&gt;When legal cases come up, companies often defend their stance by saying that their agreement page (or privacy policy page) mentioned all such things and make up a leeway for themselves," argued Reddy.&lt;br /&gt;&lt;br /&gt;He added, "This is surely a violation, but there is also a positive side to this. Such websites are only trying to facilitate users better, based on their past web history. This helps them put you onto people/issues/topics that you have previously searched - like a mediator," added Reddy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;All about marketing?&lt;/strong&gt;&lt;br /&gt;Experts argued that this is not for the first time a website is being sued for such an act. In the past, Google, Adobe, Microsoft, Yahoo and other online advertising agencies too have been criticised for using such controversial tracking cookie technology.&lt;br /&gt;&lt;br /&gt;According to reports, users from across the world have been taking legal recourse after pointing out that Facebook used cookie technology to track their virtual movements even after they have logged out of the social networking site.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Australian blogger Nik Cubrilovic is the latest user to join the growing list of people suing the website for violating federal wiretap laws, reported a UK-based tabloid.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;The other side&lt;/strong&gt;&lt;br /&gt;Defending their stance, Facebook argued in its official statement that they are not tracking users across the web.&lt;br /&gt;&lt;br /&gt;Facebook's official stance: Facebook does not track users across the web. Instead, we use cookies on social plugins to personalise content, to help maintain and improve what we do, or for safety and security.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;No information we receive when you see a social plugins is used to target ads, we delete or anonymise this information within 90 days, and we never sell your information.&lt;br /&gt;&lt;br /&gt;Specific to logged out cookies, they are used for safety and protection. They are used for identifying spammers and phishers, detecting when somebody unauthorised is trying to access your account, helping you get back into your account if you get hacked, disabling registration for a under-age users who try to re-register with a different birth date, powering account security features such as 2nd factor login approvals and notification and identifying shared computers to discourage the use of 'keep me logged in'.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Security tips&lt;/strong&gt;&lt;br /&gt;Internet security software experts suggest that installing strong anti-virus software would be the first step towards protecting your privacy. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Installing an anti-virus software &lt;/strong&gt;&lt;br /&gt;Every such software has a social network control option that prompts users when any unsolicited cookie is installed. By using this option, a user holds the right to refuse such installations.&lt;/p&gt;
&lt;p&gt;Read the original article published in MidDay &lt;a class="external-link" href="http://www.mid-day.com/news/2011/nov/221111-Is-Facebook-tracking-your-virtual-footprints.htm"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/facebook-tracking-footprints'&gt;https://cis-india.org/news/facebook-tracking-footprints&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-24T03:02:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/bill-could-kill-internet">
    <title>SOPA: The bill that could kill the Internet</title>
    <link>https://cis-india.org/news/bill-could-kill-internet</link>
    <description>
        &lt;b&gt;As the US government’s House Judiciary Committee begins hearings on the proposed Stop Online Piracy Act, (SOPA), both supporters and opponents are ramping up their campaigning, with big names getting involved. And so they should. SOPA’s stakes are no less than the future of the Internet itself.&lt;/b&gt;
        
&lt;p&gt;The key problem with SOPA is that it seeks to allow any copyright holder to sever any website’s relationship with online advertising networks or credit card processing services, simply by pointing the finger. &lt;a class="external-link" href="http://arstechnica.com/tech-policy/news/2011/10/house-takes-senates-bad-internet-censorship-bill-makes-it-worse.ars"&gt;As Ars Technica explains&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Calling its plan a “market-based system to protect US customers and prevent US funding of sites dedicated to theft of US property,” the new bill gives broad powers to private actors. Any holder of intellectual property rights could simply send a letter to ad network operators like Google and to payment processors like MasterCard, Visa, and PayPal, demanding these companies cut off access to any site the IP holder names as an infringer.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;[…] So long as the intellectual property holders include some “specific facts” supporting their infringement claim, ad networks and payment processors will have five days to cut off contact with the website in question.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The bill also gives the government the power to get an injunction against foreign sites which would force ISPs to, within five days,&amp;nbsp; ”prevent access by its subscribers located within the United States to the foreign infringing site.” Essentially, it obliges ISPs to break their own DNS servers by filtering or redirecting users who try to access an accused site. It would also ban any tools which allow circumvention of such blocks.&lt;/p&gt;
&lt;p&gt;It doesn’t take a genius to see how this could be abused: An aggrieved party accuses a site of infringement, with or without reliable evidence, and suddenly that site can no longer accept credit cards or PayPal payments and its advertising revenue dries up completely. And we know that the IP industry isn’t &lt;a class="external-link" href="http://news.cnet.com/8301-31001_3-57323882-261/warner-bros-denies-abusing-dmca-in-hotfile-case/"&gt;above false accusations of copyright infringement&lt;/a&gt;. It’s not just business websites that could be affected, but &lt;a href="https://cis-india.org/news/https//www.eff.org/deeplinks/2011/11/hollywood-new-war-on-software-freedom-and-internet-innovation" class="external-link"&gt;open source projects too&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://arstechnica.com/tech-policy/news/2011/11/republicans-democrats-google-and-church-of-sweden-unite-to-halt-hollywood.ars"&gt;Opponents currently include&lt;/a&gt; businesses such as&lt;a class="external-link" href="http://news.cnet.com/8301-31921_3-57325134-281/google-facebook-zynga-oppose-new-sopa-copyright-bill/"&gt; Google, Facebook, Zynga&lt;/a&gt;, eBay, Twitter, Yahoo!, AOL, and LinkedIn who, together, sent a letter; advocates such as the Electronic Frontier Foundation, Reporters Without Borders, and Human Rights Watch; as well as eleven members of the House of Representatives who have also written a letter to the House Judiciary Committee. Another letter from human rights groups includes &lt;strong&gt;India’s Centre for Internet and Society&lt;/strong&gt; as well as the Church of Sweden.&lt;/p&gt;
&lt;p&gt;There are also complaints that the House Judiciary Committee is trying to push the legislation through with undue haste.&lt;a class="external-link" href="http://www.pcworld.com/businesscenter/article/243917/lawmakers_seek_alternative_to_stop_online_piracy_act.html"&gt; Says PCWorld&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Critics of the legislation also complained that the US House of Representatives Judiciary Committee appears to be fast-tracking the bill before opposition can build. At a 10 am hearing Wednesday, five of six witnesses are likely to speak in favor of SOPA, with only Google opposed. Witnesses the Motion Picture Association of America, trade union the AFL-CIO and pharmaceutical company Pfizer have all voiced support for the bill&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;No public interest groups, Internet engineers or human rights groups have been invited to the hearing, said Gigi Sohn, president of Public Knowledge, a digital rights group. “This is really being railroaded, without a full public debate,” she said&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Indeed, the tone of the Committee’s so-called fact sheet, which lays out a series of ‘myths’ and ‘facts’, gives cause for concern, implying as it does that they have already decided which side of the fence they will land on. What is also disturbing is that the US Copyright Office — which as a part of the Library of Congress, one would expect to be impartial and evidence-led — &lt;a class="external-link" href="http://news.cnet.com/8301-31921_3-57325554-281/copyright-office-will-endorse-sopa-anti-piracy-bill/"&gt;will be offering an “unqualified endorsement&lt;/a&gt;“:&lt;/p&gt;
&lt;p&gt;“&lt;em&gt;It is my view that if Congress does not continue to provide serious responses to online piracy, the US copyright system will ultimately fail,” [Copyright Office director Maria] Pallante’s testimony says&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Pallante and representatives from Pfizer, the Motion Picture Association of America, the AFL-CIO, and Mastercard, all of whom support the bill, will be testifying tomorrow before the House Judiciary committee&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;For Americans who are unimpressed by this latest move from the content industries to control the Internet, there is a &lt;a class="external-link" href="http://www.devices.com/sendwrite.com/sopa/"&gt;letter writing campaign encouraging people to contact their congressperson&lt;/a&gt;. For non-Americans, Avaaz has set up a &lt;a class="external-link" href="http://www.avaaz.org/en/save_the_internet_d/?wfkAaab"&gt;Save the Internet petition&lt;/a&gt; which currently has 70,000 signatures and is racking up hundreds of new signatures every minute.&lt;/p&gt;
&lt;p&gt;There’s no doubt that tech journalists, free software advocates and digital rights campaigners and internet businesses worldwide will be glued to coverage of today’s Judiciary hearing. But, given the power of the copyright industry’s lobbying arms, it is hard to expect discussions to conclude satisfactorily. It may just be that the entire Internet will have to rely on the strength of the US Constitution, which SOPA may contravene, to save it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This article by Suw Charman-Anderson was published in Firspost.Technology on November 16, 2011&lt;/strong&gt;. &lt;strong&gt;The original can be read &lt;a class="external-link" href="http://www.firstpost.com/tech/sopa-the-bill-that-could-kill-the-internet-132765.html"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bill-could-kill-internet'&gt;https://cis-india.org/news/bill-could-kill-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-18T07:26:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/sopa">
    <title> International human rights community vs SOPA</title>
    <link>https://cis-india.org/news/sopa</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society was mentioned in a news story published in BoingBoing. Cory Doctorow wrote the story published on November 17, 2011.&lt;/b&gt;
        
&lt;p&gt;An enormous, diverse global coalition of press freedom and human rights groups have signed onto a letter (PDF) opposing America's Stop Online Piracy Act, the worst proposed Internet law in the USA's legislative history. Included signatories are as varied as India's Center for Internet and Society, the Church of Sweden, Colombia's Karisma, the UK Open Rights Group, and Reporters Without Borders. The letter itself is a great piece of writing: "This is as unacceptable to the international community as it would be if a foreign country were to impose similar measures on the United States." (&lt;em&gt;Thanks, Alan!&lt;/em&gt;)&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original published in BoingBoing &lt;a class="external-link" href="http://boingboing.net/2011/11/17/international-human-rights-com.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/sopa'&gt;https://cis-india.org/news/sopa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T10:15:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report">
    <title>The 2nd IJLT-CIS Lecture Series — A Post-event Report</title>
    <link>https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report</link>
    <description>
        &lt;b&gt;The Indian Journal of Law and Technology (IJLT) and the Centre for Internet and Society (CIS), organised the 2nd IJLT-CIS Lecture Series on the 21st and 22nd of May 2011 at the National Law School of India University, Nagarbhavi, Bangalore. The main theme for this year was Emerging Issues in Privacy Law: Law, Policy and Practice.&lt;/b&gt;
        
&lt;h3&gt;Speakers and Topics&lt;/h3&gt;
&lt;p&gt;Spread over two days, the National Law School hosted six speakers who held forth on the different aspects of privacy law, speaking from perspectives that were grounded in theory and actual practice and some that were India-centric while others applied equally to any jurisdiction.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Vivek Durai&lt;/strong&gt;, Partner, Atman Law Partners, addressed the gathering and gave the general introduction to the need for a discussion relating to privacy and the law. He spoke of technology and certain current events, including technological advances, have made privacy an issue with which serious engagement of the law has become imperative. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Usha Ramanathan&lt;/strong&gt;, an independent law researcher, spoke of the Unique Identity Project (Aadhar) launched by the Government of India and its implications on the privacy and data relating to the citizens. Ms. Ramanathan was critical of the Government’s plans on the basis that an ill-planned and executed project that sought to collect data such as this could provide easy fodder for data-mining. The latest 2011 rules that outline the relationship between the citizen and the state and the extent of privacy the citizen has in respect of this relationship.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Hamish Fraser&lt;/strong&gt;, a leading Australian practitioner in the field of technology law, addressed the gathering via video conference and spoke about cloud computing and privacy of parties using such facilities. He highlighted how technology such as cloud computing where the storage of data is almost fully virtual, with only the weakest of links to any physical storage space, were being increasingly widely used. He helped provide a practitioners perspective to the lecture as well by discussing how companies and individuals seeking to utilise cloud computing facilities, particularly for business purposes, must check for some essential legal provisions that would allow them to retain control over their data and prevent their data from being misappropriated by the provider of the virtual storage space in the cloud. He briefly also discussed the draft Australian privacy legislation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sean Blagsvedt&lt;/strong&gt;, founder of Baba Jobs, discussed the interplay between privacy and transparency and argued convincingly that under certain circumstances, transparency holds greater value than blind protection of privacy. He spoke of his experience in setting up Baba Jobs that seeks to act as a job portal-cum-social networking site for persons providing essential services such as plumbers, electricians, carpenters, house painters, etc. Rather than seeking to strictly protect the details and identity of these persons, Blagsvedt found that one of the most important factors for future employers while considering hiring such service personnel were the details of their previous assignments and testimonials from previous employers – the transparency that Baba Jobs offered became its USP. Blagsvedt talked of how a misplaced over-emphasis on privacy could often lead to greater detriments than benefits and prevent trust due to a lack of information. He concluded by predicting that as people increasingly shifted social and commercial transactions to the online world, the demands for privacy online would soon be offset by demands for greater transparency. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sudhir Krishnaswamy&lt;/strong&gt;, Professor of Law at the Azim Premji University, Bangalore delivered a lecture on the state and privacy in India illustrating the development of the law on the matter. He also discussed about the balance that needs to be struck between the individual’s requirement for privacy and the state’s desire for secrecy. He also spoke about two manners in which to conceptualise privacy — recognising privacy as an inherent right that may be at times restricted to a certain extent, vis-a-vis seeing privacy as a right that the state grants to a citizen.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abhayraj Naik&lt;/strong&gt;, Assistant Professor, Jindal Global Law School, Sonepat, gave a lecture on informational privacy in comparative contexts. The discussion centred on information surveillance in different jurisdictions and how the values attached to the attribution of information reflects in the laws relating to privacy in those different jurisdictions. His approach included mathematical modelling of information attribution and provided an interdisciplinary approach.&lt;/p&gt;
&lt;h3&gt;Participation&lt;/h3&gt;
&lt;p&gt;The lecture series saw registration from over 50 people, including students from law schools all over the country, practitioners, and even educators. Since the lectures were streamed live online, and this was only the second event in NLS to use this facility apart from the Annual Convocation, many more people listened to the lectures online. The lectures were available online for a period of one week after the conclusion of the lecture series.&lt;/p&gt;
&lt;h2&gt;IJLT-CIS Lecture Series 2011 Registration&lt;/h2&gt;
&lt;p&gt;The following people participated in the event:&lt;/p&gt;
&lt;p&gt;Adithya Banavar, Akanksha Arora, Anand VJ, Aniket Singhania, Ankit 
Verma, Anupama Kumar, Aparna Gokhale, Arjun Krishnamoorthy, Arjun 
Sharma, Arun Menon, Asif Ayaz, B. N. Vivek, Batool, Chirag Tanna, 
Deepakar Livingston.P., Deepthi R, Dheer Bhatnagar, Dinesh Subramany, 
Esha Goel, Gopalakrishnan R., J Suresh, Jamshed Ansari, Kanti Jadia, 
Khadeeja Nadeem, Khumtiya Debbarma, Mani Bhushan, Manish, Nayan Jain, 
Neha Baglani, Panduranga Acharya, Partha Chakravarty, Parul Bali, 
Prashanth Ramdas, Prateek Rath, Preyanka Sapru, Prianca Ravichander, 
Priytosh Singh, Purushotham.G, Ralph A, Ruhi Chanda, S. Badrinath, S. 
Bhushan, S. K. Mohanty, Sahana Manjesh, Sanjana Chappalli, Santosh 
Dindima, Shalini Iyengar, Shalini S, Sibani Saxena, Spoorthy M. S., 
Tarang Shashishekar, Tarun Kovvali, Tejaswini Rajkumar, Vaishali Kant, 
and Y. Shiva Santosh Kumar.&lt;/p&gt;
&lt;p&gt;See the &lt;a href="https://cis-india.org/internet-governance/letter-of-agreement.pdf" class="internal-link" title="Letter of Agreement"&gt;Letter of Agreement&lt;/a&gt; [PDF, 1 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report'&gt;https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-17T10:25:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/art-activism">
    <title>Exposing Data: Art Slash Activism</title>
    <link>https://cis-india.org/internet-governance/art-activism</link>
    <description>
        &lt;b&gt;Tactical Tech and the Centre for Internet and Society (CIS) invite you to the first round of discussions on the intersection of Art and Activism at CIS office in Bangalore on 28 November 2011. Ward Smith (Lecturer, University of California, LA), Stephanie Hankey and Marek Tuszynski (Co-founders, Tactical Technology Collective), Ayisha Abraham (Film maker, Srishti School of Art Design) and Zainab Bawa (Research Fellow, Centre for Internet and Society) are leading the conversations.&lt;/b&gt;
        &lt;h3&gt;The Exposing Data Project&lt;/h3&gt;
&lt;p&gt;An NGO sets up a database to track elected representatives’  participation in the Parliament, the spending for their constituency,  and keeping a track of their political mandates and promises. &lt;br /&gt;&lt;br /&gt;A  geographer tracks the movements of US Government satellites and  visualises their paths to form curious visuals of ‘State secrets’. &lt;br /&gt;&lt;br /&gt;A  photographer travels to an island in the Pacific Ocean to take pictures  of the plastic debris found in the stomach of a Laysan albatross  carcass.&lt;br /&gt; &lt;br /&gt; Each of these examples is about how data that serves as evidence can be  collected and visualised in different formats. The NGO can output its  data as infographics, the geographer creates non-cartographic maps and  the photographer’s images serve as testimony to increased pollution  levels. We live in database times. Never before in human history have we  consumed, produced and shared as much data as we do now in bits and  bytes through our digital devices, coded as images and graphs and  spreadsheets.  The power to do so has allowed individuals and  communities around the world to expose and reveal things that have been  invisibilised and obscured, robbed of language and articulation. &lt;br /&gt; &lt;br /&gt; At the same time, the visual immediacy of such data sets and the ability  to manipulate it to construct new ways of looking at our reality, often  hides the fact that the production and use of data as evidence is not  benign or neutral. While data itself claims a certain objective fact  value, the politics involved in identifying something as data are  subject to strong power confluences.&lt;br /&gt; &lt;br /&gt; The Centre for Internet and Society and Tactical Technology Collective, Bangalore, propose the &lt;b&gt;Exposing Data Project&lt;/b&gt; as a series of conversations between people working across art,  activism, politics, information science, cartography, geography, social  sciences, humanities and technology science to share, learn, discuss,  debate and explore processes, methods, challenges and implications of  what it means to live in a data-rich world.&lt;/p&gt;
&lt;h3&gt;Art Slash Activism&lt;/h3&gt;
&lt;p&gt;The first round of discussions will be looking at the intersections of Art and Activism, but without  falling into the usual traps of looking at art as the vehicle of  activism or activism as a form of art. Hence, instead of Art and  Activism, we are looking at &lt;b&gt;Art Slash Activism&lt;/b&gt; exploring how data  visualisation, data representation, and new forms of data mapping  re-articulate what it means to be political.&lt;br /&gt; &lt;br /&gt; The event will bring together professionals such as Ward Smith (Lecturer, University of California, LA), Stephanie Hankey  and Marek Tuszynski (&lt;a class="external-link" href="http://www.tacticaltech.org/team"&gt;Co-founders&lt;/a&gt;, Tactical Technology Collective),  Ayisha Abraham (Filmmaker, Srishti School of Art Design) and Zainab  Bawa (Research Fellow, Centre for Internet and Society). Rather  than being a seminar to instil practical knowledge, the aim of &lt;b&gt;Art Slash Activism&lt;/b&gt; is to engage participants in a curated conversation on the use of data  as evidence and its dissemination through visual depiction as a catalyst  for change. We are seeking a variety of perspectives when answering  questions such as whether data can have a universal reach through visual  presentation; how we can utilize various forms of representation to  spread awareness; and what happens when information cannot be  represented as data.   &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Art Slash Activism&lt;/b&gt; is a multidisciplinary learning experience  that will involve members of the art community, open data activists,  designers, and others active in the processes of social change in a  creative, playful and innovative manner that will result in textual and  visual documentation which will serve as a knowledge corpus for  researchers and practitioners interested in these questions.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Bio of the Speakers&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/zainab.jpg/image_mini" title="Zainab" height="157" width="105" alt="Zainab" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Zainab Bawa&lt;/b&gt;&lt;br /&gt;Zainab is a PhD scholar at the Centre for the Study of Culture and Society (CSCS), Bangalore. Zainab primarily works as an independent researcher on issues of governance, politics, property and how technology is embedded in state-citizen interactions and society. In the course of her work, she is associated with the Centre for Internet and Society and the Centre de Sciences Humaines - New Delhi. Zainab is also a designated partner at HasGeek Media LLP, Bangalore.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Ayesha.jpg/image_mini" title="Ayesha" height="118" width="127" alt="Ayesha" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Ayisha Abraham&lt;/b&gt;&lt;br /&gt;Ayisha Abraham lives and works in Bangalore as an installation artist and short filmmaker. She works at the Srishti School of Art, Design, Technology, as a visual arts consultant and is a member of the BAR1 (Bengaluru Artists Residency).&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/stephanie.jpg/image_preview" alt="Stephanie Hankey" class="image-inline image-inline" title="Stephanie Hankey" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Stephanie Hankey&lt;/b&gt;&lt;br /&gt;CO-founder &amp;amp; executive director, Stephanie has been working to strengthen the use of technology by civil society in the global South since 1998, initially working with the Open Society Institute establishing their Technology Support for Civil Society Program, before co-founding Tactical Tech in 2003. Stephanie has a background in information design, was editor-in-chief of Pulp and worked as a creative director and producer for a number of London-based multimedia companies. She has a Masters in Information and Interaction Design from the Royal College of Art London, and a certificate in Campaigning and Lobbying from NCVO.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Marek.jpg/image_preview" alt="Marek" class="image-inline image-inline" title="Marek" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Marek Tuszynski&lt;/b&gt;&lt;br /&gt;Co-founder &amp;amp; director of programmes &amp;amp; technology, Marek has been working to help advocates use technology since 1995. In the mid-nineties he co-founded the International Network of Contemporary Art Centres and worked with others to create a television programme about independent culture in Poland. He was director of the Stefan Batory Foundation’s Internet programme (Warsaw), sat on the board of Klon/Jawor (a research and infrastructure NGO) and The Second Hand Bank. Marek worked as a consultant to many funding agencies focusing on information and communication strategies for civil society in Central Asia.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Ward Smith&lt;/b&gt;&lt;br /&gt;Ward Smith is a librarian who works with academics, activists and artists to design and implement information systems that aid in the  development and documentation of their work. He has recently worked with the Atlanta Task Force for the Homeless, the Arts, Computation, Engineering program at UC Irvine, the Southern California Library, the  2009 Digital Arts and Culture Conference, and rhizome.org.&lt;/p&gt;
&lt;p&gt;This event is free and open to everyone. However, we would appreciate  a confirmation of attendance ahead of time so as to ensure that your  space is reserved. To confirm your attendance please write to:  &lt;a class="external-link" href="mailto:yelena.gyulkhandanyan@gmail.com"&gt;yelena.gyulkhandanyan@gmail.com &lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="mailto:yelena.gyulkhandanyan@gmail.com"&gt;&lt;b&gt;VIDEOS&lt;/b&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYLhz3IA.html" width="250"&gt;&lt;/iframe&gt;
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYLhz3IA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYLhz3IA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYLh0BEA.html" width="250"&gt;&lt;/iframe&gt;
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYLh0BEA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYLh0BEA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYLh0DUA.html" width="250"&gt;&lt;/iframe&gt;
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYLh0DUA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYLh0DUA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYLh0HcA.html" width="250"&gt;&lt;/iframe&gt;
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYLh0HcA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYLh0HcA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/art-activism'&gt;https://cis-india.org/internet-governance/art-activism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>yelena</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-03-01T05:44:23Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-national-policy-information-technology">
    <title>Comments on the National Policy of Information Technology</title>
    <link>https://cis-india.org/internet-governance/comments-national-policy-information-technology</link>
    <description>
        &lt;b&gt;The NPIT 2011 has the laudable goal of making India a ‘knowledge economy with a global role’ by developing and deploying ICT solutions in all sectors to foster development within India and at a global level. The policy identifies several praiseworthy goals such as the promotion of open standards and open technologies, accessibility for persons with disabilities, affordable ICT services, transparency, accountability, technology development for Indian languages, placing data in public domain for use and value addition, using social media to engage with citizens and investing in indigenous R&amp;D and capacity building. We deeply appreciate this initiative of the Department of Information Technology and offer below brief comments to strengthen the draft.&lt;/b&gt;
        
&lt;h3&gt;Mission&lt;/h3&gt;
&lt;p&gt;It may be important to have one mission which is more citizen centric, for instance, to use ICT to empower and mainstream underprivileged sections of the population such as persons with disabilities, economically disadvantaged people, etc. All of the missions currently listed are related to making India an IT hub and around economic/commercial indicators and the focus on the human development aspect seems to be lacking.&lt;/p&gt;
&lt;h3&gt;Objectives&lt;/h3&gt;
&lt;p&gt;Objectives 8 and 9 which are dealing with government services could specifically mention accessibility. While access for persons with disabilities is covered in objective 12, it does not imply inherent accessibility of all government services, but merely an enablement of those which are required.&lt;/p&gt;
&lt;h3&gt;Enforcement Mechanism&lt;/h3&gt;
&lt;p&gt;While the policy has several commendable goals, there is little indication as to how it will be sought to be implemented. It would be helpful to have clear mention of the responsible authorities and execution mechanisms, including a mechanism for periodic review to ensure that all security, standards and quality guidelines and timelines are met.&lt;/p&gt;
&lt;h3&gt;Development of Language Technologies&lt;/h3&gt;
&lt;p&gt;Since the development of language technologies is extremely crucial to ensure that ICT access is possible for persons in both rural and urban areas, affordability should be stressed as a key aspect of this research and open source solutions may come out of public funded research.&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-national-policy-information-technology'&gt;https://cis-india.org/internet-governance/comments-national-policy-information-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-09T10:28:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking">
    <title>TRAI urged to take action against P2P throttling and DNS hijacking</title>
    <link>https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking</link>
    <description>
        &lt;b&gt;On 4 November 2010, Anand had sent a complaint letter to the Telecom Regulatory Authority of India (TRAI) regarding unethical practices adopted by Internet Service Providers (ISPs), particularly Airtel. The letter was sent by post and through an e-mail. It was addressed to the Advisor, CN &amp; IT, TRAI. Anand got no help from the ISP and the reply from TRAI (No. 340-1\2010-CA/VOLv) stated that he contact the nodal officer. We have reproduced below the complaint letter that Anand sent to TRAI.&lt;/b&gt;
        
&lt;p&gt;The Advisor,&lt;br /&gt;CN &amp;amp; IT, TRAI&lt;br /&gt;New Delhi&lt;/p&gt;
&lt;div&gt;Respected Sir,&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;I wanted to bring to your notice some unethical marketing practices being adopted by Airtel in their broadband market.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;ISPs &amp;nbsp;in India, &amp;nbsp;especially Airtel and Tata &amp;nbsp;have recently started to use Domain Name System (DNS) &amp;nbsp;hijacking where they redirect a misspelled or a non-existent website to their own site — where they serve advertisements to make money and these get redirected to Airtel or Tata whenever you connect &amp;nbsp;to the Internet. The reply from the Internet Corporation for Assigned Names and Numbers (ICANN) was: "DNS hijacking practice violates the RFC standard for DNS (NXDOMAIN) responses, and can potentially open users to cross-scripting attacks. According to ICANN, the international body responsible for administering top level domain names has published a memorandum highlighting its concerns, affirming that ICANN strongly discourages the use of DNS redirection, wildcards, synthesized responses and any other form of NXDOMAIN substitution in existing Generic Top Level Domains (GTLDs), Country-Code Top Level Domains (CCTLDs) and any other level in the DNS tree for registry-class domain names." See for example,&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/lZ2r6"&gt;http://goo.gl/lZ2r6&lt;/a&gt; or&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/fDLNC"&gt;http://goo.gl/fDLNC&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Our ISPs are violating international regulations and exposing the customer to phishing and hacking. Here are their rules: RFC 2308 - Negative Caching of DNS Queries (DNS NCACHE) (rfc2308). See &lt;a class="external-link" href="http://goo.gl/QrKLs"&gt;http://goo.gl/QrKLs&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;I hope TRAI fines Airtel for their unethical practices. Now even toll free customer complaint numbers are no longer toll free. They charge 50 paise per call.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;One of the most dangerous things that Airtel and Tata have done is to secretly throttle internet traffic particularly of peer-to-peer (P2P) protocol and not telling the customers, thereby violating the Consumer Protection Act, 1986. In October 2010, Airtel and Tata began using &lt;a class="external-link" href="http://goo.gl/YLLEJ"&gt;Elitecore's networking bandwidth tool NetVertex to throttle net traffic&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;This violates net neutrality principle and could make the internet a cable television system where for different protocols different tariffs would be charged. Please watch&lt;a class="external-link" href="http://goo.gl/WY31Z"&gt; this clip on net neutrality&lt;/a&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Since January 2011 Airtel is throttling P2P speeds to 256k from 10 a.m. to 11 p.m. If a user has 1\2\4 mbps connection, his\her speeds are being throttled to 256 k. The only legal proof that customers have is the results from this site which tells if your connection is being throttled for specific protocols (for example, http, ftp, torrent, video streaming, email, etc) known as &lt;a class="external-link" href="http://goo.gl/LoWU"&gt;glasnost&lt;/a&gt; test.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;This forum has many Airtel users complaining about this. For example: &lt;a class="external-link" href="http://goo.gl/Utd72"&gt;http://goo.gl/Utd72&lt;/a&gt;, &lt;a class="external-link" href="http://goo.gl/uLZdg"&gt;http://goo.gl/uLZdg&lt;/a&gt;, &lt;a class="external-link" href="http://goo.gl/bfgaE"&gt;http://goo.gl/bfgaE&lt;/a&gt; and &lt;a class="external-link" href="http://goo.gl/S7lIQ"&gt;http://goo.gl/S7lIQ&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;Sir P2P is controversial as it used to download copyright works but P2P is also used for legitimate files like Linux OS or Legit P2P streaming. Some torrent sites only provide legit torrents, for example,&lt;a class="external-link" href="http://www.mininova.org/"&gt;mininova&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;In 2006 TRAI had a &lt;a class="external-link" href="http://goo.gl/Rb9s3"&gt;consultation paper on network neutrality&lt;/a&gt; para 3.6.2. In the reply, organisations like Google, Skype and Microsoft &lt;a class="external-link" href="http://goo.gl/qy5g7"&gt;recommended&lt;/a&gt; that network neutrality be made a law. See the&amp;nbsp;Google &lt;a class="external-link" href="http://goo.gl/mJAE"&gt;letter for network neutrality&lt;/a&gt; of August 2010.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;In 2011 the TRAI-NGN said that they have not found any ISP violating this but I have been writing to TRAI since October 2010 to warn them about the impending &lt;a class="external-link" href="http://www.trai.gov.in/NGN/ReportNGN.doc"&gt;2 tier internet which is coming to India&lt;/a&gt;, page 91.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;Like the Federal Communications Commission (FCC) which fined Comcast ISP in USA $ 16 million for secretly blocking P2P, TRAI should at least codify network neutrality as a simple sentence stating "All internet traffic irrespective of protocols and carrier shall be treated as neutral" and fine Airtel via Telecom Disputes Settlement Appellate Tribunal for violating Consumer Protection Act, 1986.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;a class="external-link" href="http://goo.gl/hKCN3"&gt;FCC passed diluted rules&lt;/a&gt; and TRAI should not copy FCC.&amp;nbsp;I hope TRAI takes action against illegal secret P2P throttling and DNS hijacking.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Yours respectfully,&lt;/div&gt;
&lt;div&gt;Anand&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking'&gt;https://cis-india.org/internet-governance/p2p-throttling-and-dns-hijacking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anand Priya Singh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-27T06:07:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/droidcon-india">
    <title>Droidcon India, first Android Conference in Bangalore</title>
    <link>https://cis-india.org/internet-governance/events/droidcon-india</link>
    <description>
        &lt;b&gt;HasGeek is happy to announce the forthcoming Droidcon India on the 18th and 19th of November 2011 at the MLR Convention Centre in Bangalore. Droidcon.com, Bangalore Android User Group, MobileMonday Bangalore, Medianama, Android Advices and the Centre for Internet and Society are the event partners.&lt;/b&gt;
        
&lt;p&gt;Droidcon is India’s first international Android conference and is part of the world’s largest series of Android conferences, with other editions in London, Bucharest (Romania), Brussels, Amsterdam and Berlin. Droidcon India is a response to the booming market for Android, which has seen sales increase by 888.88 per cent in 2010, and reach nearly 50 per cent market share worldwide.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Organized &lt;em&gt;by&lt;/em&gt; developers &lt;em&gt;for&lt;/em&gt; developers, the multi-track two day event will provide a rich variety of content for delegates by attracting the best speakers in the Android community. HasGeek expects the participation of over 400 delegates, including students, developers, UX and UI designers, and people with strong interests in the Android ecosystem, both from India and beyond.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The sessions will be presented in an informal environment that gives everyone a chance to be heard. The theme for the conference covers a range of topics that include building well designed apps, dealing with device diversity, performance optimization, NFC, Arduino, and usage in the Enterprise. For more details about session topics visit&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/F9bEB"&gt;http://goo.gl/F9bEB&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For registrations and tickets, visit&amp;nbsp;&lt;a class="external-link" href="http://goo.gl/pmXpJ"&gt;http://goo.gl/pmXpJ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Following the first day conference on November 18, there will be an after party for this event which will be held at the CounterCulture restaurant.&lt;/p&gt;
&lt;p&gt;For more information on tickets and registrations, contact Zainab Bawa @&amp;nbsp;&lt;a class="external-link" href="mailto:zainab@hasgeek.in"&gt;zainab@hasgeek.in&lt;/a&gt;&amp;nbsp;or call @&amp;nbsp;+91 99454 73641.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/droidcon-india'&gt;https://cis-india.org/internet-governance/events/droidcon-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-24T04:17:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/netizen-report">
    <title>Netizen Report: Transparency Edition</title>
    <link>https://cis-india.org/news/netizen-report</link>
    <description>
        &lt;b&gt;Global Voices Online has carried a feature story, "Netizen Report: Transparency Edition". We at CIS had filed an RTI application about website blocking. This is reflected in this article by Rebecca MacKinnon which was posted online on 7 November 2011.&lt;/b&gt;
        
&lt;p&gt;Here at Global Voices Advocacy we believe that transparency by governments and companies about how and when censorship and surveillance takes place is a base-line requirement if the Internet is ever to be governed in a manner that is compatible with free expression, dissent, and citizens' right to organize and assemble. Thus we applaud Google's latest &lt;a class="external-link" href="http://www.google.com/transparencyreport/"&gt;Transparency Report &lt;/a&gt;- the company's fourth such report detailing government requests for user data and content removal, as well as the traffic flows (or lack thereof) to Google webistes across the world since July 2009. The new data for &lt;a class="external-link" href="http://www.google.com/transparencyreport/governmentrequests/#2011-06"&gt;January-June 2011 &lt;/a&gt;contains more detail than in the past, including data on how Google responded to the requests and whether they were honored. The data comes with a list of caveats including that automated content removal is not logged and that some data cannot be released due to local law. Nonetheless, we hope that Google's data will provide an interesting snap shot of the state of Internet affairs and the data could be used to hold governments accountable to their censorship activities. We believe that if all Internet companies disclosed similar data, the world would be further on its way to being a better place. Many articles have been written analyzing the data. A few of them include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;TechPresident: &lt;a class="external-link" href="http://techpresident.com/blog-entry/google-data-shows-government-internet-surveillance-far-outstrips-wiretap-requests"&gt;Google Data Shows Government Internet Surveillance Far Outstrips Wiretap Requests&lt;/a&gt;&lt;/li&gt;&lt;li&gt;WIRED: &lt;a class="external-link" href="http://www.wired.com/threatlevel/2011/10/google-data-requests"&gt;U.S. Requests for Google User Data Spike 29 Percent in Six Months&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Huffington Post:The 13 Countries That Request The Most User Data From Google&lt;/li&gt;&lt;li&gt;CNet: &lt;a class="external-link" href="http://www.huffingtonpost.com/2011/11/01/google-user-data-countries-requests_n_1070313.html"&gt;Google: Governments seek more about you than ever&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Adding to the publicly available data about censorship around the world, the Open Net Initiative has &lt;a class="external-link" href="http://opennet.net/blog/2011/11/oni-summarized-global-internet-filtering-data-now-available-download"&gt;released its research data on global Internet filtering&lt;/a&gt;, covering seventy-four countries.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Thuggery&lt;/strong&gt;: Read the latest news on GVA about bloggers jailed in Egypt, Syria, and Kuwait and spread the word.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Surveillance&lt;/strong&gt;: As &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/"&gt;GVA&lt;/a&gt; and others have recently reported, 13 Internet filtering devices produced by the California-based company Blue Coat have made their way to &lt;strong&gt;Syria&lt;/strong&gt;.&amp;nbsp;&lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970203687504577001911398596328.html"&gt; According to the Wall Street Journal&lt;/a&gt;, Blue Coat executives say that the company will not sell the devices to countries that are under embargo by the United States, and that the devices found in Syria had been sold to a dealer who claimed they were destined for Iraq.&lt;/p&gt;
&lt;p&gt;The Wall Street Journal has had several other items related to the role of companies in global surveillance, including a report on how China's Huawei &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204644504576651503577823210.html"&gt;has been peddling &lt;/a&gt;its mobile phone tracking and censoring equipment to &lt;strong&gt;Iran&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, Research in Motion &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204505304577001592335138870.html#ixzz1cxcl5IIg"&gt;has set up a facility &lt;/a&gt;in Mumbai to help the Indian government carry out lawful surveillance of its BlackBerry services including the messenger chat service, but the WSJ reports that India still has no method to intercept and decode BlackBerry enterprise email.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;Russia&lt;/strong&gt;, bloggers' influence &lt;a class="external-link" href="http://www.rferl.org/content/russian_bloggers_gain_prominence_kremlin_takes_notice/24357352.html"&gt;has apparently made the Kremlin nervous&lt;/a&gt;. Reporters Without Borders has condemned plans by the Russian government to deploy new software to track “extremist” content on the web, highlighting concerns about an over-broad definition of “extremist,” and the arbitrary and disproportionate approach to punishment and sanctions against websites. For more on the Russian Internet be sure to follow Global Voices' &lt;a class="external-link" href="http://globalvoicesonline.org/-/special/runet-echo/"&gt;Runet Echo Project&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Moving on the &lt;strong&gt;United States&lt;/strong&gt;, The Guardian has a &lt;a class="external-link" href="http://www.guardian.co.uk/technology/2011/nov/01/governments-hacking-techniques-surveillance"&gt;fascinating report &lt;/a&gt;on the super-secret Intelligence Support Systems World Americas conference held recently in Washington DC, at which surveillance professionals shared the latest surveillance technologies and innovations that they don't want you to know about. Hacktivist and friend of GVA &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2009/12/14/interview-with-jacob-appelbaum-from-tor/"&gt;Jacob Appelbaum &lt;/a&gt;managed to get in, but was thrown out.&lt;/p&gt;
&lt;p&gt;On a more positive note in the &lt;strong&gt;United States&lt;/strong&gt;, the Washington Post reports that since 2009 many Internet companies &lt;a class="external-link" href="http://www.washingtonpost.com/world/national-security/fbi-going-to-court-more-often-to-get-personal-internet-usage-data/2011/10/25/gIQAM7s2GM_story.html?wpisrc=nl_headlines"&gt;have been more assertive &lt;/a&gt;about challenging “national security letters” from the FBI requesting information about users.&lt;/p&gt;
&lt;p&gt;The Guardian reports that Civil liberties and privacy groups in the &lt;strong&gt;United Kingdom&lt;/strong&gt; &lt;a class="external-link" href="http://www.guardian.co.uk/uk/2011/oct/30/metropolitan-police-mobile-phone-surveillance"&gt;have raised concerns &lt;/a&gt;about the deployment by the London Metropolitan Police of a "covert &lt;a class="external-link" href="http://www.guardian.co.uk/uk/surveillance"&gt;surveillance&lt;/a&gt; technology that can masquerade as a mobile phone network, transmitting a signal that allows authorities to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.techdirt.com/articles/20111021/11554216450/eu-politician-wants-internet-surveillance-built-into-every-operating-system.shtml"&gt;Techdirt reports &lt;/a&gt;on the &lt;strong&gt;European Union&lt;/strong&gt;'s desire to have a “black box' built in to operating systems that would store a record of all of the computer's internet usage. The EU argues that this ability would be useful in cracking down on child pornography.&amp;nbsp; The system that the EU is looking at as a possible candidate for role of ‘black box' is called LogBox. &lt;a class="external-link" href="http://www.fabioghioni.net/blog/2011/10/20/internet-e-l%E2%80%99arbitrio-assoluto-sui-dati-dei-service-provider-presentata-al-parlamento-l%E2%80%99iniziativa-per-un-sistema-di-controllo-sotto-garante/"&gt;The developer of LogBox &lt;/a&gt;claims that the device is for preserving the freedoms and privacy of internet users, although Techdirt points out the fact that this device does little to ‘protect' the privacy of online users, it in fact, would make anonymous actions on the internet much more difficult and would provide governments and law enforcement a huge set of data on every internet user.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Censorship&lt;/strong&gt;: The chief executives of &lt;strong&gt;China&lt;/strong&gt;'s 39 top Internet, telecom, and computer companies &lt;a class="external-link" href="http://www.ft.com/cms/s/09d9a5ba-0886-11e1-9fe8-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2F09d9a5ba-0886-11e1-9fe8-00144feabdc0.html&amp;amp;_i_referer=http%3A%2F%2Fadvocacy.globalvoicesonline.org%2F2011%2F11%2F07%2Fnetizenreport-transparency%2F#axzz1cxn3nQD5"&gt;have agreed to &lt;/a&gt;“strengthen self-control, self-restraint and strict self-discipline” in order to “contain the tendency of spreading online rumours, pornography, fraud and other illegal, harmful information on the internet.” The move comes amidst a &lt;a class="external-link" href="http://www.voanews.com/english/news/asia/China-to-Tighten-Controls-on-Internet-Social-Media-133062308.html"&gt;broader crackdown &lt;/a&gt;on &lt;a class="external-link" href="http://www.nytimes.com/2011/10/27/world/asia/china-imposes-new-limits-on-entertainment-and-bloggers.html?_r=1"&gt;the Internet and social media&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, the Bangalore-based Centre for Internet and Society &lt;a href="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking" class="external-link"&gt;submitted a right to information request &lt;/a&gt;to the government's Department of Information Technology, asking for more information about website blocking. Based on &lt;a href="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="external-link"&gt;DIT's response &lt;/a&gt;the Centre observes that “The data provided by the government seemingly conflicts with the data released by the likes of Google." Their conclusion: "Either the DIT is not providing us all the relevant information on blocking, or is not following the law."&lt;/p&gt;
&lt;p&gt;Courts in &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.19/belgium-isp-blocking-pirate-bay"&gt;&lt;strong&gt;Belgium&lt;/strong&gt;&lt;/a&gt; and&lt;a class="external-link" href="https://torrentfreak.com/finnish-isp-ordered-to-block-the-pirate-bay-111026/"&gt; &lt;strong&gt;Finland&lt;/strong&gt; &lt;/a&gt;have ordered ISPs to block the Pirate Bay.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;U.S.&lt;/strong&gt; House Judiciary Committee has recently proposed a&lt;a class="external-link" href="http://judiciary.house.gov/hearings/pdf/112%20HR%203261.pdf"&gt; bill &lt;/a&gt;aimed at protecting intellectual property online that some critics describe as the &lt;a class="external-link" href="http://censorshipinamerica.com/2011/10/26/internet-censorship-protect-ip-renamed-e-parasites-act-would-create-the-great-firewall-of-america/"&gt;beginning of a "Great Firewall of America"&lt;/a&gt;.&lt;a class="external-link" href="https://www.eff.org/deeplinks/2011/10/disastrous-ip-legislation-back-%E2%80%93-and-it%E2%80%99s-worse-ever"&gt; The Electronic Frontier Foundation &lt;/a&gt;and others have detailed the bill's problems, including lack of due process, near certainty of over-blocking and abuse, imposition of excessive liability on Internet intermediaries, global legitimization of DNS censorship and potential fragmentation of the Internet, among other things. It is considered even worse than its evil fraternal twin in the Senate, the &lt;a class="external-link" href="https://secure.wikimedia.org/wikipedia/en/wiki/Protect_IP_Act"&gt;PROTECT IP Act &lt;/a&gt;which is also opposed by many tech companies and non-profit groups. Despite such opposition, the bill draws relatively &lt;a class="external-link" href="http://opinion.latimes.com/opinionla/2011/10/technology-a-bipartisan-attempt-to-regulate-the-internet.html"&gt;broad support from lawmakers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Net Neutrality: South Africa&lt;/strong&gt;n technology journalist Jan Vermeulen ran the &lt;a class="external-link" href="http://mybroadband.co.za/news/broadband/36728-how-much-does-your-isp-shape-your-downloads.html"&gt;M-Lab's Glasnost Test on South African ISP's&lt;/a&gt; to see whether their stated bandwith shaping policies match up with reality.&lt;/p&gt;
&lt;p&gt;The growth of bandwidth intensive internet applications in South Korea has made Net Neutrality &lt;a class="external-link" href="http://koreajoongangdaily.joinsmsn.com/news/article/Article.aspx?aid=2943014"&gt;an important issue there&lt;/a&gt;. &lt;strong&gt;South Korea&lt;/strong&gt;n ISP's are reporting that it is becoming increasingly difficult to maintain neutral practices with content. The three largest telecommunications companies in Korea are worried by the rise of &lt;a class="external-link" href="http://www.samsung.com/us/smarttv/index.html?cid=ppc_smt_goo_Smart+TV+-+Awareness_Smart+TV_smart+tv&amp;amp;K_CLICKID=5b86c4c9-6936-eac8-bbe5-00004db65f45"&gt;Smart TV's&lt;/a&gt;, which use Internet connections as opposed to traditional cable or satellite links to provide content. The ISP's want to charge companies varying amounts depending on the type and amount of content sent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Internet Governance&lt;/strong&gt;: ICANN held its &lt;a class="external-link" href="http://dakar42.icann.org/"&gt;42nd public meeting in Dakar, Senegal &lt;/a&gt;late last month. Wendy Seltzer &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/05/icann-why-the-registrar-accreditation-agreement-matters-for-free-speech/"&gt;reported here on GVA &lt;/a&gt;why the seemingly arcane debates about domain name registrar accreditation is important. Konstantinos Komaitis, an active member of ICANN's &lt;a class="external-link" href="https://community.icann.org/display/gnsononcomstake/Home"&gt;Non-Commercial Stakeholder Group &lt;/a&gt;(Global Voices is also a member),&lt;a class="external-link" href="http://www.komaitis.org/1/post/2011/10/icann-41-the-fight-over-multistakeholderism.html"&gt; describes the struggle &lt;/a&gt;that is taking place took place between governments and other ICANN stakeholders over whether some stakeholders are more equal than others within ICANN's multi-stakeholder governance model.&amp;nbsp; Kieren McCarthy at dotNext also has an&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/24/governments-registrars-fight"&gt; in-depth report and analysis &lt;/a&gt;on the clash between governments and registrars over law enforcement regarding domain names. Over at the Internet Governance Project Milton Mueller &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/11/6/4934244.html"&gt;takes an in-depth look &lt;/a&gt;at the politics surrounding the Non-Commercial Stakeholder Group and related constituencies, and the fight for civil society representation at ICANN.&lt;/p&gt;
&lt;p&gt;India has &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/article2604526.ece"&gt;published a formal proposal &lt;/a&gt;to put the UN in charge of overseeing Internet governance. For different analyses by three Internet governance wonks see&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/27/india-proposes-government-control-internet"&gt; Kieren McCarthy&lt;/a&gt;, &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/10/29/4929042.html"&gt;Milton Mueller&lt;/a&gt;, and &lt;a class="external-link" href="http://igfwatch.org/discussion-board/indias-proposal-for-a-un-committee-for-internet-related-policies-cirp#mlYafW43YceAy1o6AicM_g"&gt;Jeremy Malcolm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The International Telecommunications Union has approved a new protocol for relaying biometric information. The protocol is intended to enable doctors to communicate data about patients safely and is geared towards developing countries where the access to medical care in rural areas is poor and communication between clinics and doctors would provide better patient care. You can read the full &lt;a class="external-link" href="http://www.itu.int/ITU-T/newslog/Using+Telecommunication+To+Transfer+Biometric+Information.aspx"&gt;press release here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Netizen Power&lt;/strong&gt;: Lee Yoo Eun at Global Voices reports that the October 26th Seoul mayoral election was swayed by the use of twitter. Read the &lt;a class="external-link" href="http://globalvoicesonline.org/2011/10/27/south-korea-tweeting-elections-against-all-odds/"&gt;full article here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;African entrepreneur Herman Chinery-Hesse gave a speech at the Tech 4 Africa conference highlighting what the rise of Internet Communication Technologies has done for Africa.&amp;nbsp; A synopsis of his talk can be found on the Tech4Africa.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sovereigns of Cyberspace&lt;/strong&gt;: Facebook has introduced a &lt;a class="external-link" href="https://threatpost.com/en_us/blogs/facebook-testing-guardian-angels-feature-getting-locked-accounts-102811"&gt;new “guardian angel” feature &lt;/a&gt;to help users restore locked accounts.&lt;/p&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.21/austrian-big-brother-awards-2011"&gt;13th Austrian Big Brother Awards &lt;/a&gt;were held on October 25th in Vienna. “Winners” included the CEO of Telekom Austria, the Ministers of Interior and Justice, and the head of the anti-terror police unit. Mark Zuckerberg received the “lifelong menace” award and a “Defender of Liberty” award went to the creators of the “&lt;a class="external-link" href="http://europe-v-facebook.org/"&gt;Europe versus Facebook&lt;/a&gt;” campaign.&lt;/p&gt;
&lt;p&gt;The&lt;a class="external-link" href="https://www.rightscon.org/"&gt; Silicon Valley Human Rights Conference &lt;/a&gt;was held in San Francisco in late October (see GVA's report, Jillian York's report, and The Economist's) and released the &lt;a class="external-link" href="http://www.rightscon.org/2011/10/silicon-valley-human-rights-standards/"&gt;Silicon Valley Standard&lt;/a&gt;, a set of 15 principles that technology companies should follow in order to protect human rights.&lt;/p&gt;
&lt;p&gt;China's Weibo &lt;a class="external-link" href="http://technode.com/2011/10/30/sina-weibo-launching-english-version-soon-with-the-partnership-of-flipboard-and-instagram/"&gt;plans to launch an English version &lt;/a&gt;in partnership with Flipboard and Instagram. Will they agree to follow the Silicon Valley Standard?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Security Alert&lt;/strong&gt;: The security researcher Barnaby Jack has found it possible to conduct a &lt;a class="external-link" href="http://www.infosecurity-magazine.com/view/21601/barnaby-jack-hacks-diabetes-insulin-pump-live-at-hacker-halted/"&gt;blind attack on insulin pumps&lt;/a&gt;.&amp;nbsp; While there have been no reports of anyone being harmed by such an attack, this highlights how far behind security technologies are when it comes to wireless devices that are embedded in critical infrastructure and medicine.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Publications&lt;/strong&gt;:&lt;a class="external-link" href="http://themonkeycage.org/blog/2011/10/22/digital-cameras-reduce-electoral-corruption/"&gt; Digital Cameras Reduce Electoral Corruption &lt;/a&gt;by Michael Callen and James Long.&lt;/p&gt;
&lt;p&gt;Events: Check out this &lt;a class="external-link" href="https://www.google.com/calendar/embed?src=openinternetdigest%40gmail.com&amp;amp;ctz=America/New_York"&gt;handy calendar of Internet-related events&lt;/a&gt; around the world, courtesy of Internews!&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Access Contested: Security, Identity, and Resistance in Asian Cyberspace&lt;/em&gt;, by the OpenNet Initiative, to be officially released in December. Part I of the book (including a chapter by yours truly) can be read online or downloaded &lt;a class="external-link" href="http://citizenlab.org/2011/09/access-contested-is-now-available/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note: This report was compiled with considerable help from Ted Eby and Weiping Li.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Read the original article &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/07/netizenreport-transparency/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/netizen-report'&gt;https://cis-india.org/news/netizen-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-09T04:31:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/once-a-flash">
    <title>Once Upon  A Flash</title>
    <link>https://cis-india.org/internet-governance/once-a-flash</link>
    <description>
        &lt;b&gt;It was a dark and stormy evening. A young man in a dark blue Adidas jacket, collar turned up, eyes under green-black shades, hopped off a motorbike, tucked his thumbs into the front pockets of his low-slung retro jeans and surreptitiously made his way through a road thronging with rush-hour traffic and irate pedestrians yelping on their cellphones. He skipped across death traps with skilled ease: leaping over potholes, jumping over halfdug trenches, avoiding the occasional pair of doggy jaws that longed to mate with his ankles, ignoring the bikers who were using the pavements as new lanes for driving towards a honking traffic jam bathed in an orange and red neon that made the road look like a piece of burnt toast with dollops of vicious jam on it.&lt;/b&gt;
        &lt;p&gt;After five minutes of brisk walking, he slowed down as if he had reached just where he wanted to be – nowhere in particular. On his left were the large Acropolis buildings, towering over the world from their gated existence, structured in pompous Greek columns and facades of granite, stone and marble. On his right, on the other side of the road, if you looked over the metal head of the traffic, you could see the small roadside restaurant that announced fresh fish at cheap rates, sitting cosily under a starved-looking tree, happily encroaching upon the pavement, forcing the pedestrians to disembark, navigate the traffic and then come back to the relative safety of the footpath.&lt;/p&gt;
&lt;p&gt;Caught between these two ironies, he stayed put for a while, glancing at his chor bazaar Rado model that flashed on his left wrist. He headed towards the mall that rose in glass and neon, false curves and studious lines across the quickly staining sky of a Saturday evening. As he walked into the mall, the automatic doors that sensed his corporeal presence opened up for him and the girl in a polka-dotted blue-and-red dress threw him the smile that desk attendants save for strangers. The gush of cold airconditioned air and the noises of window shoppers greeted him to ease; mannequins in windows, draped in the latest fashions and various states of undress, winked at him; the smell of freshly brewed coffee came and enveloped him. He headed with ungrim determination towards the round performance area in the mall centre. Like many other hangers-out he too loitered without apparent intent around it, just another boy out on a Saturday evening.&lt;/p&gt;
&lt;p&gt;Suddenly his cell phone buzzed. His alarm sounded in loud tones to blend with the Britney Spears playing on the mall sound system. He fished out a bright bumblebee-yellow bandana and tied it to his head. As he did that, the performance area turned into a sea of people wearing varied shades of yellow, blasting their cell phone alarms at full volume till all you could hear was a grating disharmony that would have caused comment on a railway station in India. The phones soon faded and a group of about 70 people formed a human ring, holding hands, their heads swathed in yellow, and sang at the top of their voices the first two stanzas of Hum Honge Kamyaab – the Hindi rendering of the famous song We Shall Overcome. Once the song sank into a bewildered silence, the people in yellow bandanas fell on their knees, raised their hands towards heaven and roared with laughter before quickly pulling off their headgear and dispersing, leaving an empty space and a gawking audience who just had their first dose of a ‘flashmob’ – a group of people who assemble together, suddenly, in a public place, perform an unexpected sets of choreographed actions and disperse without as much as a by your leave or with your leave.&lt;/p&gt;
&lt;p&gt;Flashmobs trace their history to the early 18th century industrialisation, when a group of women working in the labour shops&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;in Australia used coded messages to meet and discuss the problems they had in their workplaces. These meetings were organised at random, and the women used the very technologies of production that they engaged with at work on a daily basis to fight the oppression and the injustice of the people at the top. The first modern flashmob, however, is attributed to Bill Wasik, editor of Harper’s Magazine, who, after the first failed attempt (May, 2003), managed to pull a successful flashmob where 200 people swarmed over the mezzanine floor of the Manhattan departmental store Macy’s, pretending to buy a ‘love rug’ for their commune where they supposedly all lived together; they left a bewildered audience and a bemused store staff behind them (3rd June, 2003).&lt;/p&gt;
&lt;p&gt;Organise, congregate, act, disperse – that is the anatomy of a flash mob. A polymorphous set of people are brought together through the commonality of subscribing to similar technological interfaces or gadgetry. Random e-mails, short messages (sms) on cell phones, discrete messages embedded in public works of art or media, blogs and wikis have now been successfully used to conjure these tenuous group formations that temporarily transform the space that they arrive at – flash sites – into something that neither the audience they perform to nor the state can comprehend, thus producing that space in a condition of social and physical illegality.&lt;/p&gt;
&lt;h3&gt;In The Name of Fun&lt;/h3&gt;
&lt;p&gt;One of the most overarching icons of a globalised economy has been the credit card – virtual money that has changed the way we think of money, capital and transactions. Visa Power, as the advertisement goes, is looked upon as the quintessential rhetoric of economic globalisation, where the power to change and to create is manifested through the processes of consumption. While technology has been heavily implicated in the creation of this new invisible money, it has remained on the background. The swiping of the card – the physical act of buying without ‘paying’ has become such a naturalised event that the technology it adopts or the networks it creates are not very visible... Flash mobs, in their construction, execution and ramifications, foreground technology as one of the most powerful tools of creating new formations of grouping and networking that, through their deliberately devised unintelligibility, transform the spaces they occupy.&lt;/p&gt;
&lt;p&gt;This is the story of the first flashmob in India, and how it can be understood through the tropes of illegality, enchantment and transformation. The story starts a little before the flashmob itself. In the year 2000, a shopping mall in Mumbai created a furore amongst the public. It was the first ‘genuine’ shopping mall in India. The first space that claimed mallhood was in Bangalore – Kemp Fort, but it was more a large shopping store rather than a mall. This first all American shopping mall – Crossroads, with its promises of unlimited pleasure and brand-tagged shopping – attracted the largest crowd in its opening week. Everybody wanted to see what the mall was like. Everybody was curious about this space. Everybody wanted to be a part of this exclusive zone that clearly demonstrated that modernity and progress had finally come to us. Then everybody found out that they were not allowed to enter the mall. As the director of the mall pointed out in his interview with The Times of India, (23rd August, 2000), “Crossroads is not meant for everybody".&lt;/p&gt;
&lt;p&gt;In those days when cell phones were still a novelty and definitely a curio for the upper classes, and when pagers were still struggling for a mass market, Crossroads passed a stipulation which restricted people not carrying a cell phone or a credit card from entering the mall. If you were still eager to enter the space, you paid extra fees of Rs 50 per head and thus made amends for not carrying a cell phone or a credit card. This was the first time a ‘public’ space made it very clear that the public it was looking for and attempting to effectively create was not “everybody”. The issue was talked about, shouted about, screamed at and criticised by all wings of the media, who passionately analysed this instance of discriminatory practices based  on socioeconomics. Later, a PIL (Public Interest Litigation) was filed against the mall; it lost, and had to throw its doors open to “everybody” who had been clamouring to get in ever since they found out they were not allowed to enter.&lt;/p&gt;
&lt;p&gt;On 4 October 2003, the mall again came into limelight in a manner it had not accounted for. This time it was initiated by an e-mail. About 5,000 original mailers went off to people all around Mumbai and even beyond the city, asking them to have a look at a new blog for Mumbai flashmobs. The blog posted a form asking for name, e-mail address and mobile number. On 3 October several cell phones rang, asking people who had submitted their details in the form to check their inboxes. The eager participants glided to their accounts to find a mail that agonisingly chalked out the time and space of the meeting venue – a flash site. The information was also sent by sms to all members who had volunteered. And then at exactly 5 pm a group of about a hundred participants entered Crossroads. They screamed at the top of their voices and sold imaginary shares belonging to Reliance India. They performed the garba. In the middle of dancing they all froze. And then without so much as a word, after two minutes of historic histrionics, they opened their umbrellas and dispersed, leaving a trail of bewilderment and confusion, as an audience of over a thousand watched with their jaws on the floor.&lt;/p&gt;
&lt;p&gt;This was India’s first recorded flashmob. A large crowd of people who did not know each other, did not have any largely political purpose in mind and did not really intend to extend the flashmob contact into relationships, got together to perform a set of ridiculous actions at Crossroads, thus marking it as the first flash site in India. Ironically, the group that converted the mall into mayhem consisted of whom Anne Balsamo calls the hyperreal people – people whose identities are created by the hypervisual and extra physical aesthetics of the digital technologies that they deploy - who were once the only legitimate owners of the space of that mall. This first flashmob sparked off many others all around the nation – most of them marking out spaces such as multiplexes, shopping malls, gaming parlours, body shops, large commercial roads and shopping complexes as their flashsite.&lt;/p&gt;
&lt;p&gt;Bill Wasik, the creator of the first flashmob in Manhattan, in a recent interview,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; looked upon the flashmob experiment as a study in behavioural psychology of people he called “hipsters” – people who would join ‘new’ or ‘cool’ things for no reason or investment but to be visible in the new trends and social fads. To a large extent, Wasik’s surface analysis seems to hold true. While flashmobs have been used as a political weapon by several groups and activists in many areas of human rights, queer rights, feminism, political democracy, etc., flashmobs fundamentally exist, like pre-Raphaelite art, for a solipsist reason. Bijoy Venugopal, who produced one of the most celebrated accounts of the Crossroads flashmob&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;, mentions how it was all about having some “serious fun”. Increasingly, the flashmob organisers in and around the country have disavowed any ideological moorings for the gathering, and forcibly shelve it into the realms of entertainment or leisure. Following the banning of flashmobs in cities like Mumbai and Bangalore (Mid-day, 9th oct. 2003), even though they have invoked the right to freedom of speech and expression, the organisers and the participants have largely produced justifications by claiming to have no political agenda or inclinations in the construction or execution of flashmobs.&lt;/p&gt;
&lt;p&gt;In this repeated disavowal of the political, one can read the desire for re-enchantment that flashmobs and mobsters bring with them. Flashsites, defined by the organising of the flashmobs, are usually sites of globalised consumption – an enchanted world of brand names and designer lifestyles that can make you feel as perpetually disoriented as Alice in Wonderland. These sites serve as the symbols of enchantment in the logic of the city.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; The new urban enchantment and mode of fantasy is located in the circuits of consumerism where, with plastic money and unlimited credit, the consuming citizen can buy all that the heart desires. However, flashmobs, outside these networks of consumption, and constituted by the same people who fit the bill of the citizen as imagined and promoted by the state and the market as they embrace globalisation and its technologies, demand a re-enchantment of the city. They force us to acknowledge the need for such public spaces to be accessible to all, and provide a strong critique of the easily accepted globalised dream in which the state is so heavily investing. Flashmobs become a manifestation of how tenuously networked, fragile communities, their collaboration inspired and enabled by cyberspatial technologies, can contest the very forces that promote and proliferate these technologies. Flashmobs become a site upon which the drama of globalisation, consumption, state and space is discursively and recursively enacted.&lt;/p&gt;
&lt;h3&gt;In The Name of The Law&lt;/h3&gt;
&lt;p&gt;That flashmobs are in a condition of illegality is perhaps one of the easiest claims to prove. The very fact that the Mumbai Police, after the first series of flashmobs, invoked Section 37(1) of the Bombay Police Act in the name of security and safety, clearly states how flashmobs are considered outside the law in the most literal sense of the word. The then Mumbai Police Deputy Commissioner of Police, Amitabh Gupta, contacted Rohit Tikmany, organiser of the first flashmob and moderator of the flashmob blogging community (&lt;a class="external-link" href="http://www.mumbaimobs.org/"&gt;http://www.mumbaimobs.org/&lt;/a&gt;), asking him to shut down the site and stop all further attempts at organising flashmobs. Following the ban in Mumbai, cities such as Ahmedabad, Bangalore and Delhi have enacted similar bans within the city limits. These censoring forces look at flashmobs as potentially destabilising elements that can be ‘misused’ for violent acts such as riots and bombings by fundamentalist organisations.&lt;/p&gt;
&lt;p&gt;However, of greater interest is the way in which flashmobs manage to reproduce flashsites in conditions of social and physical illegality by creative deliberate structures of transient unintelligibility. The leisure infrastructure of malls and multiplexes, cafes and large shopping complexes, gaming zones and commercial roads of consumption, are all aimed at the new citizenry that comes into being with these new urban economies falling into place. These spaces are not only legitimate spaces of self-expression through consumption, but also authorised spaces of public assembly and gathering. They promote an ethos of incessant consumption where the individual is also installed as a consumable product that relates to others in the processes of consumption. They are the locations where brands, accessories and lifestyles all come together as the figureheads of a sanitised economy which strives to make opaque the surrounding subcultures of piracy, theft, copying and distributing that emerge around such nodal points.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; To belong to the space of a mall or a shopping complex, one needs to almost automatically endorse the original, the authentic, the expensive, as a way of making a conscious statement of style and lifestyle. These potential flashsites become the spaces that the state legitimises as the most visible and sanitised form of urbanisation in contemporary cities.&lt;/p&gt;
&lt;p&gt;However, flashmobs definitely subvert the sanctity or the sanity of such spaces by compelling them to suddenly introject disruptive conditions of unintelligibility. Flashmobs force the other participants of the space to enter into a narrative of confusion and chaos; of turbulence, thus rendering the space of consumption incomprehensible for the short time that the flashmob unfolds. Moreover, flashmobs do not fall under globalisation’s rhetoric of consumption, and do not require any special access powers or consumption rites, thus defying the discriminatory protocols that such spaces put in motion under the uneasily hovering sign “Rights of Admission Reserved”. Flashmobs, by rejecting the very use and expectation of the space, in spite of the heavy surveillance, state opposition and hi-tech policing, are able to distort the formulaic narratives of the space, thus creating alternative structures of resistance, of transformation, of transition. State apparatus gets completely paralysed when faced with such a radical reconfiguring, and thus goes out of its way to put a special ban upon flashmobs in a city where even a small defeat in a cricket match, or various emotional events such a public mourning or celebration, bring together crowds much louder, more aggressive, tenuous and destructive than conventional flashmobs. The transient illegality that flashmobs produce is not only at the level of the law but also at the level of legibility and comprehension.&lt;/p&gt;
&lt;p&gt;"What do the mobsters do when they come together for a flashmob?" is a wrong question to ask. While the actions of the mobsters might be bizarre and lacking in meaning, often uninformed by any obvious ideology, flashmobs do produce new modes of signification and networking patterns, unprecedented in modern history. The ephemeral nature of the flashmobs, the improbably pseudonymous identities of the participants, the technologically mediated communication and networking patterns, all hint towards a certain notion of technosociality, where the social world around us is profoundly affected by the technologies that we adopt. In these unexpected eruptions, flashmobs create a new relationship between actors, audience and the spaces that they inhabit, including all the three into the circuits of digital technologies. As a form of radical localised performance, flashmobs offer a way to question the hierarchical intentionality of the spaces that they transform; they embody new ways in which technologies interface with our daily life, producing new forms of technosocial living.&lt;/p&gt;
&lt;p&gt;This paper was published in Academia.edu. Click &lt;a class="external-link" href="http://cis-india.academia.edu/NishantShah/Papers"&gt;here&lt;/a&gt; to read the original. Download the file &lt;a href="https://cis-india.org/internet-governance/once-upon-a-flash" class="internal-link" title="Once Upon A Flash"&gt;here&lt;/a&gt;. [PDF, 129 kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].These were probably the precedents to the modern day sweat shops that have characterized  Globalisation in the 21st century. The ‘labour shops’ were large stone and concrete buildings which housed workers working around the clock towards incessant production. Women and children were often preferred because they were given lesser wages than men and considered more easily malleable.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].The transcript of the interview is available at &lt;a class="external-link" href="http://www.laweekly.com/ink/04/37/features-bemis.php"&gt;http://www.laweekly.com/ink/04/37/features-bemis.php&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].Venugopal, himself a prolific blogger, blogged about the flashmobs at &lt;a class="external-link" href="http://www.laweekly.com/ink/04/37/features-bemis.php"&gt;http://www.laweekly.com/ink/04/37/features-bemis.php&lt;/a&gt;&lt;a href="http://www.laweekly.com/ink/04/37/features-bemis.php"&gt;http://www.laweekly.com/ink/04/37/features-bemis.php&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Po Bronson, in his spectacular analysis of the Silicon Valley in The Nudist on the Late Shift, talks about how in a post-industrial city, the quantifiable icons of enchantment and progress – large factories, smoke spewing chimneys and huge barricaded stone and iron constructions have given way to small and homelike offices which are almost human and hence negligible. In his search for the new symbols of enchantment, Bronson conjures the figure of the nudist on the late shift – an eccentric double billionaire who works and lives in a cubicle and rides on the crest of the IT boom. In the case of third world countries like India, these symbols might well be these new sites of consumption that have come with globalization.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].One of the more exciting facets of digital technologies and globalization has been the debate over property, ownership and theft. Easy duplication of brands and bypassing the traditional circuits of distribution or sale of property have created the glorified figure of the pirate who straddles the worlds of the legal and the illegal, the digital and the physical, the ephemeral and the tactical with great ease. Within the sanctuarised spaces of malls and shopping complexes, these referents to the other world of cheap duplicates and mobile consumables hang uneasily. There is a constant attempt at establishing the original and the legitimate over the fake or copied replicas which are available in the grey markets that emerge around them.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/once-a-flash'&gt;https://cis-india.org/internet-governance/once-a-flash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-14T10:23:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
