<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2716 to 2730.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-sexual-minorities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/media-economics-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-india-chronicles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/hacking-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/understanding-right-to-information"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/igf-remote-participation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/netizen-guide-to-igf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ibsa-seminar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/social-media-masks-forgotten-protests"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question">
    <title>India’s vanishing fingerprints put UID in question</title>
    <link>https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question</link>
    <description>
        &lt;b&gt;A curious situation has come to light at the UID (unique identity) enrolment centres. Call it the phenomenon of vanishing fingerprints. You see, our unique fingerprints don’t necessarily last a lifetime and they can be damaged or destroyed and, in some cases, even non-existent. And that is not the best scenario for the first-of-its-kind project that endeavours to create a unique identity for India’s billion-plus population based on fingerprints and iris scans (or biometric data).&lt;/b&gt;
        
&lt;p&gt;To find out more,&lt;em&gt; Firstpost &lt;/em&gt;visited five UID centres in the North West district, which incidentally has the highest enrolments (619,571 and counting) among Delhi’s nine districts since the show hit the road in February 2011, and one centre in North Delhi.&lt;/p&gt;
&lt;p&gt;The officials at the Unique Identification Authority of India (UIDAI) will tell you that there is no overemphasising the importance of the quality of biometric data to the success of the super ambitious UID, now known as Aadhar project. If the quality of a person’s biometric data is poor, it automatically compromises the authentication of that data by him when he wants to access a service based on his UID.&lt;/p&gt;
&lt;p&gt;So what happens when the data – fingerprints, for instance – are inherently unreliable on account of various biological and socio-economic reasons, some of which are especially relevant to the Indian context.&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&lt;img src="https://cis-india.org/home-images/uid2.jpg/image_preview" alt="uid 2" class="image-inline" title="uid 2" /&gt;&lt;/p&gt;
&lt;p&gt;The UIDAI’s Committee on Biometrics in a December 2009 was rather forthright about its reservations on the fingerprint reliability. Titled Biometrics Design Standards For UID Applications (page 4, para 4), it stated, "….two factors however, raise uncertainty about the accuracy that can be achieved through fingerprints. First, retaining efficacy while scaling the database size from fifty million to a billion has not been adequately analysed. Second, fingerprint quality, the most important variable for determining de-duplication accuracy, has not been studied in depth in the Indian context." (Emphasis added).&lt;/p&gt;
&lt;p&gt;The findings on the ground were revelatory. Operators and technical experts at the UID enrolment centres confirmed to Firstpost that they routinely came across cases where fingerprints had been damaged/destroyed/underdeveloped. And such cases, they said, were more common among senior citizens, those involved in manual labour (who handle rough objects, for instance) and children (mostly below 10 years of age).&lt;/p&gt;
&lt;p&gt;Here is an example that &lt;em&gt;Firstpost &lt;/em&gt;observed.&lt;/p&gt;
&lt;p&gt;Batuli, 72, arrived at around noon at the Basti Vikas Kendra, now also a UID centre, in Mangol Puri to get herself a ‘smart card’ everyone has been talking about. (The 'Aadhar' brand name hasn’t caught on in these parts of Delhi, with everyone insisting on calling it the 'smart card'.)&lt;/p&gt;
&lt;p&gt;The helpful operator with the fancy gadgets helps Batuli to her seat. After her photo is taken, Batuli is asked to place four fingers — one hand at a time — on a green-lit device. Right hand, then left hand.&lt;/p&gt;
&lt;p&gt;She is, however, asked to repeat the exercise a second time for the left hand. The operator explains. "In some case, we have to scan the fingerprints and Iris multiple times. If it doesn’t pass the required quality percentage of 70 per cent (the quality is indicated in percentage terms on the computer screen that is connected to the fingerprint machine, see pic), we repeat the exercise up to four times."&lt;/p&gt;
&lt;p&gt;Batuli’s hands are then wiped using a cloth and placed back on the device. The exercise is repeated a fourth and final time. But still the same result. 'Fail', declares the reading on the operator’s computer.&lt;/p&gt;
&lt;p&gt;An operator at the next station, says, "In the case of senior citizens, Iris scans also sometime fail. It registers weakly when the retina is damaged."&lt;/p&gt;
&lt;p&gt;(Enrolment centres are run by private companies on contracts given by registrars chosen by the UIDAI. Strategic Outsourcing is one such company and it runs many of centres in the North West and South West districts of Delhi.)&lt;/p&gt;
&lt;p&gt;The project coordinator of the UID enrolment centre working out of the Destitute Welfare Trust, an NGO in Sultanpuri, too, confirmed that he was aware of the problem of damaged fingerprints and the challenge it posed in getting good quality fingerprint data.&lt;/p&gt;
&lt;p&gt;"The hands of children are very soft and in some cases fingerprints are not yet fully developed. Also, children tend to have sweaty hands and this can interfere with the quality of fingerprints. Extremely dry hands also pose problems. We have to often, wipe the hands or provide lotion to improve the quality of fingerprints," said a technical expert working with Strategic Outsourcing.&lt;/p&gt;
&lt;p&gt;While the number of attempts, as prescribed by the UIDAI, to get a stronger finger print when the result reads 'fail' is four, operators report that sometimes attempts go up to 10 to 15. (The machine picks up the strongest impression of the attempts made). They say they didn’t anticipate such a problem and it was only when they started enrolments in January that they were confronted with such a scenario. “Now, of course, everybody knows about it."&lt;/p&gt;
&lt;p&gt;'Everybody' implies those who are directly involved in collecting biometric data. An operator from another private company Smartchip working in a JJ (slum) colony in the North Delhi district of Model town, revealed similar problems on being probed. &amp;nbsp;"A fingerprint strength of 70 percent or more is pass. About 10 per cent of the cases we get every day register the 'fail' reading. What can we do? In the case of stone cutters, for instance, the fingers are completely smooth, the fingerprints are completely wiped out."&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_copy5_of_copy4_of_copy3_of_copy2_of_copy_of_uid3.jpg/image_preview" alt="uid 3" class="image-inline image-inline" title="uid 3" /&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;So what are the implications of poor quality fingerprints for the UID project? The UIDAI admitted that it could provide challenges to authentication.&lt;br /&gt;&lt;br /&gt;In an email response to Firstpost, Sujata Chaturvedi, UIDAI’s Deputy Director General for the Delhi region said, "It could provide some challenges in de-duplication although that has been mitigated to a large extent by the decision of the UIDAI to go in for iris an additional de-duplication factor… Also to be noted is the fact that normally not all fingers are equally de-graded. So UIDAI is evolving a protocol to inform the residents about their good quality fingerprints as part of the Aadhaar letter so that they are aware of the finger to use for authentication."&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;But not everyone is convinced. Sunil Abraham is the executive director of Centre for Internet and Society (CIS), which has written seven open letters to the Standing Committee on the Finance Branch (before which is the National Identification Authority of India Bill, 2010) asking the committee to consider their research on the UID project and change aspects of the Bill and the project.&lt;/p&gt;
&lt;p&gt;The seventh letter sent last week, says Abraham, provides statistical analysis that demonstrates how the UID will never be able to create a unique database.&lt;/p&gt;
&lt;div class="pullquote"&gt;"In CIS’s seventh open letter to the finance committee, statistical analysis reveals that UIDAI tender specification is 1,000 times less accurate than it should be to have a reasonable chance of building a truly unique database. This analysis depends on high quality biometrics. With poor biometric quality the problem of de-duplication is compounded."&lt;/div&gt;
&lt;p&gt;When UIDAI was asked what the percentage of the population enrolled (all India and Delhi) had recorded below-standard fingerprint quality, no specific data was forthcoming.&lt;/p&gt;
&lt;p&gt;Chaturvedi wrote, "Currently the population with very poor quality fingerprints is a very small percentage. It must also be remembered that this population is scattered all over the country."&lt;/p&gt;
&lt;p&gt;In India, even a small percentage translates to millions of people. "Small percentage could mean absolutely anything. Why can’t they be more specific? One percent in the Indian context is 12 million people," said Abraham.&lt;/p&gt;
&lt;p&gt;On how the UIDAI was dealing with challenge of poor fingerprint quality, Chaturvedi said, "Even amongst the populace that has damaged/destroyed/underdeveloped fingerprints, chances are very high that they would have at least one good fingerprint that could be used for authentication. Second, UIDAI is also starting to actively develop iris authentication ecosystem. Fingerprint authentication and iris authentication could supplement each other to ensure a universal coverage."&lt;/p&gt;
&lt;p&gt;She added that Aadhaar authentication will supplement and work in conjunction with existing authentication systems to strengthen the overall authentication rather than replace completely the existing authentication systems.&lt;/p&gt;
&lt;p&gt;That begs the question, as Abraham puts it, "If the UIDAI is not going to replace existing forms of authentication it is not clear why the government is spending all this money on unproven biometric technology."&lt;/p&gt;
&lt;p&gt;Chaturvedi, however, maintained that the initial PoC (proof of concept) study that was taken up in Andhra Pradesh, Karnataka and Jharkhand collected about 60,000 enrolments indicated that the biometric accuracy levels necessary for de-duplication of all residents of India are achievable.&lt;/p&gt;
&lt;p&gt;"The PoC results also indicated the time needed for capture of biometrics in typical rural conditions is small enough to support large scale enrolment. Over and above the initial PoC, the UIDAI has currently completed over 5 crore enrolments for which Aadhaars have been generated. This experience reinforces the initial PoC results that the de-duplication accuracy is sufficient and sustainable to enrol the rest of the population."&lt;/p&gt;
&lt;p&gt;The original article is written by Pallavi Polanki. It was published in Firstpost on October 24, 2011 and can be read &lt;a class="external-link" href="http://www.firstpost.com/politics/aadhar-indias-vanishing-fingerprints-put-unique-identity-in-question-115144.html/2"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question'&gt;https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-26T10:05:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-sexual-minorities">
    <title>Privacy &amp; Sexual Minorities</title>
    <link>https://cis-india.org/internet-governance/privacy-sexual-minorities</link>
    <description>
        &lt;b&gt;Danish Sheikh examines the status of sexual minorities in the light of privacy framework in India. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, the research brings to light the privacy violations being committed by both individuals as well as state authorities. The research concludes by saying that privacy doesn’t necessarily encompass a one-size-fits-all approach, and can raise as many questions as it answers.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Defining Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In examining the status of sexual minorities vis-à-vis the privacy framework in India, this research takes into account a definition of privacy that encompasses protection against physical interference with a person and their property as well as the state of being free from intrusion in one’s private life or affairs.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; This involves an understanding of privacy violations being committed by both an individual as well as the State. On the one hand is the extent to which a private individual is entitled to personal information about another individual and on the other is the extent to which government authorities can intrude into the private life of a citizen to keep watch over his or her movements or exercise control over personal choices.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No mention of sexuality and privacy in India can stand without a nod to Section 377 of the Indian Penal Code (IPC). In 1860, with the institution of the IPC by Lord Macaulay, section 377 criminalized homosexuality by putting forth that, "carnal intercourse against the order of nature"&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; was to be punishable by law. While this archaic law stands even today, it was read down significantly in a landmark Delhi High Court judgment in 2009&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; which will be referred to later. As stated in an open letter by Vikram Seth and a host of others and endorsed by Amartya Sen, the law has been used to "systematically arrest, prosecute, terrorize and blackmail sexual minorities. It has spawned public intolerance and abuse, forcing tens of millions of gay and bisexual men and women to live in fear and secrecy at tragic cost to themselves and their families."&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; When understood in its conception as non-interference by the State, as the right to be left alone,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; privacy isn’t necessarily an empowering right for lesbian, gay, bisexual and transgender (LGBT) persons. For one, the claim to privacy when it comes to same-sex acts tends to get construed as a claim for secrecy: it is to carry out purportedly "clandestine" acts that the sexual minority community wants refuge from the State. The same strategy can further backfire when claims for heightened scrutiny might in fact be requested, such as in discrimination actions.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A zonal understanding of privacy also subverts the fact that many instances of expression of identity happen in the public sphere.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a while, privacy jurisprudence hinged on this idea of privacy as a negative right by disallowing infringement of a person’s right to a private life by the State. This understanding may be located in an international regime which has for a while insisted on dividing civil and political rights at one side, and social and economic rights on the other. With this split, what was institutionalized was the idea that civil and political rights were as such "negative" rights, while social and economic rights were "positive" in their content. In effect, the presumption that stood was that while states needed to expand resources to uphold social and economic rights, no such correlative obligation required observance in respect of civil and political rights.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Recent human rights conventions such as the Convention on the Rights of Persons with Disabilities acknowledge the flaw in this understanding, based on the reasoning that both civil and political rights and social and economic rights give rise to positive and negative duties.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; The Naz Foundation&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; judgment propels the understanding of privacy as a positive right. It’s easy enough to split the analysis in this study neatly with the judgment which, in the course of declaring unconstitutional the aforementioned IPC provision, discussed at length the right to privacy, exploring it as a function of dignity. To divide what the Delhi High Court said about the right into three parts — first, they discussed privacy as dealing with persons and not places,&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; implying that the right to privacy is not only a claim to space from state intervention but that it protects the autonomy of the private will and a person’s freedom of choice and action, second, they tied it in with dignity and connected it with the value and worth of all individuals,&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; and third, they talked of the right to privacy as being based on one’s autonomous identity. In the context of privacy, this means that it is "the inner sanctum of the person such as his/her family life, sexual preference and home environment which is shielded from erosion by conflicting rights of the community."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there will be a bit of a before-Naz/after-Naz tint to the analysis, it is important to appreciate that the nature of privacy discourse when it comes to sexual minorities remains somewhat murky even after the grand affirmation that the judgment provided. A large part of this of course is concerned with society struggling to catch up with the developments in the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before moving on to the next chapter, I’ll unpack the term "sexual minority" to delineate the different communities that will feature in the course of this paper, whilst also attempting to renegotiate the idea of privacy contextually. Using Arvind Narrain’s seminal monograph Queer as a template,&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; the term gay will be employed to describe a man who is attracted to another man emotionally, sexually or physically; a lesbian woman is attracted to women emotionally, sexually or romantically; while someone who is bisexual maintains that attraction towards members of both sexes. A transgender person assumes the gender identity of the opposite sex; within Indian discourse they are called as &lt;i&gt;hijras&lt;/i&gt;, constituted of a transgender person who is biologically male and takes on the gender role of a female. The &lt;i&gt;hijra&lt;/i&gt; community in India maintains a unique form of social organization within its parallel society. We then have the term "eunuch", used in a more derogatory fashion, which medically refers to a castrated male, and is sometimes employed in India to refer to the &lt;i&gt;hijras&lt;/i&gt;. Another South Asian constructed identity is that of the &lt;i&gt;kothi&lt;/i&gt; — a male homosexual who is feminized and takes a passive/receptive role in sex.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next section of this study will look at a string of privacy concerns of sexual minorities in India as sourced from various studies and media reports. The analysis pauses at the interplay of rights surrounding the transgender community in particular: how do issues of recognition of their particular category impact members of the community?  The subsequent section jumps past the timeline of the Naz Foundation judgment to understand the kind of changes – if at all – that the high court’s words have effected when it comes to this idea of privacy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Privacy Rights and Wrongs&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The incidents highlighted in this chapter took place before the Delhi High Court altered the way we conceived of queer rights in general and privacy in particular. Two issues permeate this analysis: one, the notion of criminality hovering above queer identity, and two, the somewhat one-dimensional idea of privacy that existed then. A third, more complex issue in the context of the &lt;i&gt;hijra&lt;/i&gt; community becomes the idea that one conception of privacy may not always be the most empowering for a community, and the subsequent negotiations that have to be made in that sphere.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Entrapment: The Lucknow Incidents&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In July of 2001, a set of raids: first on a public park frequented by the men who have sex with men (MSM)&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; community, and next on the offices of two NGOs working on safe sex issues led to the arrests of ten people. The operation was conducted on the basis of an FIR filed with a Lucknow police station wherein it was alleged that a certain Suresh had sodomized the complainant. Notable in the incident was the climate of homophobia stoked by the media which indulged in sensationalizing headlines,&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; with the magistrate concerned further refusing bail to the men. In denial of bail, instead of siding with the relevant law, the magistrate clearly proceeded on the basis of his perceptions regarding homosexuality: "they…are polluting the entire society by encouraging the young persons and abetting them for committing the offence of sodomy."&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we were to extend the Supreme Court’s reasoning in the catena of surveillance cases vis-a-vis privacy starting from &lt;i&gt;Kharak Singh v. State of U.P.&lt;/i&gt;, &lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; it is clear that the NGO members’ right to privacy was violated by the way of unwarranted search and seizure operations carried out by the police. As the court said in &lt;i&gt;Govind v. State of M.P.,&lt;/i&gt;&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; domiciliary visits and picketing by the police should be reduced to the clearest cases of danger to community security. While the judges were referring to matters relating to follow-up from a conviction/release from prison, it seems evident that a higher standard should be given to cases where such prior conviction itself hasn’t taken place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for the accused, Narrain notes how the response of the State and media ended up harming them, regardless of the final judicial decision. &lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; The public hearings meant that in Lucknow, their sexual identities became public, with a definite impact on their future prospects and present perceptions. The question, as Narrain poses, is the issue of the suitability of the courts to protect the rights of people who are still in the closet. If approaching the courts means compulsory 'outing' with all its attendant negative outcomes, how does one articulate the rights of such a minority?&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are thus three major facets of privacy violation here: the police’s lawlessness resulting in the primary intrusion; the media’s sensationalization which harshly exposed the accused to the public glare; and finally, the magistrate’s bias which legitimized these privacy violations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet another set of arrests took place in the city, this time in 2006, with the police in Lucknow arresting four men under section 377 for allegedly having sex in a public park. News reports revealed pictures of all the four men with their names and home addresses.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first information report (FIR) here contradicted the investigation of a fact finding team of activists and lawyers: it emerged that none of the men were actually involved having public sex, with the story by the police being a completely fabricated one. It turned out that one of the men had been arrested by the police on their knowledge about his homosexuality, following which his contacts were tapped to stage an entrapment of the other three men.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This notion of raiding homosexual gatherings was taken to its extreme by a police raid on a gay party in the outskirts of Mumbai in 2008, in the course of which six persons were detained. "…. neither was he able to give a satisfactory explanation for organizing the party," said the API on questioning the event organizer.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In these instances of interplay between criminal procedure, media ethics and judicial process, it is worth questioning whether general reforms in those areas will positively affect privacy rights of sexual minorities in particular. Unwarranted searches and arrests are barely an uncommon occurrence in the country, neither is the fact of accounts of people’s sexual behaviour finding themselves very publicly outed in the media, and nor, again, are accounts of judges overlooking police excesses rare. It’s a bit difficult to make an exact value judgment over what kinds of privacy violations is more damning, in a society that takes its sexual mores quite seriously, be they with regard to hetero or homosexual sex. More than anything though, that just makes the need for across the board reforms in these areas more urgent, and sharpens the kind of alliances across communities that would be required to effect change. Of course, this kind of advocacy can only happen in an atmosphere where homosexuality continues to be decriminalized – the fate of the Naz Foundation appeal before the Supreme Court is of paramount importance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Gender Identity and Transgender Issues&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A survey of the situation regarding the transgender community in India throws up a fascinating picture of instances where seemingly positive sounding regulation doesn't always serve its intended effects – when such "positive sounding" regulation does happen at all. To start with, there is the question of the status of the transgender community in India itself – a PUCL report&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; notably documented, and numerous reports and articles&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; have affirmed, the reality of the transgender community today as one of harassment, abuse, and sexual violence. These accounts reveal a deep-rooted fear inculcated by mainstream society of sexual and gender non-conformity, which manifests itself in the refusal of basic citizenship rights to these communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PUCL report gives a detailed account of harassment by the police in public places, at home, in police stations, and instances of entrapment similar to the Lucknow cases. Instead of reiterating that aspect which would simply involve repeating the above analysis, this section will look into other gender-specific issues that arise with respect to the community and the multiple questions these give rise to:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transgender Toilets&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first example relates to efforts by the Chennai Municipal Corporation to build toilets specifically for the transgender population,&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; in a move stated as being part of a pilot project to recognize the considerable community in South and Central Chennai. Each lavatory in these toilets was to contain male, as well as female urinals. In the words of the municipal commissioner, the scheme was aimed at "extending recognition to the community and mainstreaming them", and more facilities could be built if the public responded well to the idea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reaction from the community was mixed at best: sure, it was regarded as a positive move to the extent that not every person who identified themselves as transgender had undergone sex change; simultaneously, the city saw one section of the community fearing the move as a step towards discrimination and isolation. "I don’t agree with this. We want to mingle with the mainstream. We don’t want to be separated like this," said Aasha Bharati, president of the Aravanigal Association. The idea of privacy here is at odds with something else the community is striving for: inclusion. The fear then was of one kind of recognition trumping another. What would a policy maker then privilege? Would this possibly be a better short-term move, as we move towards a future understanding of not being disabled by difference, or would the ideal of privacy trump even that?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The way this issue has played out in the Indian context stands in interesting contrast to cases in America. A bill in Maine which would allow restroom owners in business establishments and institutions from mandating what gender persons would use what washroom was met with sharp opposition from the transgender community on claims of dignity and privacy.&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt; For a person who, say, externally had strongly masculine features, but identified as a woman, two options existed: either break the law and walk discreetly into the male compartment – or risk the outrage of other women as she walked into their compartment and was faced with their indignation of having a "man" use their toilet. In such an instance, there stand two rival conceptions of privacy: one in which respecting privacy would, somewhat ironically, stand as a transgender person’s right to assert their distinct identity in public without fear, versus a conception of privacy as anonymity – their right not to be compelled to make a political statement in the course of going about their daily lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now that kind of issue wouldn’t come up in the Indian context for a large section of the transgender community simply owing to the hyper-visibility of the &lt;i&gt;hijras&lt;/i&gt;. For all its contemporary stigmatization, the &lt;i&gt;hijra&lt;/i&gt; community is a discernible one in public with an acknowledged history. &lt;i&gt;Hijras&lt;/i&gt; have won elections in India, and are very much an acknowledged part of public space.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; To that extent, privacy isn’t quite the overriding concern here in the way that it might be in the West – one might even say that the lack of such a conception can in this particular case be somewhat empowering.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Passport Forms&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next example concerns gender-sensitivity when it comes to passport forms.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; The Ministry of External Affairs moved to allow for the option of entering a person's sex as "E" instead of either "M" or "F", the "E" then standing for "Eunuch". At the time of introduction of this category there was a degree of ambivalence: it was not available on the form itself, instead being listed as an option only in the rules. As activists noted however, it was a victory in the sense of being the first official recognition of the community. The particular category of recognition was problematic: for one the term "eunuch" would only reasonably represent one part of the transgender population; for another, large sections of the community would consider that term insulting. The government subsequently made an ameliorative measure by changing the category to "Other".&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; Again, the logical privacy question that would arise here would be regarding one's desire to be identified as transgendered in the first place. Similar to the toilets example, the issue would play out differently in India in many cases, given the hyper-visibility of the &lt;i&gt;hijra&lt;/i&gt; community which provides an instant marker for a &lt;i&gt;hijra&lt;/i&gt;, and subsequently ensures that there isn’t really a privacy violation when it comes to such kind of identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, this declaration of otherness leads to issues for someone uncomfortable with disclosing transgender identity as such, and wanting to perform maleness or femaleness specifically. Would marking either the "M" or "F" column be considered an illegality?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognition – and Resolving Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where official recognition is clearly ameliorative, it doesn't always stay. Following years of struggle, the community was given recognition in Andhra Pradesh under the Minorities Welfare Department. It was short-lived, however: protests by religious minority groups forced the government to go back on its decision.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; The kind of privacy violations that the &lt;i&gt;hijra&lt;/i&gt; community suffers in India are thus in stark contrast to the kinds suffered by members of the gay and lesbian community: where one side deals with its invisibility, the other contends with the problems of its hyper-visibility. &lt;i&gt;Hijras&lt;/i&gt; walk about as constant targets of police intrusion.  A gay man or lesbian woman wouldn’t necessarily face those issues at the same level, except in instances where public sex is involved. The exceptions to even that are incidents of entrapment such as the Lucknow case, but it is evident that it is the &lt;i&gt;hijra&lt;/i&gt; community which deals with such police action much more than the others. What is also uniquely empowering for the community is this very aspect of their identity, this ever-present identification. The kind of fears of disclosure and blackmail that someone who fears outing might face fizzle out in the case of the &lt;i&gt;hijras&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discourse gets complicated when you take up the identities of non-&lt;i&gt;hijra&lt;/i&gt; transgendered persons: there are the female-to-male transgendered identities of Thirunambigal in Tamil Nadu, Magaraidu in Andhra Pradesh and Gandabasaka in Karnataka – as well as male to female identities such as the Jogappas in Northern Karnataka, and Jogathas in Andhra Pradesh.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; The idea of hyper-visibility which is so crucial to locating a sense of empowerment for the &lt;i&gt;hijra&lt;/i&gt; community in their lack of loss of privacy disappears here. The discussion here then springs back to the U.S. example of transgender toilets, and the complications that arise when external identity doesn’t necessarily match the internal one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Medical Establishment&lt;/b&gt;&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relevant to this section of the study is the understanding of privacy under the ambit of autonomy. Referring to Naz Foundation, instead of using liberty to describe and support privacy as under Article 21 of the Constitution of India, the court refers to autonomy holding that "exercise of autonomy enables an individual to attain fulfillment, grow in self-esteem and form relationships of his or her choice and fulfill all legitimate goals that he/she may set."&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt;;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The medical establishment in India constantly undermines that autonomy by its treatment of homosexuality as a disease, and of LGBT persons as "others". LGBTs in India have often been detained in clinics against their will and subjected to treatment including shock therapy aimed at curing them.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2001, the National Human Rights Commission (NHRC) admitted a complaint from a patient at the All Indian Institute of Medical Sciences, alleging psychiatric abuse at the hands of the consulting doctor, having been put on a four year course of drugs and told he had to be "cured" of his homosexuality. The NHRC finally chose to reject the complaint, with informal conversations with the chairman showing his belief that till section 377 was read down, nothing could be done. &lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Vinay Chandran, Executive Director of the Swabhava Trust, medicine in India continues to be obsessed with curing homosexuality, with health professionals in many places still offering behavioural therapy including electric shock treatment as well as psychiatric drugs and hormones in order to "cure" patients of homosexual desire. Vinay reports that a couple of psychiatrists in Bangalore mentioned that there were possibilities of discovering which gene determines sexual preference and scientifically suppressing it.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course quacks exist across the spectrum, and medicinal malpractice is barely limited to serving disastrous advice/ treatment to persons "afflicted" with homosexuality. For understanding how the debate moves beyond merely unqualified doctors, we have to factor in the category of ego-dystonic homosexuality, which is endorsed by the WHO. Here, the gender identity or sexual preference of the individual is not in doubt, but the individual wishes it were different and seeks treatment.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The way a number of psychiatrists’ engage with the situation is summed up by the statement: "it’s not my job to tell him that it’s okay to be gay." No, the psychiatrist’s job it seems is to attempt to "cure" the oft-acknowledged incurable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fundamental factor not taken into account is that it is very often the environment that surrounds expression of homosexual identity that the patient is concerned about, as opposed to merely the idea of being LGBT. The relationship between patient and doctor is a fiduciary one, premised on absolute trust. In consulting a doctor, the patient entrusts fundamental decision making powers to the practitioner. The medical professional is often unable to comprehend the question of choice. This in turn results in effectively infringing the patient’s autonomy: the component of attaining fulfillment, the growth in self-esteem that the Delhi High Court elaborated on is robbed in the process of stifling sexuality, even when it is something the patient specifically requests the doctor for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lesbian  Unions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maya Sharma, in her book Loving Women locates the stories of a number of working-class lesbian women struggling to be with each other against the odds.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt; In a vein that parallels the reaction elicited to inter-religious or inter-caste marriages in a number of regions, it is often the honour of a family/village that is invoked in opposition to the demands of two people who want to be each other. One incident involves a woman who "dares" to elope with another being beaten and stripped, having her face blackened and being paraded around a village with a garland of shoes on her neck. Sahayatrika, a lesbian women's collective in Kerala has documented 24 cases of lesbian couple suicides in Kerala during the period between 1996 and 2004.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt; Earlier this year, two sets of lesbian couples committed suicide within a month of each – one in Sonarpur,.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt; and the other in Nandigram.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sexuality has often been used as a means for controlling women. The immoral/ tainted woman when placed in contrast with the idealized image of the model Indian woman is an image played out in various daily social interactions. In carrying out the agenda of control, the act of agency displayed by women who choose to step out of the heterosexual woodwork is a direct threat to that very system. The acts of family members in attempting to separate lesbian unions display a lack of respect for autonomy and for the private decisions of the women concerned. The feelings of fear, shame and isolation experienced by women who dare to explore their sexuality are compounded by instances of persecution by the family. The state is further complicit in numerous documented instances with the police often working with the family to track down the runaway brides and get them back home to familial watch under lock and key.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy again battles with privacy in this realm: an oft-heard feminist critique of privacy hinges on the idea that privacy can be dangerous for women when it is used to cover up repression and physical harm to them by creation of the public/private divide.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; The private realm is premised on non-intervention by the State. In this instance however, it is another aspect of privacy that needs to be valued, and one that even calls for state intervention: the aforementioned act of autonomy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Privacy in the Time of Naz&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The examples up until now have been coloured with a pre-Naz conception of privacy and queer rights – this chapter takes up two incidents post the judgment that captured the public imagination. First is the sting operation carried out on an Allahabad Muslim University professor that began a chain of events leading to his death; the second is an "expose" on the gay community carried by TV9. In both incidents, the "Spectre of Naz" &lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; looms in the background, in many ways acting as an empowering, legitimizing force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Allahabad Muslim University Sting Operation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February 2010, newspapers widely reported the story of Dr. Shrinivas Ramchandra Siras a 64 year-old Reader &amp;amp; Chairman, Department of Modern Indian Languages, Aligarh Muslim University (AMU) being filmed having consensual sex with another adult male. When the video was made public, AMU suspended Siras for immoral sexual activity.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; The implications of the suspension both in terms of the perception of homosexuality as immoral despite the judgment of the Delhi High Court as well as the disturbing nature of the occurrence of the filming of Dr. Siras in the privacy of his home prompted a nationwide outrage.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 1 of the same year, the Allahabad High Court ordered AMU to reinstate Siras, holding that his right to privacy had been violated, stating "the right of privacy is a fundamental right, needs to be protected and that unless the conduct of a person, even if he is a teacher is going to affect and has substantial nexus with his employment, it may not be treated as misconduct."&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then comes the news that Uttar Pradesh police had arrested two of those who broke into Siras’ house and filmed him. Many university officials were also charged with criminal offences. As Vinay Sitapati notes, none of this could have happened in a context where gay sex was illegal. In that context, it would have been Siras who was the criminal, and the additional wrongs done simply irrelevant – "this is not how the story was supposed to pan out. Those who broke into Siras’s house and AMU (and there are allegations that they are one and the same) assumed that Siras’s transgressions were so repellent, that their own would be forgiven." The judicial narrative — of a victimized Siras, a callous administration and criminal house-breakers — owes much to the Delhi High Court’s view that Siras’s sexual choice was legitimate.&lt;a href="#fn49" name="fr49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going back to the understanding that the right to privacy is integrally linked to the notion of autonomy and the right to live with dignity ‒ it is this most fundamental of Constitutional safeguards that the AMU authorities clearly colluded in negating by being complicit in the sting operation and subsequently suspending Dr. Siras. A press release by the AMU authorities demonstrated a continuing disrespect for privacy: "the university respects the privacy of a teacher living in its premises but it also expects everyone to behave in a respectful manner giving due regard to its valued cultural ethos and the campus sensitivity including their neighbours concerns and to the great moral credentials that AMU has been nurturing since its inception."&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The TV9 “Expose”&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February of 2011, the news channel TV9 aired what it called an expose on the Hyderabad gay community titled "Gay Culture in Hyderabad". The video starts by worrying about how gay culture in Hyderabad is "increasing drastically". Following this, footage of a gay club is shown, without any attempt to blank out faces. The show then puts itself in the mode of investigative journalism, as TV9 sets itself the target of exposing the "truth" about gay culture in the city.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, viewers are informed about gay dating websites, with the anchor taking special care to inform viewers that it is software employees and students who mostly "fall prey" to this gay culture. Then, in an astonishingly blunt violation of privacy, pictures of men on one dating site are flashed on the screen, accompanied by conversations between the concerned man and a TV9 journalist soliciting sex. "While some do it for new pleasures, some get spoilt by friends, others do it for the crave of money and the remaining are vowed by the lust some of them have changed it into a business by capturing teenager's mind and get them into hell."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The video recording of the telecast on YouTube was taken off the site following a sustained protest from users of the site. Notices for legal action were sent to TV9 offices, including a detailed petition from Adhikaar, a Delhi based NGO. Two questions were primarily asked on LGBT mailing lists across the country&lt;a href="#fn51" name="fr51"&gt;[51]&lt;/a&gt;: first, regarding how safe establishing one’s homosexual identity online, or attending gay parties would be anymore, and secondly, whether a protest should take place, and what the nature of the same should be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As highlighted by the petition drafted by Adhikaar, a Delhi-based NGO, this act of TV9 was violative of Code 6 of the News Broadcasters Association Code which deals with matters of privacy, and states:&lt;a href="#fn52" name="fr52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"As a rule channels must not intrude on private lives, or personal affairs of individuals, unless there is a clearly established larger and identifiable public interest for such a broadcast. The underlying principle that news channels abide by is that the intrusion of the private spaces, records, transcripts, telephone conversations and any other material will not be for salacious interest, but only when warranted in the public interest."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By way of entrapping a set of gay men through calling them and asking them pointed personal questions about their sexual lives, TV9 was further in violation of Code 9 (Self-Regulation Section) of the News Broadcasters Association which deals with sting operations and which states:&lt;a href="#fn53" name="fr53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"As a guiding principle, sting and undercover operations should be a last resort of news channels in an attempt to give the viewer comprehensive coverage of any news story. News channels will not allow sex and sleaze as a means to carry out sting operations, the use of narcotics and psychotropic substances or any act of violence, intimidation, or discrimination as a justifiable means in the recording of any sting operation."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A month later, the News Broadcasting Standards Authority, New Delhi censured TV9 and ordered it to pay a fine of Rs.1,00,000 and broadcast an apology in prime time both in English and in Telugu. The Authority determined that TV9 has violated the codes of ethics and broadcasting standards.&lt;a href="#fn54" name="fr54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice JS Verma called the story a sensationalized depiction of gay culture in Hyderabad and the story needlessly violated the privacy of individuals, with possible alternate sexual orientation. He also pointed out that alternate sexual orientation is no longer considered as a taboo or a criminal act. The channel was directed to run an apology for three consecutive days beginning the Monday next, in prime time with the following text:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"TV9 apologizes for the story “Gay Culture Rampant in Hyderabad” telecast on this channel on 22 February, 2011 from3.11 p.m. to 3.17 p.m. particularly since the story invaded the privacy of certain persons and was in violation of the Code of Ethics &amp;amp; Broadcasting Standards of the News Broadcasters Association. Any hurt or harm caused to any person thereby is sincerely regretted."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, it must be noted that the order of the NBSA would not have been possible in a context where gay sex was illegal: it is that very notion that allowed the Authority to move past the issue of homosexuality and instead delve into the merits of the actual harm done here.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is possible to mount an argument that nothing has really changed post-Naz. The AMU’s attitude even in the face of the flak it received after the sting operation was phlegmatic at best: a summary statement saying that while it respected his privacy, it also expected a certain degree of behavior keeping in line with its "valued cultural ethos". Reactions like this threaten to lock the idea of privacy into a closed epistemic loop of judicial discourse: the courts might go hoarse extolling the significance of privacy, but it is for nought if the AMU decides it can still walk away with its flagrant violation of basic civil liberties. Or perhaps the frenzy generated by the incident will work as a deterrent factor to future institutions fixing their moral gaze upon their members. The strength of an incident as precedent can only be gauged effectively by how its future echoes use it as a reference point.&lt;/p&gt;
&lt;div class="pullquote" style="text-align: justify; "&gt;&lt;b&gt;Meanwhile, what do these stories tell us about privacy? &lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The issues faced by the transgender community tell us that privacy doesn’t necessarily encompass a one-size-fits-all approach, and can raise as many questions as it answers. The issues faced by the Lucknow NGOs narrate a tale of institutionalized disrespect for privacy that has marginally more devastating consequences for the homosexual community by the spectre of outing. The issues faced by lesbian women evidence yet another need for breaching the public/private divide, demonstrating how the protection of the law might be welcome in the family sphere regardless of the bull-in-a-china-shop&lt;a href="#fn55" name="fr55"&gt;[55]&lt;/a&gt; prophecies of doom. Alternate sexual orientation and gender identity might bring the community under a common rubric, but distilling the components of that rubric is essential for engaging in any kind of useful understanding of the community and the kind of privacy violations it suffers – or engage with situations when the lack of privacy is empowering.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Selected incidents reported from 2001-2011&lt;/b&gt;&lt;/h2&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;NGO charged with running gay club&lt;/td&gt;
&lt;td&gt;8 July 2001&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/MNHzw"&gt;http://goo.gl/MNHzw&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Homosexuality okay if practiced in private&lt;/td&gt;
&lt;td&gt;14 September 2011&lt;/td&gt;
&lt;td&gt;Sify News&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/iF3PQ"&gt;http://goo.gl/iF3PQ&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Male callers harass lesbian helpline&lt;/td&gt;
&lt;td&gt;26 October 2003&lt;/td&gt;
&lt;td&gt;Mid Day Mumbai&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/Xf0fj"&gt;http://goo.gl/Xf0fj&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Lesbian marriages, born of a legal loophole, stir debate in India&lt;/td&gt;
&lt;td&gt;4 February 2005&lt;/td&gt;
&lt;td&gt;DesPardes&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/O30Hf"&gt;http://goo.gl/O30Hf&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Third sex finds a place on Indian passport forms&lt;/td&gt;
&lt;td&gt;10 March 2005&lt;/td&gt;
&lt;td&gt;Telegraph&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/nBQIt"&gt;http://goo.gl/nBQIt&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Lesbian couple sparks debate in Uttar Pradesh state&lt;/td&gt;
&lt;td&gt;9 April 2005&lt;/td&gt;
&lt;td&gt;Sify News&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/9GxuF"&gt;http://goo.gl/9GxuF&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;The Indian city of Chennai is set to build toilets for trans people&lt;/td&gt;
&lt;td&gt;July 2005&lt;/td&gt;
&lt;td&gt;Pink News&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/52Llq"&gt;http://goo.gl/52Llq&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Homosexual gangs&lt;/td&gt;
&lt;td&gt;3 January 2006&lt;/td&gt;
&lt;td&gt;Pioneer&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/NX2NP"&gt;http://goo.gl/NX2NP&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Nihal was used to homosexual sex since 1986&lt;/td&gt;
&lt;td&gt;4 January 2006&lt;/td&gt;
&lt;td&gt;Dainik Jagran&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/NX2NP"&gt;http://goo.gl/NX2NP&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Ain’t no cure for love&lt;/td&gt;
&lt;td&gt;6 June 2006&lt;/td&gt;
&lt;td&gt;India Together&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/V9Vjn"&gt;http://goo.gl/V9Vjn&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;Police bust gay party&lt;/td&gt;
&lt;td&gt;4 February 2008&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/n2nyz"&gt;http://goo.gl/n2nyz&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Aligarh Muslim University professor suspended for being gay&lt;/td&gt;
&lt;td&gt;18 February 2010&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/D8LuD"&gt;http://goo.gl/D8LuD&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;Class monitors&lt;/td&gt;
&lt;td&gt;8 March 2010&lt;/td&gt;
&lt;td&gt;Outlook&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/Q2dkV"&gt;http://goo.gl/Q2dkV&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Aligarh gay professor found dead, may have killed self&lt;/td&gt;
&lt;td&gt;8 April 2010&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/FyeIz"&gt;http://goo.gl/FyeIz&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;AMU professor a victim of clash between ‘tradition’ and privacy&lt;/td&gt;
&lt;td&gt;25 February 2010&lt;/td&gt;
&lt;td&gt;The Hindu&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/AtiJW"&gt;http://goo.gl/AtiJW&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Criminal case registered against six in gay professor case&lt;/td&gt;
&lt;td&gt;10 April 2010&lt;/td&gt;
&lt;td&gt;India Today&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/LfwDI"&gt;http://goo.gl/LfwDI&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;AMU Prof promised money for sex: Rickshaw-puller&lt;/td&gt;
&lt;td&gt;19 April 2010&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/aXmBz"&gt;http://goo.gl/aXmBz&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;Varsity paid for sting on gay professor&lt;/td&gt;
&lt;td&gt;19 February 2010&lt;/td&gt;
&lt;td&gt;India Today&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/cyQxL"&gt;http://goo.gl/cyQxL&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19&lt;/td&gt;
&lt;td&gt;TV channel outs gay men, women in Hyderabad&lt;/td&gt;
&lt;td&gt;24 February 2010&lt;/td&gt;
&lt;td&gt;NDTV&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/w6NG4"&gt;http://goo.gl/w6NG4&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;News Broadcasting Standards Authority censures TV9 over privacy violations&lt;/td&gt;
&lt;td&gt;25 March 2011&lt;/td&gt;
&lt;td&gt;Privacy India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/rY7bT"&gt;http://goo.gl/rY7bT&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;21&lt;/td&gt;
&lt;td&gt;In a first, Gurgaon Court recognizes lesbian marriage&lt;/td&gt;
&lt;td&gt;29 July 2011&lt;/td&gt;
&lt;td&gt;Times of India&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://goo.gl/70KPr"&gt;http://goo.gl/70KPr&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Madhavi Goradia Divan, Facets of Media Law, Eastern Book Company, Lucknow, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].For instance, an HIV positive man’s right to marry as discussed in &lt;i&gt;Mr. X v. Hospital Z&lt;/i&gt;, 1998 (8) SCC 296.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].Section 377, Indian Penal Code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].(2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].&lt;a class="external-link" href="http://www.openletter377.com/"&gt;http://www.openletter377.com/&lt;/a&gt;, last accessed 20 October 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].Olmstead v. U.S., 277 U.S. 438, 478 (1928) (Brandeis, J., dissenting).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].Cathy Harris, Outing Privacy Litigation:  Towards a Contextual Strategy for Lesbian and Gay Rights, 65 Geo. Wash. L. Rev. 248.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;].Amita Dhanda, Constructing a New Human Rights Lexicon : Convention on the Rights of Persons with Disabilities, Year 5  No. 8 Sao Paulo June 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;].See Henry Shue, Basic Rights Subsistence Affluence and US Foreign Policy, Princeton University Press, 2nd ed. 1996.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;].&lt;i&gt;Naz Foundation v. Government of NCT, Delhi&lt;/i&gt;, 160 (2009) DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;].Ibid., 47.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;].Ibid., 26, 83, 113.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;].Arvind Narrain, Queer: Law and Despised Sexualities in India, Books for Change, 2004.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;].Men who have sex with men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]."Gay Club Supplied Boys to Politicians"; "Gay Culture Started in UP in 1998 Itself", The Times of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;].Criminal Misc. Case No. 2054/2001, as taken from Arvind Narrain, Queer: Law and Despised Sexualities in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;].AIR 1963 SC 1295; it was Justice Subba Rao’s minority decision here that laid the foundation for the right to privacy in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;].1975 (2) SCC 148.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Arvind Narrain, Queer: Law and Despised Sexualities in India, Books for Change, 2004.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn20"&gt;21&lt;/a&gt;].Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;].Alok Gupta, Section 377 and the Dignity of Indian Homosexuals, &lt;a class="external-link" href="http://www.iglhrc.org/binary-data/ATTACHMENT/file/000/000/15-1.pdf"&gt;http://www.iglhrc.org/binary-data/ATTACHMENT/file/000/000/15-1.pdf&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;].Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;].&lt;a class="external-link" href="http://timesofindia.indiatimes.com/Mumbai/Police_bust_gay_party/articleshow/2753740.cms"&gt;http://timesofindia.indiatimes.com/Mumbai/Police_bust_gay_party/articleshow/2753740.cms&lt;/a&gt;, last accessed on 8 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;].Human Rights Violations in the Transgender Community: A Report by PUCL-K, 2nd ed. 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;].&lt;a class="external-link" href="http://www.guardian.co.uk/world/2008/jul/04/india-gender"&gt;http://www.guardian.co.uk/world/2008/jul/04/india-gender&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].&lt;a class="external-link" href="http://www.pinknews.co.uk/news/articles/2005-11518.html"&gt;http://www.pinknews.co.uk/news/articles/2005-11518.html&lt;/a&gt;, last accessed on 10 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;].Transgender people deserve privacy, dignity, in public bathrooms, Maine Opinion, available at &lt;a class="external-link" href="http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/"&gt;http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;].Transgender people deserve privacy, dignity, in public bathrooms, Maine Opinion, available at &lt;a class="external-link" href="http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/"&gt;http://bangordailynews.com/2011/05/17/opinion/transgender-people-deserve-privacy-dignity-in-public-bathrooms/&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;].Siddharth Narrain, Being a Eunuch, available at &lt;a class="external-link" href="http://www.countercurrents.org/gen-narrain141003.htm"&gt;http://www.countercurrents.org/gen-narrain141003.htm&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;].&lt;a class="external-link" href="http://webcache.googleusercontent.com/search?q=cache:gLqrElQbWboJ:infochangeindia.org/human-rights/news/-third-sex-finds-a-place-on-indian-passport-forms.html+PASSPORT+APPLICATION+INDIA+gender&amp;amp;cd=4&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in&amp;amp;source=www.google.co.in"&gt;http://webcache.googleusercontent.com/search?q=cache:gLqrElQbWboJ:infochangeindia.org/human-rights/news/-third-sex-finds-a-place-on-indian-passport-forms.html+PASSPORT+APPLICATION+INDIA+gender&amp;amp;cd=4&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in&amp;amp;source=www.google.co.in&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;].&lt;a class="external-link" href="http://passport.gov.in/cpv/ppapp1.pdf"&gt;http://passport.gov.in/cpv/ppapp1.pdf&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;].&lt;a class="external-link" href="http://www.ndtv.com/article/india/andhra-pradesh-government-gives-in-to-sexuality-bias-71454"&gt;http://www.ndtv.com/article/india/andhra-pradesh-government-gives-in-to-sexuality-bias-71454&lt;/a&gt;, last accessed on 8 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;].Gee Ameena Suleiman, Non-Hijra Transgenders Struggle for Identity, Daily News and Analysis, available at &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report_non-hijra-transgenders-struggle-for-identity_1588421"&gt;http://www.dnaindia.com/lifestyle/report_non-hijra-transgenders-struggle-for-identity_1588421&lt;/a&gt;, last accessed on 25 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;].Arvind Narrain and Vinay Chandran, It’s Not My Job to tell you It’s okay to be Gay – Medicalisation of Homosexuality: A Queer Critique, available at http://www.altlawforum.org/gender-and-sexuality/publications/medicalizationfinal.rtf/at_download/file&lt;a class="external-link" href="http://www.altlawforum.org/gender-and-sexuality/publications/medicalizationfinal.rtf/at_download/file"&gt;http://www.altlawforum.org/gender-and-sexuality/publications/medicalizationfinal.rtf/at_download/file&lt;/a&gt;, last accessed on 20 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;].160 (2009) DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;].&lt;a class="external-link" href="http://www.unhcr.org/refworld/pdfid/4b6fe2110.pdf"&gt;http://www.unhcr.org/refworld/pdfid/4b6fe2110.pdf&lt;/a&gt;, last accessed 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;].Arvind Narrain. and Tarunabh Khaitan, Medicalisation of Homosexuality : A Human Rights Approach, as taken from Bina Fernandez (ed.), Humjinsi: A Resource Book on Lesbian, Gay and Bisexual Rights in India (New Delhi : India Centre for Human Rights and the Law, 2002).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;].Vinay Chandran, Ain’t no cure for love, India Together, last accessed on 8 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;].Supra n. 32.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;].Maya Sharma, Loving Women: Being Lesbian in Unprivileged India, Yoda Press, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;].India: Second NGO Shadow Report on CEDAW, November 2006, available at &lt;a class="external-link" href="http://www.iwraw-ap.org/resources/pdf/India%20Shadow%20report.pdf"&gt;http://www.iwraw-ap.org/resources/pdf/India%20Shadow%20report.pdf&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;].&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-01-24/kolkata/28367047_1_girls-suicide-lesbian-couple"&gt;http://articles.timesofindia.indiatimes.com/2011-01-24/kolkata/28367047_1_girls-suicide-lesbian-couple&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;].&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-02-22/kolkata/28624865_1_lesbian-couple-suicide-field"&gt;http://articles.timesofindia.indiatimes.com/2011-02-22/kolkata/28624865_1_lesbian-couple-suicide-field&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;].Saptarshi Mandal, Right to Privacy in Naz Foundation: A Counter-Heteronormative Critique, 3 NUJS L. Rev. 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;].Vinay Sitapati, The Spectre of Naz, as available at &lt;a class="external-link" href="http://www.indianexpress.com/news/the-spectre-of-naz/609695/0"&gt;http://www.indianexpress.com/news/the-spectre-of-naz/609695/0&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;].&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2010-02-18/india/28118769_1_shrinivas-ramchandra-siras-rickshaw-puller-amu-campus"&gt;http://articles.timesofindia.indiatimes.com/2010-02-18/india/28118769_1_shrinivas-ramchandra-siras-rickshaw-puller-amu-campus&lt;/a&gt;, last accessed on 11 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Arvind Narrain, et al, Policing Morality at AMU: An Independent Fact-Finding Report,  available at &lt;a class="external-link" href="http://www.fridae.com/newsfeatures/2010/03/10/9724.policing-morality-at-amu-an-independent-fact-finding-report?n=sea&amp;amp;nm=amu"&gt;http://www.fridae.com/newsfeatures/2010/03/10/9724.policing-morality-at-amu-an-independent-fact-finding-report?n=sea&amp;amp;nm=amu&lt;/a&gt;, last accessed on 11 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;].&lt;i&gt;Dr. Shrinivas Ramchandra Siras &amp;amp; Ors v. The Aligarh Muslim University &amp;amp; Ors&lt;/i&gt;, Civil Misc. Writ Petition No.17549 of 2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;].Vinay Sitapati, The Spectre of Naz, as available at &lt;a class="external-link" href="http://www.indianexpress.com/news/the-spectre-of-naz/609695/0"&gt;http://www.indianexpress.com/news/the-spectre-of-naz/609695/0&lt;/a&gt;, last accessed on 9 August 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Supra n. 32&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr51" name="fn51"&gt;51&lt;/a&gt;].&lt;a class="external-link" href="mailto:lgbt-india@yahoogroups.com"&gt;Lgbt-india@yahoogroups.com&lt;/a&gt;. This is possibly the most prolific mailing list for LGBT persons in the country, and is constantly active with atleast 4-5 mails being exchanged per day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr52" name="fn52"&gt;52&lt;/a&gt;].Code of Ethics and Broadcasting Standards of the News Broadcasters Association.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr53" name="fn53"&gt;53&lt;/a&gt;].Code 9, Code of Ethics and Broadcasting Standards of the News Broadcasters Association.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr54" name="fn54"&gt;54&lt;/a&gt;].TV9 Ordered to Air Apology for Sting  available at &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report_tv9-ordered-to-air-apology-for-sting_1527622"&gt;http://www.dnaindia.com/lifestyle/report_tv9-ordered-to-air-apology-for-sting_1527622&lt;/a&gt;, last accessed on 10 September 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr55" name="fn55"&gt;55&lt;/a&gt;].“Introduction of constitutional law in the home … is like introducing a bull in a china shop. It will prove to be a ruthless destroyer of the marriage institution”, Rohatgi, J. in &lt;i&gt;Harvinder Kaur v. Harmander Singh Choudhry&lt;/i&gt;, AIR 1984 Del 66.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;* The author, Danish Sheikh works with the Alternative Law Forum in Bangalore, India. &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-sexual-minorities'&gt;https://cis-india.org/internet-governance/privacy-sexual-minorities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Danish Sheikh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-20T09:22:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf">
    <title>Sixth Annual Meeting of the Internet Governance Forum, Nairobi: A Summary</title>
    <link>https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf</link>
    <description>
        &lt;b&gt;The sixth annual meeting of the Internet Governance Forum was held from 27 to 30 September 2011 at the United Nations Office in Nairobi, Kenya. Sunil Abraham participated in six workshops: Privacy, Security, and Access to Rights: A Technical and Policy Analyses, Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward, The Impact of Regulation: FOSS and Enterprise, Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards, Access and Diversity of Broadband Internet Access and Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/b&gt;
        
&lt;h3&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 219&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Kim Pham, Expression Technologies, Civil Society (United States). The panel members included Carlos Affonso Pereira de Souza, Centro de Technologica e Socieda (Brazil), Christopher Soghoian, Indiana University (United States), Karen Reilly, Tor Project, Technical/Civil Society (United States) and Sunil Abraham, Centre for Internet and Society (India).&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=219"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 184&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Katim S Touray Council Vice Chair, Free Software and Open Source Foundation for Africa and Member, ICANN Board of Directors. Fouad Bajwa of Gerry Morgan Foundation (Pakistan) was the remote moderator. Nnenna Nwakanma of Nnenna.org, Simeon Oriko of @TheKuyuProject &amp;amp;@StorySpaces, Wael Khalil, Activist and Sunil Abraham of the Centre for Internet &amp;amp; Society were the panel members. Nishant Shah from the Centre for Internet &amp;amp; Society participated remotely from Bangalore.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=184"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/873-ei-workshop-80184-use-of-digital-technologies-for-civic-engagement-and-political-change-lessons-learned-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;The Impact of Regulation: FOSS and Enterprise&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 211&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Dorothy Gordon, Director General, AITI-KACE, Judy Okite was the remote moderator. The panel members were Satish Babu, ICFOSS, India, Yves Miezan Ezo, Smile Training, Manager, (France), Sunil Abraham, Executive Director, Centre for Internet &amp;amp; Society, Bangalore, Evans Ikua, FOSS Certification Manager, ict@innovation program.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=211"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/842-28-september-2011-ad-workshop-73211-foss-as-an-instrument-for-accessible-development-the-impact-of-regulation-open-source-and-enterprise"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 201&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Alejandro Pisanty, Director General for Academic Computing Services of the National University of Mexico (UNAM), Mexico. Tracy Hackshaw, Computer Society of Trinadad and Tobago, Trinadad and Tobago, Venkatesh Hariharan, Head of Public Policy and Government Affairs at Google, India and Scott O Bradner, University Technology Security Officer, Harvard University, USA were the panel members.&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=201"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/835-28-september-2011-other-201-proprietary-influences-in-free-and-open-source-software-lessons-to-open-and-universal-internet-standards"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Access and Diversity of Broadband Internet Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 113&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by N Ravi Shanker, Addl Secy, Department of Information Technology, Ministry of Information Technology, Government of India (Chair). Abhishek Singh, Director, Department of Information Technology, Ministry of Information Technology, Government of India, Venkatesh Hariharan, Head of Public Policy and Government &amp;nbsp;Relations, Google India and Sunil Abraham, Executive Director, The Centre for Internet and Society, India were the panel members.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=113"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/811-ad-feeder-workshop-113-access-and-diversity-of-broadband-internet-access-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Putting users First: How can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 75&lt;/strong&gt;&lt;br /&gt;This workshop was moderated by Ambassador David Gross, Partner, Wiley Rein LLP, Yiannis Theodorou, Regulatory Policy Manager, GSMA was the remote moderator. The panel members included Pat Walshe, Director of Privacy-GSMA), Jeff Brueggeman (Vice President-Publiy Policy AT&amp;amp;T), Patrick Ryan, Policy Counsel, Open Internet for Google Inc, Ms Juliana Rotich, Executive Director of Ushahidi Inc, Sunil Abraham, Executive Director, The Centre for Internet and Society (India) and Ian Brown, co-director of Oxford University's Information Security and Privacy Programme.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=75"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/870-sop-75-putting-users-first-how-can-privacy-"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf'&gt;https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-24T09:09:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/media-economics-workshop">
    <title>Ninth Workshop on Media Economics</title>
    <link>https://cis-india.org/news/media-economics-workshop</link>
    <description>
        &lt;b&gt;The Higher School of Economics and the New Economic School have joined hands to organize the ninth workshop on media economics in Moscow on October 28 and 29, 2011. All events are scheduled to take place in Marriott Courtyard, a hotel in the centre of Moscow within 10-minute walking distance from the Kremlin, the Red Square, and the Bolshoi Theatre.&lt;/b&gt;
        
&lt;h2&gt;Workshop Program&lt;/h2&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Friday, October 28, 2011&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning coffee&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;8:45 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Opening remarks&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Media markets - 1: Newspapers, Mergers, and Diversity&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Michal MASIKA, University of Munich&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Free commuter newspapers and the market for paid-for daily newspapers&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergey V. Popov, Higher School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lapo FILISTRUCCHI, Tilburg University and University of Florence&lt;/div&gt;
&lt;div&gt;Tobias J. Klein, Tilburg University&lt;/div&gt;
&lt;div&gt;Thomas Michielsen, Tilburg University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Merger Simulation in a Two-Sided Market: The Case of the Dutch Daily &amp;nbsp; Newspapers&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;Felix Oberholzer-Gee, Harvard Business School&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Diversity in Local Television News&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: François Keslair, Paris School of Economics&amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Media markets and Internet - 1: Advertising and Search Engines&lt;/h3&gt;
&lt;div&gt;11:30 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexandre de CORNIÈRE, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Search advertising&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Simon Anderson, University of Virginia&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexander WHITE, Tsinghua University School of Economics and Management&lt;/div&gt;
&lt;div&gt;Kamal Jain, Microsoft Research&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;The Attention Economy of Search and Web Advertisement&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Izmalkov, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:50 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Lunch&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Political Economy - 1: Media, Elites, and the Groups of Influence&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Leopoldo FERGUSSON, Universidad de Los Andes&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media Markets, Special Interests, and Voters&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Alexei V. Zakharov, Higher School of Economics &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Ben Qin, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Yanhui Wu, USC Marshall School of Business&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Determinants of Media Capture in China&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Maria Petrova, New Economic School&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Daniel STONE, Oregon State University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media and Gridlock&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Elena Panova, Academy of National Economy and Gaidar Institute&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;4:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets and Internet - 2: Internet Effects and Offline Media Markets&lt;/h3&gt;
&lt;div&gt;4:30 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Joel WALDFOGEL, University of Minnesota&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Bye, Bye, Miss American Pie? The Supply of New Recorded Music since Napster&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Enikolopov, New Economic School&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Ignacio FRANCESCHELLI, Northwestern University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;When the Ink is Gone: The Impact of Internet on News Coverage&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Durante, Sciences Po Paris &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:50 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Adjourn&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;7:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Dinner&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Saturday October 29th&lt;/h2&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning Coffee&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 2: Interactions in Traditional and Digital Media Industry&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Harald Nygård Bergh, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Hans Jarle KIND, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Bjørn-Atle Reme, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Competition between Content Distributors in Two-Sided Markets&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Guido Friebel, Goethe University Frankfurt &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Larbi Alaoui, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;Fabrizio GERMANO, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Time Scarcity and the Market for News&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Guriev, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Political Economy - 2: Media Effects&lt;/h3&gt;
&lt;div&gt;10:50 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Francesco Drago, University of Naples&lt;/div&gt;
&lt;div&gt;Tommaso Nannicini, Bocconi University&lt;/div&gt;
&lt;div&gt;Francesco SOBBRIO, IMT Lucca&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Newspapers, Local News and Electoral Politics&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ekaterina Zhuravskaya, Paris School of Economics &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Julia CAGÉ, Harvard University&lt;/div&gt;
&lt;div&gt;François Keslair, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Trash Media and the Decline of Turnout: Theory and Evidence from Local Media Competition in France, 1944-2010&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Francesco Sobbrio, IMT Lucca &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Parallel events (choose your favorite):&lt;/div&gt;
&lt;div&gt;Lunch &amp;nbsp;- or -&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Global New Media Policy&lt;/h3&gt;
&lt;div&gt;Roundtable (with refreshments, RSVP required, more details here)&lt;/div&gt;
&lt;div&gt;Pedro MIZUKAMI, FGV Center for Technology and Society, Rio de Janeiro, Brazil&lt;/div&gt;
&lt;div&gt;Sunil ABRAHAM, Centre for Internet and Society, Bangalore, India&lt;/div&gt;
&lt;div&gt;Bruce ETLING and Robert FARIS, Berkman Center for Internet and Society, Harvard University, United States&lt;/div&gt;
&lt;div&gt;Marina ZHUNICH, Google Russia&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 3: Media Bias&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Alec Kennedy, San Francisco Federal Reserve Bank&lt;/div&gt;
&lt;div&gt;“Does Media Concentration Lead to Biased Coverage? Evidence from Movie Reviews”&lt;/div&gt;
&lt;div&gt;Discussant: Joel Waldfogel, University of Minnesota &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Matthias HEINZ, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;Guido Friebel, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media bias against foreign owners: Downsizing&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Olga Kuzmina, New Economic School &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Future Directions of Research in Media Economics&lt;/h3&gt;
&lt;div&gt;3:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Roundtable&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;Simon ANDERSON, University of Virginia&lt;/div&gt;
&lt;div&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;4:45 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Farewell reception&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;The above agenda was published in Higher School of Economics website, &lt;a class="external-link" href="http://www.hse.ru/mew/program"&gt;click here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/div&gt;
&lt;iframe src="http://www.youtube.com/embed/WUL21Zc8UnU" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/media-economics-workshop'&gt;https://cis-india.org/news/media-economics-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T09:12:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-india-chronicles">
    <title>Growing Wikipedia: The India Chronicles</title>
    <link>https://cis-india.org/news/the-india-chronicles</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;Tory Read, a professional researcher, writer and journalist was commissioned by the Wikimedia Foundation to create a vivid description of its work in India. This was done in the interest of transparency and to ensure that it captured lessons from this new approach. Tory travelled for a couple of weeks across Mumbai, Pune, Bangalore and some towns in Kerala — attending community meet-ups speaking with a host of individual community members in these cities. Tory has given a journalistic account and analysis, based on document review, interviews and observations conducted between November 2010 and June 2011, including 16 days in India in June 2011.The views expressed herein are his own and do not necessarily reflect the views of Wikimedia Foundation.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director of the Centre for Internet and Society has been quoted in this report. The following are some direct quotes extracted out from this report:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"Feuding and flaming is an integral part of free software culture.” “You can’t imagine a mailing list without flaming." [The Chapter and the Community Tangle, page 16]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The crisis on the mailing list was ultimately a great thing.” “There was conflict, dozens of offline conversations, private and public negotiation and airing of views and doubts, followed by a public commitment to work together for a shared purpose." [Necessity Breeds Collaboration, page 19]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The Foundation’s job is having meetings and growing and holding the consensus." "It should&amp;nbsp;be creating situations in which trust is gained, and you do this through radical transparency and participation. The point of the Foundation’s work is to build the community." [For the Foundation, page 24]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Download the entire report &lt;a href="https://cis-india.org/internet-governance/india-chronicles.pdf" class="internal-link" title="The India Chronicles"&gt;here&lt;/a&gt;&amp;nbsp;[PDF, 2.9 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-india-chronicles'&gt;https://cis-india.org/news/the-india-chronicles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-14T09:17:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid">
    <title>SCOSTA and UID Comparison not Valid, says Finance Committee</title>
    <link>https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid</link>
    <description>
        &lt;b&gt;The Standing Committee on Finance Branch, Lok Sabha Secretariat has responded to the suggestions offered by CIS on the National Identification Authority of India, Bill 2010 and has requested it to mail its views by 14 October 2011.&lt;/b&gt;
        
&lt;p&gt;On January 6, 2011, CIS had sent an &lt;a href="https://cis-india.org/internet-governance/blog/blog/privacy/letter-to-finance-committee" class="external-link"&gt;open letter to the Parliamentary Finance Committee&lt;/a&gt; demonstrating how the Aadhaar biometric standard is weaker than the SCOSTA standard. The text of the reply is reproduced below.&lt;/p&gt;
&lt;p&gt;Sir,&lt;/p&gt;
&lt;p&gt;This is in response to one of the views/suggestions offered by CIS on the National Identification Authority of India Bill, 2010.&lt;/p&gt;
&lt;h3&gt;CIS View /Suggestion:&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;"Though the Aadhaar biometrics are useful for the de-duplication and identification of individuals, the Smart Card Operating System for Transport Application [(SCOSTA), developed by the National Informatics Centre in India)] standard is a more secure, structurally sound, and cost-effective approach to authentication of identity for India. Therefore, the Aadhaar biometric based authentication process should be replaced with a SCOSTA standard based authentication process."&lt;/p&gt;
&lt;p&gt;In this regard, do you agree with the following view? If not, please justify.&lt;/p&gt;
&lt;p&gt;"Comparison between SCOSTA and the UID project are not valid since SCOSTA is fundamentally a standard for smart card based authentication and does not work for the objectives of the unique id project.&lt;/p&gt;
&lt;p&gt;The UID project follows a different approach and has multiple objectives — providing identity to residents of India, ensuring inclusion of poor and marginalized residents in order to enable access to benefits and services, eliminating the fakes, duplicates and ghost identities prevalent in other databases and provide a platform for authentication in a cost effective and accessible manner.&lt;/p&gt;
&lt;p&gt;UIDAI is not issuing cards or smart cards. Cards can be issued by agencies that are providing services. UID authentication does not exclude smart cards — service providers can still choose to issue smart&amp;nbsp;cards to their beneficiaries or customers if they want to."&lt;/p&gt;
&lt;p&gt;You are requested to email your view by 14 October, 2011 positively.&lt;/p&gt;
&lt;p&gt;Standing Committee on Finance Branch&lt;br /&gt;Lok Sabha Secretariat&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid'&gt;https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-22T16:37:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers">
    <title>Seventh Open Letter to the Finance Committee: A Note on the Deduplication of Unique Identifiers </title>
    <link>https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers</link>
    <description>
        &lt;b&gt;Sahana Sarkar on behalf of the Centre for Internet and Society (CIS) had sent in a Right to Information application on 30 June 2011 to Ashish Kumar, Central Public Information Officer, UIDAI. The UIDAI sent in its reply. Through the seventh open letter, Hans attempts to characterize in an abstract way the replies that CIS managed to elicit and makes some elementary observations.&lt;/b&gt;
        The UIDAI records one or more biometric &lt;em&gt;signatures&lt;/em&gt; of those individuals to whom it assigns its &lt;em&gt;unique identity&lt;/em&gt; or &lt;em&gt;identifier&lt;/em&gt; ; and for convenience let us call this the process of &lt;em&gt;registering an applicant&lt;/em&gt;. In the normal course of registration the signatures of an applicant will be compared to those already recorded; and the outcomes of this exercise of comparing suites of biometric signatures — fingerprints and iris-scans, say — may be regarded as the values of a binary variable:
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h1.jpg/image_preview" alt="h1" class="image-inline image-inline" title="h1" /&gt;&lt;/p&gt;
&lt;p&gt;With more than one signature, we have Y = 1 only when those of the applicant match the signatures in some other suite of such item by item; and Y = 0 then if at least one of his or her signatures fails to match any already recorded one.&lt;/p&gt;
&lt;p&gt;Though the circumstance should be unlikely, a person who has already been registered may apply again to be registered: with fraudulent intent maybe: or simply because he or she has lost the document – some identity card, perhaps – which bears the identifier assigned to him or her by the UIDAI. And the possibilities here may be regarded as the values of a binary variable:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h2.jpg/image_preview" alt="h2" class="image-inline image-inline" title="h2" /&gt;&lt;/p&gt;
&lt;p&gt;Though we are regarding X and Y as variables equally, and taking them for&lt;em&gt; jointly distributed&lt;/em&gt; ones, there is an evident asymmetry between them. The exercise of trying to match a given suite of signatures to some set of other suites can be performed so long as the signatures remain available; but for a given applicant the values of X refer to events already past. Faced with an applicant of whom they may suppose no more than what he or she may disclose, the personnel of the UIDAI &lt;em&gt;cannot directly estimate&lt;/em&gt; either of the two quantities:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h3.jpg/image_preview" alt="h3" class="image-inline image-inline" title="h3" /&gt;&lt;/p&gt;
&lt;p&gt;We have &lt;em&gt;p[X = 0] + p[X = 1] = 1&lt;/em&gt; here, needless to say, so there is only one quantity that needs estimating. But it is worth emphasizing that even when an applicant declares himself to have been registered already— and has come, say, to have a lost card newly issued — the personnel of the UIDAI are obliged to remain agnostic about &lt;em&gt;p[X = 1]&lt;/em&gt; : no matter how ready they are to believe him.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;That no individual should be assigned more than one identifier is an entirely evident desideratum: so the process of comparing the signatures of a fresh applicant to those already recorded must be a strict one. But the process of comparison should also make it very likely that, when a match of signatures does occur, the applicant is someone who has in fact been registered already. The chance that a genuinely new applicant’s signatures will match some already recorded suite should be very small: the proportion of such mistaken matches, among all matches, should be as low as possible. This proportion is usually denoted by &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; : the &lt;em&gt;conditional probability&lt;/em&gt; that &lt;em&gt;X = 0&lt;/em&gt; given that &lt;em&gt;Y = 1&lt;/em&gt; : the chance that, despite a match of signatures, the applicant has not in fact been registered already. The defining formula:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h4.jpg/image_preview" alt="h4" class="image-inline image-inline" title="h4" /&gt;&lt;/p&gt;
&lt;p&gt;relates this conditional probability to the ‘absolute’ or ‘raw’ probabilities of the events &lt;em&gt;[Y = 1]&lt;/em&gt; and&lt;em&gt; [X = 0 and Y = 1]&lt;/em&gt; ; the second of which is sometimes said to be &lt;em&gt;contained&lt;/em&gt; in the first.&lt;/p&gt;
&lt;p&gt;Suppose that there have been N applicants thus far. It is usual to say N trials of X and Y have occurred; but only the outcomes for Y are known. Suppose that matches have been found some m times out of these N ; then N − m applicants will have been registered. With regard to these trials, set&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h5.jpg/image_preview" alt="h5" class="image-inline image-inline" title="h5" /&gt;&lt;/p&gt;
&lt;p&gt;Note that these numbers are not individually known; but as the specified events exhaust the possibilities, we have &lt;em&gt;c 00 +c 01 +c 10 +c 11 = N&lt;/em&gt; ; and we do know that&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h6.jpg/image_preview" alt="h6" class="image-inline image-inline" title="h6" /&gt;&lt;/p&gt;
&lt;p&gt;The ratio &lt;em&gt;m/N&lt;/em&gt; would be a reasonable estimate of &lt;em&gt;p[Y = 1]&lt;/em&gt; ; and &lt;em&gt;(N − m)/N&lt;/em&gt; a reasonable estimate of &lt;em&gt;p[Y = 0] = 1 − p[Y = 1]&lt;/em&gt; likewise. The quantity we are seeking is &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; however: of which the ratio &lt;em&gt;c 01/m&lt;/em&gt; would be a natural estimate. But unless we have some sense of the relative magnitudes of&lt;em&gt; c 01&lt;/em&gt; and &lt;em&gt;c 11&lt;/em&gt; the quantity&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h7.jpg/image_preview" alt="h7" class="image-inline image-inline" title="h7" /&gt;&lt;/p&gt;
&lt;p&gt;could be anything between 0 and 1 now. To estimate the relative magnitudes of &lt;em&gt;c 01&lt;/em&gt; and &lt;em&gt;c 11&lt;/em&gt; in any direct way would be difficult, because one has no purchase on how likely the events &lt;em&gt;[X = 0 &amp;amp; Y = 1]&lt;/em&gt; or &lt;em&gt;[X = 1 &amp;amp; Y = 1]&lt;/em&gt; are. So &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; must be estimated directly, it would seem; and we shall come back to the question.&lt;/p&gt;
&lt;p&gt;The reply we have received from the UIDAI indicates that 2.59 × 107 registrations — or successful ‘enrolments’, as they have put it — had been effected by 17.08.2011;while the ‘enrolments rejected’ came to 2.005 × 103 they say. Enrolments were rejected when ‘residents were duplicates’: if we take this to mean that an applicant was refused registry on account of his signatures matching some suite of signatures already recorded, then we may suppose that&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h8.jpg/image_preview" alt="h8" class="image-inline image-inline" title="h8" /&gt;&lt;/p&gt;
&lt;p&gt;The False Positive Identification Rate, or FPIR, is defined in that reply as the ratio of the number of the number of false positive identification decisions to the total number of enrolment transactions by unenrolled individuals : if by “unenrolled individual” we understand an applicant of whom [X = 0] actually obtains, then in our notation we have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h9.jpg/image_preview" alt="h9" class="image-inline image-inline" title="h9" /&gt;&lt;/p&gt;
&lt;p&gt;rather: which would be a natural estimate of p[X = 0 &amp;amp; Y = 1] now, and since&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h10.jpg/image_preview" alt="h10" class="image-inline image-inline" title="h10" /&gt;&lt;/p&gt;
&lt;p&gt;the ‘false postive identification rate’ thus construed could be bound, at least, if &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; itself could be. At any rate, this latter proportion seems to be the most pertinent one here: &lt;em&gt;p[X = 0 | Y = 1] &lt;/em&gt;is the conditional probability, of mistaken matches, that the UIDAI must strive to keep as low as possible.&lt;/p&gt;
&lt;p&gt;The reply from the UIDAI defines a false negative identification as an incorrect decision of a biometric system that an applicant for a UID, making no attempt to avoid recognition, has not been previously enrolled in the system, when in fact they have. One is at a loss to understand how the personnel of the UIDAI are to determine when an applicant is making no attempt to avoid recognition. Putting that aside, the False Negative Identification Rate or FNIR would now appear to be p[X = 1 | Y = 0] : the probability that, despite his or her signatures not matching any already recorded suite, an applicant has in fact already been registered: and with our notation&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h11.jpg/image_preview" alt="h11" class="image-inline image-inline" title="h11" /&gt;&lt;/p&gt;
&lt;p&gt;now. But &lt;em&gt;c 10&lt;/em&gt; cannot be reliably estimated, again, because one has no purchase on how likely &lt;em&gt;[X = 1 &amp;amp; Y = 0]&lt;/em&gt; is; and the conditional probability &lt;em&gt;p[X = 1 | Y = 0]&lt;/em&gt; will have to be estimated or bound in some direct way as well.&lt;/p&gt;
&lt;p&gt;The preceding paragraphs have asserted that, in order to estimate or effectively bound the identification rates being sought by the UIDAI, the conditional probabilities p[X = 0 | Y = 1] and p[X = 1 | Y = 0] will have to be addressed in some direct way: without any attempt to estimate the likelihoods of &lt;em&gt;[X = 0 &amp;amp; Y = 1]&lt;/em&gt; and &lt;em&gt;[X = 1 &amp;amp; Y = 0]&lt;/em&gt; by themselves, that is to say. There might be ways of reliably estimating these conditional probabilities; and the manufacturers of the devices that produce the signatures may have provided tight bounds on what they would be — when the devices are working properly, at least. But let us now consider how the UIDAI has elaborated on these rates.&lt;/p&gt;
&lt;p&gt;Their reply to our second question states that &lt;em&gt;the biometric service providers have to meet the following accuracy&lt;/em&gt; SLA’s for FPIR and FNIR:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h12.jpg/image_preview" alt="h 12" class="image-inline image-inline" title="h 12" /&gt;&lt;/p&gt;
&lt;p&gt;The condition of ‘non-duplication’ in the requirement (P) implies that the FPIR is being understood now as the formula in (†) above computes it: as an estimate of the conditional probability &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt;: since one already knows that &lt;em&gt;[X = 0]&lt;/em&gt; for each enrolment here. Such an estimate could be made if one had obtained a sample of suites of signatures from distinct individuals — where no two suites in the sample could have come from the same individual — and compared each suite to every other: the proportion of matches found would be an estimate of &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt; now.[&lt;a href="#2"&gt;2&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The ‘biometric service providers’ the UIDAI has contracted with are presumably able to perform such experiments accurately. But an estimate of &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt; will not, as we shall momentarily see, by itself readily yield a usable bound on &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; : on the crucial likelihood that, despite his or her suite of signatures matching a suite already recorded, an applicant has not in fact been registered.&lt;/p&gt;
&lt;p&gt;The condition “ONLY duplicate enrolments” in the requirement (N) implies that the FNIR is being understood as an estimate of the conditional probability &lt;em&gt;p[Y = 0 |X = 1]&lt;/em&gt; now: as one already knows that [X = 1] for each enrolment here. The biometric service providers should be able to estimate this probability as well. The FNIR as (‡) construes it is an estimate of &lt;em&gt;p[X = 1 | Y = 0]&lt;/em&gt; rather; but a usable bound for this likelihood is readily got from &lt;em&gt;p[Y = 0 |X = 1] &lt;/em&gt;now, for we may surely expect &lt;em&gt;p[X = 1] &amp;lt; p[Y = 0]&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Let us see if the requirement (P) will yield any usable upper bound on the crucial likelihood &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt;: which, to note it again, is what the UIDAI must seek to minimise. Consider the consequences when the FPIR is understood as (P) envisages. Taken together with formula (1) above we have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h13.jpg/image_preview" alt="h13" class="image-inline image-inline" title="h13" /&gt;&lt;/p&gt;
&lt;p&gt;If we are not willing to wager on any upper limit appreciably less than 1 for p[X = 0] , we obtain&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_h12.jpg/image_preview" alt="h 12" class="image-inline" title="h 12" /&gt;&lt;/p&gt;
&lt;p&gt;now.[&lt;a href="#3"&gt;3&lt;/a&gt;] Unless one can reasonably suppose that the event&lt;em&gt; [Y = 1]&lt;/em&gt; never occurs, one must grant that &lt;em&gt;p[Y = 1] &amp;gt; 0&lt;/em&gt; . We have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h15.jpg/image_preview" alt="h15" class="image-inline image-inline" title="h15" /&gt;&lt;/p&gt;
&lt;p&gt;But this inequality yields a usable upper bound only when K &amp;lt; 3: only when K is 1 or 2 that is. In either case, only by supposing that p[Y = 1] &amp;gt; 10−2 will the accuracy mandated for the FPIR by the UIDAI yield a usable upper bound on p[X = 0 | Y = 1] . Since the UIDAI expects that p[Y = 1] &amp;lt; 10−2 surely, we must conclude now that the requirements it has imposed on its ‘biometric service providers’ will not help its personnel estimate an upper limit for the crucial likelihood that, despite his or her suite signatures matching some already recorded suite, an applicant for a UID has not in fact been registered already: which likelihood, to insist again, is what the UIDAI must seek to minimise.&lt;/p&gt;
&lt;p&gt;The argument just made will seem perverse: but the calculation is perfectly general. Suppose an FPIR limit of 10−J is mandated; then, unless one is willing to wager an upper limit on p[X = 0] , one cannot get a usable upper bound on p[X = 0 | Y = 1] from this limit on the FPIR, used all by itself, unless one supposes that p[Y = 1] &amp;gt; 10−J+1.&lt;/p&gt;
&lt;p&gt;To save writing, denote by L01 the crucial likelihood p[X = 0 | Y = 1] ; and suppose that&amp;nbsp;&amp;nbsp; is some desired upper bound on L01 now. Assume that the FPIR achieved by a service provider is an accurate estimate of p[Y = 1 |X = 0] ; then from (1) we get&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h16.jpg/image_preview" alt="h16" class="image-inline image-inline" title="h16" /&gt;&lt;/p&gt;
&lt;p&gt;Now [X = 0] should not be a rare event at all, and, conversely, [Y = 1] should be a rare event.[&lt;a href="#4"&gt;4&lt;/a&gt;] So one should be able to set some reasonable upper limit to the ratio p[Y = 1]/ p[X = 0] : but without attempting any precise estimate, at all, of either individual probability. One may reasonably expect, for instance, that no more than one in a thousand applicants for a uid will already have been registered; and when p[X = 1] &amp;lt; 10−3 we will have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h17.jpg/image_preview" alt="h17" class="image-inline image-inline" title="h17" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h18.jpg/image_preview" alt="h18" class="image-inline image-inline" title="h18" /&gt;&lt;/p&gt;
&lt;p align="center" class="discreet"&gt;&lt;img src="https://cis-india.org/home-images/h19.jpg/image_preview" alt="h19" class="image-inline image-inline" title="h19" /&gt;&lt;/p&gt;
&lt;p&gt;from (3) above. This calculation can be repeated with any number m in place of 3 here, of course, provided p[X = 1] &amp;lt; 10−m and p[Y = 1] &amp;lt; 10−m are both likely; and it seems entirely reasonable, now, for the UIDAI to insist that its biometric service providers meet the requirement.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/h20.jpg/image_preview" alt="h20" class="image-inline image-inline" title="h20" /&gt;&lt;/p&gt;
&lt;p&gt;for some appropriate upper bound X on L01 . The considerations leading to (4) make it reasonable to insist on m _ 3 now; and recalling what L01 is — the crucial likelihood that, despite his or her signatures matching some already recorded suite of signatures, an applicant has not in fact been registered — the UIDAI will have to insist on some quite small bound X: for it would not want, too often, to refuse anyone a UID on account of a mistaken match of biometric signatures.[&lt;a href="#6"&gt;6&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;It would be foolish to speculate on what the authorities regard as acceptable error here; but if the UIDAI is of a mind that such mistakes should happen less than one in a thousand times say, then, taking the minimal value of 3 for m in the suggested requirement (R), it should demand an FPIR less than 10−6 : a ‘false positive identification rate’ a thousand-fold less than the limit currently imposed.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]Should it seem entirely odd to talk of probability when one of the events in question — either&lt;em&gt; [X = 0]&lt;/em&gt; or&lt;em&gt; [X = 1]&lt;/em&gt; — will already have occurred, we may regard the probabilities we assign them as measures of our uncertainty only: but no practical question hinges on probabilities being understood ‘subjectively’ rather than ‘objectively’.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]It might be well to note, however, that the size of the sample must be manageable: for a sample of size K a total of K • (K − 1)/2 comparisons will have to be performed.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]Wagering an upper limit on p[X = 0] would require one to reasonably estimate the probability of finding already-registered individuals among applicants.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]The event [Y = 1] must be just as rare, one supposes, as [X = 0] is frequent.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;[5]We are supposing, that is to say, that matches of biometic signatures are very rarely mistaken matches.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;[6]A small _ is consistent with supposing that p[X = 1] and p[Y = 1] are commensurate probabilites. If p[X = 0 | Y = 1] &amp;lt; 10−3 for instance, then p[X = 1 | Y = 1] _ (103 − 1)/103 ; one may suppose, that is, that [X = 1] will be the case 999 out of a 1000 times that [Y = 1] obtains; and, of course, to suppose that [X = 1] will be appreciably more frquent than [Y = 1] is to grant that biometric signatures will fail appreciably often to distinguish individuals.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;strong&gt;&lt;a href="https://cis-india.org/internet-governance/blog/rti-application-june-2011.pdf" class="internal-link" title="RTI Application, 30 June 2011"&gt;See the RTI application of 30/06/2011&lt;/a&gt;&amp;nbsp;[PDF, 15 kb].&lt;/strong&gt;&lt;a name="6"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the Seventh Open Letter &lt;a href="https://cis-india.org/internet-governance/blog/seventh-open-letter.pdf" class="internal-link" title="Seventh Open Letter to the Finance Committee"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers'&gt;https://cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-22T07:28:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/hacking-cis">
    <title>Hack Night in CIS ― A Meeting of Java Script Hackers</title>
    <link>https://cis-india.org/internet-governance/hacking-cis</link>
    <description>
        &lt;b&gt;CIS hosted a hack night in conjunction with the tech-event organizers HasGeek at its office on 24 September 2011. The event brought together local java script hackers on a common platform. Tom Dane and Kiran Jonnalagadda participated in the event. &lt;/b&gt;
        
&lt;p&gt;The idea behind hosting the event was to have fun building cool stuff. The participants met in the afternoon to decide on projects and group into teams, and then&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/sudarmuthu"&gt;Sudar Muthu&lt;/a&gt;&amp;nbsp;gave an&amp;nbsp;&lt;a href="http://www.youtube.com/watch?v=t8BVYn6vS5g&amp;amp;feature=related" target="_blank"&gt;explanation of node.js&lt;/a&gt;&amp;nbsp;and its usage for the hack. There were also some very cool free t-shirts.&amp;nbsp;Much code was written and caffeine shared until the morning when the projects were uploaded online.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;One project was a game allowing players to pass a ball between computers. The source code is available&amp;nbsp;&lt;a href="https://github.com/sudar/pass-the-ball" target="_blank"&gt;here&lt;/a&gt;&amp;nbsp;on GitHub.&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/netroy"&gt;Aditya Yadav&lt;/a&gt;&amp;nbsp;also worked on the beautiful&amp;nbsp;&lt;a href="http://jsfoo.hasgeek.com/" target="_blank"&gt;jsFoo website&lt;/a&gt;&amp;nbsp;during the night.&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Our friends from&amp;nbsp;HasGeek made a short video showing a snippet of the event:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;iframe src="http://www.youtube.com/embed/D6p3K8XgTzQ" frameborder="0" scrolling="auto" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;
&lt;div&gt;Below is the full list of participants:&lt;br /&gt;&amp;nbsp;&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/jace"&gt;Kiran&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/jackerhack"&gt;Jonnalagadda&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/netroy"&gt;Aditya&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/netroy"&gt;Yadav&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/ritehs85"&gt;Ritesh Kadmawala&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/prakash122"&gt;MS Prakas Kumar Chakka&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Amarjit Singh&lt;/li&gt;&lt;li&gt;Arun Kumar&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/sudar"&gt;Sudar&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="https://twitter.com/#!/sudarmuthu"&gt;Muthu&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/aravindavk"&gt;Aravinda&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/aravindvk"&gt;VK&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/ciju"&gt;Ciju&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/ciju"&gt;Cherian&lt;/a&gt;&amp;nbsp;and&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="https://github.com/caulagi"&gt;Pradip&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://twitter.com/#!/caulagi"&gt;Caulagi&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;If you feel sad missing an event like this, be excited because HasGeek is hosting&amp;nbsp;&lt;a class="external-link" href="http://droidcon.in/"&gt;Droidcon&lt;/a&gt;&amp;nbsp;&lt;a class="external-link" href="http://funnel.hasgeek.com/droidcon/"&gt;India&lt;/a&gt;&lt;a href="http://droidcon.in/" target="_blank"&gt;&amp;nbsp;&lt;/a&gt;next month.&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;pre&gt;About Hasgeek&lt;/pre&gt;
&lt;div&gt;HasGeek is a developer-led initiative, and has been un-organising the unconference scene since 2010. HasGeek is an attempt to solve the problem of insipid conferences organised around buzzwords by uninterested, soulless corporate entities who pitch them as company training events or as places for companies to pick up hot developers.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;For more info on Hasgeek, &lt;a class="external-link" href="http://jsfoo.hasgeek.com/2011-pune/#about-hasgeek"&gt;click here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;For info on jsFoo, &lt;a class="external-link" href="http://jsfoo.hasgeek.com/2011-pune/#about-event"&gt;click here&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a class="external-link" href="http://jsfoo.hasgeek.com/2011-pune/#about-event"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/hacking-cis'&gt;https://cis-india.org/internet-governance/hacking-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tom Dane</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-27T11:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers">
    <title>UID: Questions without Answers – A Talk by Usha Ramanathan </title>
    <link>https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers</link>
    <description>
        &lt;b&gt;UID enrolment is in full swing, providing an official identification to millions of Indians, yet there are numerous unanswered questions. A public talk on UID was held at the Institute of Science, Bangalore on September 6, 2011. Usha Ramanathan, an independent law researcher on jurisprudence, poverty and rights, discussed the questions that plague the UID project and the veil of silence enveloping the answers.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Ms. Ramanathan
began her presentation by describing the progress and evolution of the UID
project. She stated three adjectives that reflect the target goal of the Unique
Identification Authority of India (UIDAI): unique, ubiquitous and universal.
She demonstrated how their initial objectives and claims have been drastically
altered in three major ways.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;First and
foremost, the UIDAI claimed that enrolment is voluntary, not mandatory, and
hence, inclusive. Yet, Nandan Nilekani has
consistently maintained that other agencies may make it compulsory.
UID is becoming ubiquitous and is a prerequisite for access to a wide variety
of welfare schemes and services such as PDS, MGNREGS, banks, public health,
etc. It is thus clear that this could
actually exclude those who do not have a number or whose biometrics&amp;nbsp;doesn't&amp;nbsp;work. Therefore, this undermines the inclusive nature of the project.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Second, the
UIDAI claimed that the UID would enable inclusive growth. Ms. Ramanathan expressed a
serious concern surrounding the risk of exclusion. Instead of facilitating
inclusion, around two to five per cent of the Indian population would be
excluded from the current process of authentication and potentially from having
a UID number, as they do not have viable biometric data.&lt;a name="_ftnref" href="#_ftn1"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/a&gt;&amp;nbsp; Physical or visual impairments such as corneal blindness, corneal scars, and
malnourishment induced cataracts or ‘low-quality’ fingerprints from a lifetime
of hard labour inhibit those from providing valid fingerprints or iris scans.&lt;a name="_ftnref" href="#_ftn2"&gt;&lt;span class="MsoFootnoteReference"&gt;[2]&lt;/span&gt;&lt;/a&gt;
&lt;u&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Third, Ms. Ramanathan reiterated that
the &lt;a class="external-link" href="http://www.prsindia.org/uploads/media/NIA%20Draft%20Bill.pdf"&gt;National Identification Authority India Bill &lt;/a&gt;prohibited sharing data, except by the consent of the resident, by
a court order or for national security. However, UID information is being directly fed into the National Intelligence Grid
(NATGRID) who will then provide information about people that is in 21
databases, to eleven security agencies, including the RAW and IB over which
there is no superintendence or oversight.&lt;a name="_ftnref" href="#_ftn3"&gt;&lt;span class="MsoFootnoteReference"&gt;[3]&lt;/span&gt;&lt;/a&gt; She
discussed the high likelihood of a breach of privacy as there are insufficient
standards protecting an individual from unlawful invasion. Additionally, the
UIDAI does not have mechanisms in place for an individual to be notified if there
is a data breach.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;u&gt;Who owns this project?&lt;/u&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A very important question asked is, “Who owns this project?” Ms.
Ramanathan stated that the convergence of information especially during the
‘de-duplication process clearly reflects the corporatization of the project.
She also questioned the background of some of the technological companies
involved. For instance, L-1 Identity
Solutions is well known for its links with the CIA. Additionally, Accenture is
on a Smart Borders project with US Homeland Security. She explained that ownership also plays into the
feasibility and financial cost of the project. Furthermore, the UIDAI has not
conducted a
feasibility study on the technology or the financial cost of the project.&lt;/p&gt;
&lt;h3&gt;&lt;u&gt;International Experience&lt;/u&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Lastly, Ms. Ramanathan discussed the international experience of a
universal identity system. In the United Kingdom, their universal system of
identification was labelled as ‘intrusive bullying’ as well as ‘an assault on personal
liberties’.&amp;nbsp; The United States and the United Kingdom both abandoned a
universal identity system, as it was impractical, unjustified and dangerous.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Ms. Ramanathan raised many questions that evoked thought and discussion from the
audience. She provided numerous examples of ambiguity, misconceptions and confusion
surrounding the UID project.&amp;nbsp; She urged the audience to exercise their civil
liberties or risk losing them. Lastly, she believed that an informed debate
involving the UIDAI and the public is long overdue.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The UIDAI must clarify misconception and provide detailed answers to
crucial questions, as there is a lack of understanding within the general
population about the UID. Therefore, the UIDAI and the Government of India must
increase and ensure transparency of the UID project”, she added.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Ms. Usha Ramanathan was speaking at an event&amp;nbsp;organised by Concern, an IISc Student group. She was speaking in her personal capacity and the opinions reflected above are necessarily not those of CIS.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/a&gt; Biometrics Design Standards for UID
Applications (December 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[2]&lt;/span&gt;&lt;/a&gt; Biometrics Design Standards
for UID Applications (December 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn"&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref"&gt;&lt;span class="MsoFootnoteReference"&gt;[3]&lt;/span&gt;&lt;/a&gt;Usha Ramanathan, The Myth of the Technology Fix, http://www.india-seminar.com/2011/617/617_usha_ramanathan.htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;iframe src="http://blip.tv/play/AYLRySYA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLRySYA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers'&gt;https://cis-india.org/internet-governance/blog/UID_Questions_without_Answers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-24T04:41:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/understanding-right-to-information">
    <title>Understanding the Right to Information</title>
    <link>https://cis-india.org/internet-governance/understanding-right-to-information</link>
    <description>
        &lt;b&gt;Elonnai Hickok summarises the Right to Information Act, 2005, how it works, how to file an RTI request, the information that an individual can request under the Act, the possible responses and the challenges to the citizen and the government. She concludes by saying that there are many structural changes that both citizens and governmental officers can make to improve the system.&lt;/b&gt;
        &lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://righttoinformation.gov.in/webactrti.htm"&gt;Right to Information Act, 2005&lt;/a&gt; (RTI) was created in 2005 and marked an important time in Indian legislative history. The Right to Information enables citizens to hold the government accountable and ensure that it is a transparent body. Questions that can be asked by the citizen to the government range from anything that may concern to some meeting notes to why a teacher is not present in a public school, etc. In the current RTI system there are many challenges that are inhibiting the government’s efficient delivery of the RTI as a service to the people. This has changed the concept of how the citizens view the RTI, as the government feels harassed and the citizens feel as though their rights are being unjustly denied. Additionally, individuals have turned the RTI into a redressal mechanism rather than a way to ensure transparency and learn/understand how their government is functioning. The use of the RTI as a redressal mechanism has created a relationship of animosity between the government and citizens. The below note outlines the ecosystem of the RTI and notes specific challenges that both citizens and the government face.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;h2&gt;The RTI Ecosystem&lt;/h2&gt;
&lt;h3&gt;RTI work flow&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;An individual files an RTI with the central/ state public information officer (PIO) or a specific PIO. PIOs are often not trained, and rarely apply for the position, but are instead designated.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Within five days the information is to be forwarded to the correct PIO.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The PIO must open a file and dispose of the request within 30 days. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If the PIO fails to reply to the applicant by either approving or denying a request, the PIO is liable to pay a fine of Rs. 250 for each day of delay. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If information is electronically uploaded, it is stored in any format the officer chooses (jpeg, pdf, html, etc).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Except for land records and staff records, files are retained for a maximum of one year. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If the PIO does not dispose of the request, there is scope for an appeal within 30-45 days to the appellate authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There is scope for a second appeal to the information commissioner if the authority does not respond within 90 days or the answer is found to be unsatisfactory. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The final decision of the information commissioner is binding. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Filing an RTI request&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;Though there is no specific format an individual must follow when submitting an RTI, when filing a request, individuals must include:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;His /her name and address.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The name and address of the public information officer (PIO).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The particulars of information/documents required (limited to 150 words and one subject matter).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The time period of the information required.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proof of payment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Signature.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proof if the individual is a BPL holder.[&lt;a href="#2"&gt;2&lt;/a&gt;] &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Information that an individual can request under the RTI Act&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Inspection of work, documents, and records&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Taking notes, extracts or certified copies of documents or records.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Taking certified samples of material.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obtaining of information in the form of diskettes, floppies, tapes, and video cassettes, or in any other electronic mode, or through printouts where such information is stored in a computer, or in any other device.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obtaining the status of an RTI request or complaint.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Note: If an individual is requesting third party information, the PIO must inform the third party and provide the individual the opportunity to state a reason for not disclosing the information.&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;Accepted format of requested materials and records&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Material requested can be in any format including: records, documents, memos, emails, opinions, advices, press releases, circulars, orders, logbooks, contracts, reports, papers, samples, models, and data material held in any electronic form.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Records requested can include: any document, manuscript and file, any microfilm, microfiche and facsimile copy of a document, and reproduction of image or images embodied in such microfilm (whether enlarged or not), and any other material produced by a computer or any other device.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Possible Responses to an RTI request&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;b&gt;An information officer can respond to an RTI in the following ways&lt;/b&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Transfer request to appropriate PIO within five days and notify the applicant about the transfer.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provide the requested information within 30 days.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reject the request information within 30 days stating the reasons for rejection, the period within which an appeal against such rejection may be preferred, and the details of the appellate authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Not respond to the applicant. If no response is received within 30 days the officer is liable for a penalty of Rs. 250 per day.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Appeal/Complaint Process&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;First appeal can be filed after 30 days or if the information given was unsatisfactory. The appeal must include: name and address of the appellant, name and address of the PIO involved, brief facts leading to appeal, relief sought, grounds for appeal, and copies of the application or documents involved, including copies of the reply, if received from the PIO.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Second appeal must contain: name and address of the applicant, and name and address of the PIO involved, particulars of the Order including the number if any against which the appeal is preferred, brief facts leading to the appeal, if appeal/complaint is preferred against deemed refusal then the particulars of the application, including number and date and name, address of the PIO to whom the  application was originally made, relief sought, grounds for the relief, verification by the applicant, any other information which the commission may deem necessary for deciding during the appeal, self attested copies of the application or documents involved, copies of the documents relied upon by the appellant and referred to in the appeal, and an index of the documents referred to in the appeal.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A complaint must include: name and address of the complainant, name and address of the state PIO against whom the complaint is being made, facts leading to the complaint, particulars of the application [number, date, name and address of the PIO (three copies)], relief sought, grounds and proof for relief, verification of the complainant (three copies), index of documents referred to in the complaint, and any other necessary information.[&lt;a href="#3"&gt;3&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h2&gt;Challenges to the Citizen&lt;/h2&gt;
&lt;h3&gt;Knowing the correct Public Information Officer&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Knowing which public information officer to mail in the RTI request is the first difficulty that an individual faces. As noted above in 2008 there were a total of 73,256 recorded public information commissioners in the State of Karnataka. New public information commissioners are created every day, because the RTI extends not only to any department of the government, but to any sub-contracted company, organization, school, or NGO that is receiving government funding and doing work on behalf of the government directly or indirectly. Lists of PIOs can be found on department bulletin boards and websites, but there is no clear method for an individual to know what information each PIO is the custodian over. Thus, they are left to determine on their own, and rely on the PIO to forward their application to the correct individual.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Filing in the correct format&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Though it is stated in the law what language an RTI request will be accepted in, and what information should be included – individuals are often unaware of the guidelines and unaware of how to correctly fill out an RTI request. An incorrectly formatted request is one of the major reasons for rejection of a request by the PIO.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Language&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In the State of Karnataka, RTIs can be filed only in two languages: Kannada and English. By law, RTI responses are given only in the language that the department works in on a daily basis, and in English. The information that is supplied through the request is given in its original language. For example, if you ask for a document that is originally in Marathi, the document will be photo copied and sent to you. No translation of documents takes place, because it is not the job function of the officer to translate documents.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Appeals&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;If an individual is denied information, or does not receive a reply within 30 days, they have the option of seeking an appeal through an appellate authority. In 2008 Karnataka had 5416 Appellate Authorities.  Currently, because of the backlog in appeal cases and the slow functioning of the system, an individual might have to wait for upto one year for his/her appeal to be heard. Often at this point the information is no longer relevant or needed.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In some cases individuals are denied a request for information based on the grounds that it would invade the privacy of the public officer. This is sometimes the case and sometimes not the case. Finding the right balance between the right to information and privacy is important, as protecting an individual’s privacy is crucial, but privacy should not be used as a reason for the government to be less transparent to the citizen and be used as a way to deny a citizen the information that they are entitled to.[&lt;a href="#4"&gt;4&lt;/a&gt;]&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;Challenges in the RTI System for the Government&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Too many RTI requests and no system to record duplicates&lt;/b&gt;: As the figure shows above, in 2008, the Karnataka Government received 42208 RTI requests. Currently, it is not possible to know how many of these requests were duplicates since departments handling RTIs do not make it a practice to upload and organize filed RTI requests in a format easily accessible to citizens. Thus, there is no present system in place to track, upload, and store past RTI's in a meaningful way.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Additional overhead in recording, organizing, accessing, and storing data&lt;/b&gt;: In the current system every time an RTI request is received by the government, they open a new file for that request. Though in some ways this system of storage simplifies the process of finding past RTIs, it adds an additional overhead cost as photocopies must be made, new files created, and correctly added to the organized system. Each state follows its own method of recording, organizing, accessing, and storing data – thus, currently it is not possible to easily access the information from another state or combine information from two separate states.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Lack of compliance with section 4(d) pro-active disclosure&lt;/b&gt;: Under section 4 (d), the government is required to pro-actively disclose a pre-determined data to the public via websites and other useful modes. Currently there is very little compliance with section 4(d) from governmental departments. There are many factors that contribute to the low rate of compliance that exist including lack of resources and lack of proper enforcement. If governmental departments were to comply with section 4(d) then the load of RTI requests and the time each request must take to answer could be lightened considerably as the government could respond by pointing citizens to the already disclosed information. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;div style="text-align: justify; "&gt;Though the Right to Information is an important right, the above entry looks at some of the weaknesses and challenges in the system. There are many structural changes that both citizens and governmental officers can make to improve the system such as pro-actively disclosing information, ensuring that an RTI is filed correctly, and creating a system for organizing previously asked questions. Alongside of these structural changes it is also critical that a positive culture of transparency and accountability is fostered throughout society, thus encouraging citizens to actively engage with the government and exercise their right to information.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].I am grateful to N. Vikram Simha, RTI activist, for his insight and feedback into the RTI system.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].N. Vikram Simha, Right to Information Act of 2005: Guide for Citizens.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].N. Vikram Simha, Right to Information: Trend Ahead. Karanataka State Chartered Accountants Association, Bangalore&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].N. Vikram Simha, RTI and Protection of Individual Privacy&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/understanding-right-to-information'&gt;https://cis-india.org/internet-governance/understanding-right-to-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-12T11:39:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/igf-remote-participation">
    <title>Internet Governance Forum: Participate Remotely</title>
    <link>https://cis-india.org/internet-governance/events/igf-remote-participation</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to attend the sixth annual meeting of the Internet Governance Forum (IGF) as a remote participant from Bangalore. The IGF is being held in Nairobi from 27-30 September 2011. CIS has been registered as a remote IGF hub. This will allow many of us who are unable to attend the IGF in person. You can follow the discussion, watch the web cast of the event, follow real-time closed captioning and participate live (via text or video) that will be answered by panelists in the IGF.  &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The IGF is a multi-stakeholder forum that
addresses public policy issues related to key elements of Internet governance. The overall
theme of the meeting will be ‘&lt;strong&gt;Internet as a Catalyst for Change: Access, Development,
Freedoms and Innovation&lt;/strong&gt;'. The various themes are as follows:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Internet Governance
for Development&lt;/li&gt;&lt;li&gt;Emerging Issues&lt;/li&gt;&lt;li&gt;Managing Critical
Internet Resources&lt;/li&gt;&lt;li&gt;Security, Openness
and Privacy&lt;/li&gt;&lt;li&gt;Access and Diversity&lt;/li&gt;&lt;li&gt;Taking Stock and the
Way Forward&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Sunil Abraham,
Executive Director of the Centre for Internet and Society, will be
participating in the following workshops:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/events/digital-technologies-for-civic-engagement" class="external-link"&gt;Use
of Digital Technologies for Civic Engagement and Political Change: Lessons Learned
and Way Forward&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=211"&gt;The
Impact of Regulation: FOSS and Enterprise&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=75"&gt;Putting
Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=219"&gt;Privacy,
Security, and Access to Rights: A Technical and Policy Analyses&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Shyam Ponappa,
Fellow at the Centre for Internet and Society, will be presenting remotely for
the following workshop:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=121"&gt;Open
Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Nishant
Shah, Director Research at Centre for Internet and
Society, has organized the following workshop:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a&gt;Use
of Digital Technologies for Civic Engagement and Political Change: Lessons
Learned and Way Forward&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;We are not limited to following specific workshops. Please follow
the link for more information on
workshops of your interest, program details and the schedule:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/schedule-a-programme-2011"&gt;http://www.intgovforum.org/cms/schedule-a-programme-2011&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Participation is free. However, we would be grateful if you could
confirm your attendance by emailing Natasha Vaz “n&lt;a href="mailto:atasha@cis-india.org"&gt;atasha@cis-india.org&lt;/a&gt; or Tom Dane at
“&lt;a class="external-link" href="mailto:tjdane@gmail.com"&gt;tjdane@gmail.com&lt;/a&gt;”. We hope you will join us to watch the web cast and
contribute your own insights on the various workshops.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Looking
forward to welcoming you at the workshops!&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/igf-remote-participation'&gt;https://cis-india.org/internet-governance/events/igf-remote-participation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-27T05:09:56Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/netizen-guide-to-igf">
    <title>Netizen's Guide to the Internet Governance Forum</title>
    <link>https://cis-india.org/news/netizen-guide-to-igf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;The&lt;a class="external-link" href="http://www.intgovforum.org/cms/"&gt; Internet Governance Forum&lt;/a&gt; is a multi-stakeholder forum where &lt;a class="external-link" href="http://www.intgovforum.org/cms/provisional-list-of-participants-2011"&gt;people from all over the world&lt;/a&gt; - from government, industry, the technical community and civil society - come together to discuss the Internet's future. The Sixth Annual meeting officially kicks off on Tuesday morning in Nairobi, Kenya. A number of pre-meetings will be held all day on Monday.&lt;/p&gt;
&lt;p&gt;The IGF is set up for &lt;a class="external-link" href="http://www.intgovforum.org/cms/remote-participation-2011"&gt;remote participation&lt;/a&gt;, so you do not need to be in Kenya physically to follow the discussions or to ask questions and make your views known. Before the start of each day, IGF staff will post &lt;a class="external-link" href="http://www.intgovforum.org/cms/remote-participation-2011/rp-links"&gt;remote participation links&lt;/a&gt; for each conference room so that you can participate remotely through the conference's WEBEX system. (&lt;a class="external-link" href="http://www.webex.com/lp/stest/index.php?t=ppuUS"&gt;Click here&lt;/a&gt; to see if your computer is compatible with their system.)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Monday pre-meetings&lt;/strong&gt;: &amp;nbsp;Several interesting and important meetings will be held on Monday and four of them are open to everybody on the Internet. Two of them have made their schedules publicly available and promoted them:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.apc.org/en/news/governance/internet-governance-forum-2011-preevent-access-rig"&gt;The Association for Progressive Communications&lt;/a&gt; meeting on access as a right. (10am-6pm Kenya time). Why attend? Click here for the invitation flyer and click here for the full run-down of the day's discussions. Also see APC's briefing paper on priorities for this year's IGF and other short papers on key IGF discussion themes. The final panel of the day, a &lt;strong&gt;Roundtable on the State of Internet Rights (17:15-18:15 local time)&lt;/strong&gt; will be held jointly with the next group. A guest blogger from APC will be reporting from the meeting here on GVA later this week.&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://giga-net.org/page/2011-annual-symposium"&gt;Global Internet Governance Academic Network (Giganet) annual symposium&lt;/a&gt;. (also approximately 10am-6pm) Many of the papers or abstracts are available for download. See for instance Arresting the decline of multi-stakeholderism in Internet governance by Jeremy Malcolm; The legality of internet blackouts in times of crisis. An assessment at the intersection of human rights law, humanitarian law and internet governance principles by Matthias Ketteman; and Upholding online anonymity in Internet governance. Affordances, ethical frameworks, and regulatory practices by Robert Bodle.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;The main conference: So many sessions, which ones to join? At any given time, several different meetings, workshops, and plenary sessions are held concurrently. The IGF organizers have posted the schedule as a rather unweildy Excel file here. Fortunately, other participants have taken the time to post the schedule in more digestible formats.&amp;nbsp;&amp;nbsp;The &lt;a class="external-link" href="http://www.diplomacy.edu/"&gt;Diplo Foundation's&lt;/a&gt; e-Diplomacy project has an online &lt;a class="external-link" href="http://igf2011.diplomacy.edu/sessions"&gt;list of sessions&lt;/a&gt; and&lt;a class="external-link" href="http://igf2011.diplomacy.edu/schedule/2011-W40"&gt; schedule&lt;/a&gt;. The indefatigable &lt;a class="external-link" href="http://www.timdavies.org.uk/"&gt;Tim Davies &lt;/a&gt;has also created a &lt;a class="external-link" href="http://igf2011.diplomacy.edu/home"&gt;social media page&lt;/a&gt; aggregating all tweets, blogs and photos posted by participants. The official hashtag, by the way, is #IGF11.&lt;/p&gt;
&lt;p&gt;If you want to get involved with a global community of people working for Internet users' rights whose work extends throughout the year, be sure to join one or more of the “&lt;a class="external-link" href="http://www.intgovforum.org/cms/dynamiccoalitions"&gt;dynamic coalitions&lt;/a&gt;.” Examples include the &lt;a class="external-link" href="http://internetrightsandprinciples.org/"&gt;Internet Rights and Principles Coalition&lt;/a&gt; (meeting on Tuesday from 11-12:30 Kenya time) and the &lt;a class="external-link" href="http://www.intgovforum.org/cms/dynamic-coalitions/75-foeonline"&gt;Freedom of Expression Coalition&lt;/a&gt; (Wednesday 4:30-6pm).&lt;/p&gt;
&lt;p&gt;Many participating organizations have posted lists of the workshops they are organizing or participating in on their websites. Those interested in sessions related to activism, human rights and free expression on the Internet may want to check out session listings by the APC (scroll down below the jump),&amp;nbsp;the &lt;a class="external-link" href="https://www.eff.org/calendar/2011/09/27/eff-united-nations-internet-governance-forum"&gt;Electronic Frontier Foundation&lt;/a&gt;, the &lt;a class="external-link" href="http://www.globalnetworkinitiative.org/newsandevents/GNI_announces_workshop_at_IGF_2011_in_Nairobi.php"&gt;Global Network Initiative&lt;/a&gt;, and the &lt;a class="external-link" href="http://www.cis-india.org/events/internet-as-a-tool-for-political-change"&gt;Centre for Internet and Society, Bangalore&lt;/a&gt;, among others.&lt;/p&gt;
&lt;p&gt;Kieren McCarthy of dot-nxt has also created a handy &lt;a class="external-link" href="http://news.dot-nxt.com/2011/09/25/igf-2011-practical-guide"&gt;practical guide &lt;/a&gt;to this year's IGF, with his top session picks. He observes that while the opening session on Tuesday afternoon has “far, far too many speakers,” it will nonetheless be interesting “given all that is happening in the Internet governance world.” No doubt, speeches from Hamadoun Toure (ITU), Neelie Kroes (EC), Janis Karklins (UNESCO), Larry Strickling (US), Rod Beckstrom (ICANN) and Vint Cerf (Google) not be uniform in their visions for the Internet's future.&lt;/p&gt;
&lt;p&gt;For those interested in truly doing their homework on the IGF and the current global impasse over Internet governance, see Jeremy Malcolm's post on IGF Watch: &lt;a class="external-link" href="http://igfwatch.org/discussion-board/where-to-develop-internet-policy-itu-g8-oecd-or-an-empowered-igf#Z9R7kctbwaRSKNjToF9Aog"&gt;Where to develop Internet policy: ITU, G8, OECD or an empowered IGF?&lt;/a&gt; Also see his previous posts on twists and turns of the IGF's five-year history.&lt;/p&gt;
&lt;p&gt;Written by Rebecca MacKinnon, the story was published in Global Voices Advocacy on 26 September 2011. The original can be read &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/09/26/igf11guide/"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/netizen-guide-to-igf'&gt;https://cis-india.org/news/netizen-guide-to-igf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-26T08:59:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2011-bulletin">
    <title>September 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage that happened in the month of September 2011.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research base, the RAW programme has been collaborating with different organizations and individuals in order to focus on its two year thematic of Histories of the Internets in India. Five monographs were recently launched at a workshop, &lt;a href="https://cis-india.org/research/conferences/conference-blogs/workshop"&gt;Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum&lt;/a&gt; held in Ahmedabad from 19 to 22 August 2011.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/rewiring-bodies"&gt;Re:Wiring Bodies&lt;/a&gt; by Asha Achuthan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/last-cultural-mile"&gt;The Last Cultural Mile&lt;/a&gt; by Ashish Rajadhyaksha&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/porn-law-video-technology"&gt;Porn: Law, Video, Technology&lt;/a&gt; by Namita A Malhotra &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/archives-and-access"&gt;Archives and Access&lt;/a&gt; by Aparna Balachandran and Rochelle Pinto &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/internet-society-space"&gt;Internet, Society and Space in Indian Cities&lt;/a&gt; by Pratyush Shankar&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS, India and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;Featured Publication&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/blog/dnbook"&gt;Digital AlterNatives with a Cause?&lt;/a&gt; - This collaboratively produced collective, edited by Nishant Shah and Fieke Jansen, asks critical and pertinent questions about theory and practice around ‘digital revolutions’ in a post MENA (Middle East - North Africa) world. It works with multiple vocabularies and frameworks and produces dialogues and conversations between digital natives, academic and research scholars, practitioners, development agencies and corporate structures to examine the nature and practice of digital natives in emerging contexts from the Global South.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/digital-alternatives-book-review"&gt;Digital (Alter)Natives with a Cause? — Book Review by Maarten van den Berg&lt;/a&gt; - The books come in a beautifully designed cassette and are accompanied by a funky yellow package in the shape of a floppy disk containing the booklet ‘D:coding Digital Natives’, a corresponding DVD, and a pack of postcards portraying the evolution of writing - in the sentence ‘I love you’, written with a goose feather in 1734, to the character set ‘i&amp;lt;3u’ entered on a mobile device in 2011, writes Maarten van den Berg. The review was published in "&lt;a href="http://www.thebrokeronline.eu/Articles/Digital-Alter-Natives"&gt;The Broker&lt;/a&gt;" on 19 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/book-launch"&gt;Digital AlterNatives book launch&lt;/a&gt; – CIS and Hivos launched this book at the Museum for  Communication, Hague on 16 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/usof-meeting"&gt;Stakeholders Meeting of the USOF on Facilitating ICT Access to Persons with Disabilities in Rural Areas&lt;/a&gt;, on 7 September 2011. Nirmita Narasimhan made a presentation.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Access to Knowledge is a campaign to promote the fundamental principles of justice, freedom, and economic development. It deals with issues like copyrights, patents, and trademarks, which are an important part of the digital landscape. CIS believes that access to knowledge and culture is essential, and such access promotes creativity and innovation, and helps bridge the differences between the developing and developed worlds in a positive manner. Towards this end, CIS is campaigning for an international treaty on copyright exceptions for print-challenged people, advocating against laws (such as the PUPFIP Bill) that privatize public-funded knowledge, call for the WIPO Broadcast Treaty to be restricted to broadcast, question the demonization of 'pirates', and support endeavours that explore and question the current copyright regime.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/copyright-bill-parliament"&gt;Copyright Amendment Bill in Parliament&lt;/a&gt; by Nirmita Narasimhan, 30 August 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/photocopying-the-past"&gt;Photocopying the past&lt;/a&gt; by Sunil Abraham in the Indian Express, 2 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/calling-out-the-bsa-on-bs"&gt;Calling Out the BSA on Its BS&lt;/a&gt; by Pranesh Prakash, 9 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Internet technologies have fundamentally questioned the notion of governance, not only at the level of administration but also at the level of mechanisms of control, regulation and shaping of the individual. e-Governance initiatives, in combination with other regimes of surveillance, control and censorship, are redefining what it means to be a citizen, a subject, and an individual. We look at questions of governance — at the micro level of the individual and the private (family, relationships, community structures, etc.) as well as the level of governmentality — at the macro level of nation state, citizenship, market economies, and the public (spaces of consumption, work, leisure, political engagement, etc.) under the umbrella of digital governance.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/understanding-right-to-information"&gt;Understanding the Right to Information&lt;/a&gt; by Elonnai Hickok, 28 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/internet-as-a-tool-for-political-change"&gt;Using the Internet as a Tool for Political Change: Lessons Learned and Way Forward&lt;/a&gt;, IGF, Nairobi, 27 September 2011. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers.&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/blog/reviving-growth"&gt;Reviving Growth&lt;/a&gt;, published in the Business Standard on 1 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/open-spectrum-for-development-in-the-context-of-the-digital-migration"&gt;Open Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;, IGF, Nairobi, 29 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;Film Screening&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/partners-in-crime"&gt;Screening of Partners in Crime&lt;/a&gt;, Vikalp@Smriti Nandan along with CIS screened the film and followed it with a discussion with the director of the film, Paromita Vohra, Smriti Nandan Cultural Centre, 9 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/workshop-rsa-encryption"&gt;Prime Security: The Mathematics of RSA Encryption&lt;/a&gt;, a one-day workshop with Rohit Gupta, a leading Mathematician.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-masks-forgotten-protests"&gt;India's social media "spring" masks forgotten protests&lt;/a&gt; [Alistair Scrutton in Reuters, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-key-to-hazare-success"&gt;Social media holds the key to Hazare's campaign success&lt;/a&gt; [Alistair Scrutton in NEWS.scotsman.com, 26 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/digital-divide"&gt;Digital divide: Why Irom Sharmila can’t do an Anna&lt;/a&gt; [FirstPost.Ideas, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/revolutions-viral?searchterm=When+revolutions+go+viral+"&gt;When revolutions go viral&lt;/a&gt; [Times of India (Crescent Edition), 27 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ibsa-seminar"&gt;IBSA Seminar on Global Internet Governance&lt;/a&gt;, organised by the Brazilian Ministry of External Relations, with support from the Brazilian Internet Steering Committee (CGI.br) and the Center for Technology &amp;amp; Society (CTS/FGV) and governmental and non- governmental actors from India, Brazil and South Africa, 1 to 2 September 2011, Fundacao Getulio Vargas (FGV) - Rio de Janeiro, Brazil. Pranesh Prakash participated in this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/copyright-amendment-bill-in-indian-parliament"&gt;Copyrights Amendment Bill to Be Tabled in Indian Parliament – Parallel Import provisions have Been Removed&lt;/a&gt; [Mike Palmedo in infojustice.org, 5 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/power-of-information"&gt;The Power of Information: New Technologies for Philanthropy and Development&lt;/a&gt; [Indigo Trust, 15 September 2011]. Sunil Abraham participated in this event. A video of his speech is now available on &lt;a href="http://www.youtube.com/watch?v=XhpLkEhn9AY"&gt;YouTube&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/using-social-media-to-understand-peoples-pulse"&gt;Planning Commission, Census 2011 and India Post using social media to understand people's pulse better&lt;/a&gt; [Vikas Kumar in the Economic Times, 20 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/foss-instrument-for-accessible-development"&gt;The Impact of Regulation: FOSS and Enterprise&lt;/a&gt;, organised by FOSSFA and ICFOSS, IGF, Nairobi, 28 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/privacy-security-access-to-rights"&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/a&gt;, organised by Expression Technologies, IGF, Nairobi, 29 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/how-can-privacy-be-protected"&gt;Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/a&gt;, organised by GSM Association, 29 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/truman-show-in-kerala"&gt;The Truman Show, in Kerala&lt;/a&gt; [Times of India, posted on CIS website on 23 September 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/making-difference-online-offline"&gt;Making a difference, online and offline&lt;/a&gt; [LiveMint, 27 September 2011].&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Follow CIS on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=457&amp;amp;qid=46981" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=458&amp;amp;qid=46981" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2011-bulletin'&gt;https://cis-india.org/about/newsletters/september-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-07-30T06:34:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ibsa-seminar">
    <title>IBSA Seminar on Global Internet Governance</title>
    <link>https://cis-india.org/news/ibsa-seminar</link>
    <description>
        &lt;b&gt;The seminar will take place at Fundacao Getulio Vargas (FGV) - Rio de Janeiro, Brazil, September 1-2, 2011.&lt;/b&gt;
        
&lt;h2&gt;Day 1: September, 1&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;08.30 - 09.00: Arrival and Accreditation of Participants&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;09.00 - 10.00: Opening Session&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Carlos Ivan Simonsen Leal - President of FGV&lt;/li&gt;&lt;li&gt;Ambassador Luiz Alberto Figueiredo Machado, Undersecretary-General of Environment, Energy, Science and Technology, MRE, Brazil&lt;/li&gt;&lt;li&gt;Ambassador Gilberto Fonseca Guimaraes de Moura, Director of the Department of Inter-regional Mechanisms, MRE, Brazil&lt;/li&gt;&lt;li&gt;Representative of the Government of India - Ministry of Foreign Affairs (MFA) or Department of Information Technology (DIT)&lt;/li&gt;&lt;li&gt;Mr. Moseamo Sebola - Director of Bilateral Relations - Department of Communications (DoC)&lt;/li&gt;&lt;li&gt;Prof. Hartmut Glaser - Brazilian Internet Steering Committee (CGI.br)&lt;/li&gt;&lt;li&gt;Viviana Munoz - South Centre&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;10.00 - 10.15: Coffee Break&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;10.15 - 11.15: Session 1: A Diagnosis of the Main Challenges for Developing Countries on the Global Internet Governance Regime (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;&lt;em&gt;Moderation: Ambassador Benedicto Fonseca Filho, MRE, Brazil&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;DIRCO South Africa&lt;/li&gt;&lt;li&gt;Secretary Romulo Neves, Head of the Division for the Information Society, MRE&lt;/li&gt;&lt;li&gt;Parminder Jeet Singh - IT for Change, India&lt;/li&gt;&lt;li&gt;Carlos Afonso - NUPEF, Brazil&lt;/li&gt;&lt;li&gt;Mark Weinberg - Alternative Information Development Centre, South Africa&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;11.15 - 12.30: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;12.30 - 14.00 Lunch&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;14.00 - 1530: Session 2: A Development Agenda for IG: Infrastructure and Critical Internet Resources (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Goal: reach a more round understanding about: a) which topics are priority for developing countries; b) what are the policy issues related to them; and c) what could be a future strategy for action.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Moderation: CGI.br&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;DIRCO South Africa&lt;/li&gt;&lt;li&gt;Jeferson Nacif, National Agency of Telecommunications - ANATEL&lt;/li&gt;&lt;li&gt;Pranesh Prakash, Centre for Internet and Society, India&lt;/li&gt;&lt;li&gt;Shaun Pather, Faculty Informatics &amp;amp; Design, Cape Peninsula University of Technology&lt;/li&gt;&lt;li&gt;Joao Brant, Intervozes, Brazil&lt;/li&gt;&lt;li&gt;Carlos Affonso - CTS/FGV, Brazil&lt;/li&gt;&lt;li&gt;Demi Getschko - CGI.br, Brazil&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;15.30 - 16.15: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;16.15 - 16.30: Coffee Break&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;16.30 - 17.30: Session 3: Global Online Trade and Services from Developing Countries' Perspective (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Moderation: Civil Society Representative (Brazil, India or South Africa)&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;DIRCO South Africa&lt;/li&gt;&lt;li&gt;Antenor Correa, MCTI - Brasil&lt;/li&gt;&lt;li&gt;Artur Coimbra - Ministry of Communications&lt;/li&gt;&lt;li&gt;Pranesh Prakash, Centre for Internet and Society, India&lt;/li&gt;&lt;li&gt;Mark Wienberg, Alternative Information Development, South Africa&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;17.30 - 18.30: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;18.30 - 20.00: Free Meetings&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Day 2: September 2&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;09.00 - 10.30: Session 4: A Development Agenda for IG: The New Global Information and Communications Systems - Its Rights and Principles (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Moderation: CTS/FGV Representative&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;DIRCO&lt;/li&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;Viviana Munoz - South Centre&lt;/li&gt;&lt;li&gt;Anriette Estherhuysen, APC&lt;/li&gt;&lt;li&gt;Graciela Selaimen - Nupef&lt;/li&gt;&lt;li&gt;Joana Varon (CTS/FGV) - (Approach: Intellectual Property and Access to Knowledge)&lt;/li&gt;&lt;li&gt;Pranesh Prakash, Centre for Internet and Society, India&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;10.30 - 11.20: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;11.30 - 12.30: Session 5: Institutional Arrangements for Internet Governance and Participation from Developing Countries (10 Minutes to Each Speaker)&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Moderation: Ambassador Benedicto Fonseca Filho, MRE, Brazil&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Government of India&lt;/li&gt;&lt;li&gt;DIRCO South Africa&lt;/li&gt;&lt;li&gt;Parminder Jeet Singh, IT for Change, India&lt;/li&gt;&lt;li&gt;Marilia Maciel, CTS/FGV, Brazil&lt;/li&gt;&lt;li&gt;Anriette Estherrhuysen, APC, South Africa&lt;/li&gt;&lt;li&gt;Secretary Romulo Neves, Head of the Division for the Information Society, MRE, Brazil&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;12.30 - 13.20: Discussion&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;13.20 - 14.30: Lunch&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;14.30 - 16.00: Taking Stocks and the Way Forward&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;16.00 - 18.00: Governmental Representatives Meeting - Separated&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ibsa-seminar'&gt;https://cis-india.org/news/ibsa-seminar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-13T09:53:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/social-media-masks-forgotten-protests">
    <title>India's social media "spring" masks forgotten protests</title>
    <link>https://cis-india.org/news/social-media-masks-forgotten-protests</link>
    <description>
        &lt;b&gt;Irom Sharmila has been on hunger strike for 10 years to protest against military abuses, force-fed by tubes through her nose. But the tragedy for the world's longest hunger strike is that she is on the wrong side of India's digital divide.&lt;/b&gt;
        
&lt;p&gt;Twitter, Facebook and aggressive private TV have helped rally India's biggest protests in decades to support civil activist Anna Hazare, a digital groundswell of a wired middle class that echoes the Arab Spring and has taken a Congress party-led government of elderly politicians by surprise.&lt;/p&gt;
&lt;p&gt;But Sharmila, who has been on a hunger strike in Manipur to demand an end to the army's sweeping emergency powers there, has only managed a small following, a footnote in media coverage.&lt;/p&gt;
&lt;p&gt;"We also once tried to take our fight to New Delhi ... but we did not get support from the rest of the nation," Sharmila told Tehelka magazine.&lt;/p&gt;
&lt;p&gt;She must be frustrated. The Hazare phenomenon has rallied Indians from the start with social media. Hazare's India Against Corruption website says it has had 13 million phone calls of support. Its Facebook page has nearly 500,000 "likes".&lt;/p&gt;
&lt;p&gt;Its leaders have tweeted each step of the whirlwind crisis, whether describing their arrests in real time or negotiations with the government, outmanoeuvring Prime Minister Manmohan Singh and his ministers at every step.&lt;/p&gt;
&lt;p&gt;"Protest at PM's residence: 35 people detained, taken to Tughlaq Rd. PS, hundreds still there, come if you can #Janlokpal," twitter user @janlokpal sent its followers in just one example of how the movement was rallying support.&lt;/p&gt;
&lt;p&gt;Cases like Sharmila expose the digital divide of Asia's third largest economy and underscore how a growing urban middle class may be getting its political voice heard while millions of poor remain off the digital protest map.&lt;/p&gt;
&lt;p&gt;"This is the first time digital social media has resonated with such a large number of people," said Nishant Shah, head of research at the Centre for Internet and Society think-tank.&lt;/p&gt;
&lt;p&gt;"But this is far more of a middle class, urban movement, than a national movement. Many people in India are excluded from it."&lt;/p&gt;
&lt;p&gt;Twitter and Facebook are barely used in many of India's social causes, including battles over land rights that are one of India's most pressing problems involving millions of farmers.&lt;/p&gt;
&lt;p&gt;Huge social issues in India, from caste discrimination to high food prices, from the building of dams to protests by farmers against nuclear power plants, have failed to create the kind of digital mobilisation that Hazare enjoys.&lt;/p&gt;
&lt;h3&gt;A Digital Divide&lt;/h3&gt;
&lt;p&gt;India's internet users have grown 1,400 percent between 2000 and 2010, behind only China and Vietnam among Asian countries, according to a report by Burson-Marsteller, a consulting firm.&lt;/p&gt;
&lt;p&gt;But that masks India's low base. Internet penetration is around 8 percent in India, the lowest among major Asian countries. That compares with nearly 40 percent in China.&lt;/p&gt;
&lt;p&gt;Out of a population of 1.2 billion, there are only 29 million people active in digital social networks. A report by Maplecroft consultancy warned that India was lagging other BRICs, Brazil, China and Russia in "digital inclusion".&lt;/p&gt;
&lt;p&gt;"India, for example, the wealthier, more affluent segment of the population, primarily based in urban areas, has embraced the use of modern communications technology," the report said.&lt;/p&gt;
&lt;p&gt;"The vast majority of the population has, however, been excluded from this process."&lt;/p&gt;
&lt;p&gt;Those statistics highlight that while the middle class has found a voice, electorally the centre-left Congress party will still need to pander to its traditional vote base of millions of farmers and poor Indians ahead of a 2014 general election.&lt;/p&gt;
&lt;p&gt;Congress, in power for most of the life of independent India, has failed to use social media tools. One minister lost his job for tweeting too frankly, in a sign of government unease over the web, and the party lags behind an opposition that has embraced Twitter.&lt;/p&gt;
&lt;h3&gt;Libya Overshadowed&lt;/h3&gt;
&lt;p&gt;So far, private TV channels have provided 24-hour coverage of the protests -- the news from Libya is hardly to be seen. Urban Indians with mobile phones in hand have dominated rallies in the open grounds where Hazare was on his second week of fasting.&lt;/p&gt;
&lt;p&gt;Small protests across the country, from demonstrations outside ministers' houses to rallies outside metro stations, have been organised through Twitter and Facebook.&lt;/p&gt;
&lt;p&gt;An app that can be downloaded on to smartphones running the Android operating system gives users the latest news on the campaign for a tough "Jan lokpal", or anti-corruption bill, and details of the latest meetings.&lt;/p&gt;
&lt;p&gt;"Social media has been huge for us, it has a life of its own," said Shazia Ilmi, in charge of Hazare media strategy.&lt;/p&gt;
&lt;p&gt;Even before Hazare was arrested last week, organisers had prepared a pre-recorded video from him that went on YouTube.&lt;/p&gt;
&lt;p&gt;The movement does have deep roots and social media has widened the protests, if not caused them. Many of Hazare's protests have also been through word of mouth. Corruption also affects the poor more than middle classes with endemic bribes, whether permission for street food stands or driving licences.&lt;/p&gt;
&lt;p&gt;"It's not an up and down, national movement. It is largely a middle class cause," said Sagarika Ghose, a novelist and journalist at the CNN-IBN news television channel.&lt;/p&gt;
&lt;p&gt;"But it's hugely important one. For a younger generation, corruption has become a catch-all phrase for the failure of development."&lt;/p&gt;
&lt;p&gt;Some activists are already criticising Hazare as a hype of an elitist social media.&lt;/p&gt;
&lt;p&gt;"Those thronging the Ramlila grounds or marching in support of Anna in the metros are not necessarily 'the people' of the country, and it is dangerous to take the two as identical," academic Prabhat Patnaik wrote in The Hindu newspaper.&lt;/p&gt;
&lt;p&gt;(Editing by Paul de Bendern and Alex Richardson)&lt;/p&gt;
&lt;p&gt;This article by Alistair Scrutton was &lt;a class="external-link" href="http://in.reuters.com/article/2011/08/25/idINIndia-58963020110825"&gt;published&lt;/a&gt; in Reuters on &amp;nbsp;25 August 2011.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/social-media-masks-forgotten-protests'&gt;https://cis-india.org/news/social-media-masks-forgotten-protests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-01T06:24:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
