<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2881 to 2895.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/uid-mixed-response"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/security-summit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/all-india-radia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/niira-radia-tapes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/bury-email"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-new-billion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/doc-2.0"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/october-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-szabadon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/uid-project-concern"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-facebook-features"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID">
    <title>Public Statement to Final Draft of UID Bill </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID</link>
    <description>
        &lt;b&gt;The final draft of the UID Bill that will be submitted to the Lok Sabha was made public on 8 November 2010. If the Bill is approved by Parliament, it will become a legal legislation in India. The following note contains Civil Society's response to the final draft of the Bill. &lt;/b&gt;
        
&lt;p&gt;On 8 November 2010, the UID Authority issued the final draft of the UID Bill that will be submitted to the Lok Sabha for review and approval. Earlier this year in June 2010 the Authority issued a draft UID Bill to the public for comment and review. Civil Society responded with a detailed summary and high summary of points that amended the draft or were missing in the draft Bill. We are disappointed that none of the concerns raised by Civil Society, including those listed below, were addressed.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Architecture&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The centralized architecture of the UID project is unnecessary. A federated and decentralized structure to the UID project would achieve the same goal of providing identity, authentication, and delivery of benefits.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Scope&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The scope of the Bill is overboard. Though the main purpose of the Bill is to facilitate the delivery of benefits to residents, the loose language and&amp;nbsp;intermixing of terms&amp;nbsp;creates a threat&amp;nbsp;that data will be collected and used&amp;nbsp;beyond delivery of benefits&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Voluntary and not Mandatory&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill should prohibit the denial of goods, services, entitlements, and benefits for lack of a UID number- provided that an individual furnishes equivalent ID, thus ensuring that the &lt;em&gt;Aadhaar&lt;/em&gt; number is truly voluntary.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inadequate Privacy Safeguards&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill inadequately elaborates on the principles of privacy relating to identity and transaction data. The protections needed should be self-contained within the Bill. Thus, the UID Bill itself should be clear and concise about&amp;nbsp;data collection, transfer, retention, security, and dissemination.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Unwarranted Data Retention&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide adequate privacy protection for transaction data. In particular section 32(2) empowers the Authority to determine the duration that data is to be retained for.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of accountability for all Actors&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill holds only the Authority accountable for violations. Rather the Bill needs to hold enrolling agencies, registrars, and other service providers accountable. Furthermore, the Bill does not provide adequate regulations or accountability for the data that are outsourced.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of Exceptions&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not detail the circumstances and categories of people who will be excused or accommodated with respect to the issuing of &lt;em&gt;Aadhaar&lt;/em&gt; numbers or authentication of transactions.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of Anonymity&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide adequate specificity as to the situations in which anonymity will be preserved and/or an&lt;em&gt; Aadhaar &lt;/em&gt;number should not be requested.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inadequacy of Penalties&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The penalties provided in the Bill are inadequate, because they do not cover several types of misuse.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Unaffordability of Fees&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;It is incompatible with the Bill’s stated purpose of inclusion to require an individual to pay to be authenticated.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of Rollback and Ombudsman Office&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide adequate redress for system/transaction errors and fraud.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inappropriate Structure and Governance&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide appropriate judicial and parliamentary oversight.&lt;/p&gt;
&lt;p&gt; Upon comparison of the draft Bill and the final Bill, CIS finds the following changes the most&amp;nbsp;&amp;nbsp; significant:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Definition of Resident&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Section 2 (q): “resident” means an individual usually residing in a
 village or rural area or town or ward or demarcated area (demarcated by
 the Registrar General of Citizen Registration) within&amp;nbsp; ward in a town 
or urban area”&lt;em&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comment&lt;/em&gt;: This section clarifies the definition of 
‘resident’ from the draft Bill, which defined resident as an “individual
 usually residing within the territory of India”. By specifying that 
individuals in demarcated areas will not receive UID numbers, the 
definition of resident is brought into line with the scope of the Bill 
as laid out in the preamble. We see this change as a positive revision.&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Prohibition of Dissemination of Information&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Section 30 (3): “Notwithstanding anything contained in 
any other law and save as otherwise provided in this Act, the Authority 
or any of its officer or other employee or any agency who maintains the 
Central Identities Data Repository shall not, whether during his service
 as such or thereafter, reveal any information stored in the Central 
Identities Data Repository to any person”&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comment&lt;/em&gt;: This 
section prohibits the dissemination of any information that is stored in
 the Central Identities Data Repository. This prohibition extends to 
anyone or any entity that handles information, and supersedes other laws
 that might permit dissemination of information. We see this change as a
 positive revision. &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Disclosure of Information in the Case of a National Security&lt;br /&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;Section 33 (b):“Any disclosure of information (including identity information) made in the interests of national security in pursuance of a direction to that effect issued by an officer or officers not below the rank of Joint Secretary or equivalent in the Central Government specifically authorised in this behalf by an order of the Central Government”&lt;strong&gt;&lt;em&gt;&amp;nbsp; &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comment&lt;/em&gt;: This section is a minor improvement on the previous draft since it requires&amp;nbsp; specific authorization from the Central Government (rather than from a Minister in charge). Unfortunately, however,&amp;nbsp; it retains the undesirable language of "national security" from the previous draft which, as we had previously pointed out,&amp;nbsp; is not currently clearly defined under Indian law. An alternative phrase that we recommend instead is the Constitutional vocabulary of&amp;nbsp; "public emergency" which already has a considerable volume of judicial reasoning that has elaborated what it means.&amp;nbsp; Eg. in Hukam Chand v. Union of India (AIR 1976 SC 789) it was held that a public emergency "is one which raises problems concerning the interest of public safety", the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public order, or the prevention of incitement to the commission of an offence."&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:48:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/uid-mixed-response">
    <title>UID elicits mixed response</title>
    <link>https://cis-india.org/news/uid-mixed-response</link>
    <description>
        &lt;b&gt;Which is the root cause for pilferage of welfare funds in India: fake identity or corruption?&lt;/b&gt;
        
&lt;p&gt;Can the Unique Identity Card (UID) project solve this problem or will it create other more serious issues like infringement of constitutional rights, etc? These were the points fiercely debated at a panel discussion on UID organised by the Centre for Internet Society and Citizens' Action forum.&lt;/p&gt;
&lt;p&gt;Chief Electoral Officer M N Vidyashankar, who made a presentation on the progress&amp;nbsp; of the UID project in the State, at times, struggled to convince the audience on the necessity and feasibility of the project.&lt;/p&gt;
&lt;p&gt;According to Mathews Thomas of the Citizens' Action Forum, the UID project creates more problems than it is expected to resolve.&lt;/p&gt;
&lt;p&gt;“First, it was launched bypassing Parliament. It will only store biometric and other data of all citizens. This could result in illegal migrants claiming citizenship. Further, it will not prevent corruption in Public Distribution System or other schemes. The huge expenditure it will incur is also a matter of grave concern,” he said.&lt;/p&gt;
&lt;p&gt;Defending the project, Vidyashankar said it was necessary to weed out discrepancies in multiple identity documents.&lt;/p&gt;
&lt;p&gt;“It's well known that inconsistencies in a person's name, father's name, address, etc, creep in multiple documents. For instance, there will be different spellings of a person on a voter ID card, a driving Licence, a passport, and a PAN card. The UID will help in checking such discrepancies,” he asserted.&lt;/p&gt;
&lt;p&gt;No operator will be able to tamper with the data. The laptops will have two screens to help the applicant see the entries. Data will first go to the Grameen Business Centre&amp;nbsp; from where it will head to the Central Identity Database Repository which will issue a randomly generated number, he added.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Former Minister Prof B K Chandrashekhar said that there were several concerns in the UID project which need to be addressed properly.&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://www.deccanherald.com/content/115366/uid-elicits-mixed-response.html"&gt;Deccan Herald&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/uid-mixed-response'&gt;https://cis-india.org/news/uid-mixed-response&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T06:32:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/security-summit">
    <title>Information Security Summit 2010</title>
    <link>https://cis-india.org/news/security-summit</link>
    <description>
        &lt;b&gt;The Information Security Summit 2010 will be held between 2-3 December 2010 in Chennai. The following is the agenda for the event.&lt;/b&gt;
        
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Day 1&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;2-Dec-10&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TIME&lt;/td&gt;
&lt;td&gt;SESSION&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;AGENDA&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30am to 10:30am&lt;/td&gt;
&lt;td&gt;Inaugural Session&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Summit Theme &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Dr. Kamlesh Bajaj, CEO, DSCI&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Welcome Address&lt;/strong&gt; &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Mr. Som Mittal, President, NASSCOM&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Keynote Address &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Mr. Jeffrey Carr, Principal, GreyLogic, United States&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30am to 11:15am&lt;/td&gt;
&lt;td&gt;Plenary Session&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Encryption – No more a paradox &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Secure Business Transaction v/s National security&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Role of Policy Makers&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Session Chair &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Dr. P.K. Saxena, Director – SAG, DRDO&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Panelists&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Hitesh Barot, Director, Intel&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Dr. Kamlesh Bajaj, CEO, DSCI&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Dr. Sachin Lodha, TCS&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Ashutosh Saxena, Principal Research Scientist, SETLabs, Infosys&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15am to 11:30am&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea/Coffee Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30am to 11:50am&lt;/td&gt;
&lt;td&gt;Session I A &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Securing Data &amp;amp; Systems with Trusted Computing Now and in the Future&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Brian Berger, TCG Promoter Board Member, Executive Vice President Marketing &amp;amp; Sales, Wave Systems Corp.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:50am to 12:10pm&lt;/td&gt;
&lt;td&gt;Session I B&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Take Control of Identities &amp;amp; Data Loss &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Mr. Vipul Kumra, Consultant, CA Technologies&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:10pm to 12:30pm&lt;/td&gt;
&lt;td&gt;Session I C&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Security and
the Cloud&lt;/strong&gt;&lt;/p&gt;
&lt;ul type="disc"&gt;&lt;li&gt;Ms. Smitha Murthy, Head of
     Product Management, McAfee India&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30pm to 1:15pm&lt;/td&gt;
&lt;td&gt;Session II&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;DSCI Data-Centric Approach: Information Visibility&lt;br /&gt;
Moderator &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Ms. Nandita Mahajan, CISO &amp;amp;CPO, India &amp;amp; South-Asia, IBM &amp;amp; IBM Daksh&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;
&lt;strong&gt;Presentation &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Vinayak Godse, Director – Data Protection, DSCI&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Panelists &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Pradeep Verma, CISO, FirstSource Solutions&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Bhaskar Parashuram, Head – Information Security CoreLogic&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Agnelo D’souza, CISO, Kotak Mahindra Bank&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:15pm to 2:15pm&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Networking Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:15pm to 2:30pm&lt;/td&gt;
&lt;td&gt;Session III&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;DSCI – KPMG Annual Security Survey 2010 &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Akhilesh Tuteja, Executive Director, KPMG&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:30pm to 3:15pm&lt;/td&gt;
&lt;td&gt;Session IV &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Leveraging Cloud to deliver Security Services&lt;br /&gt;
Session Chair &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Felix Mohan, CSO, Bharti Group&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Panelists &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Geoff Charron, VP Software Engineering, CA Technologies&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Prashant Gupta, Head of Solutions – India, Verizon Business&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Ms. Smitha Murthy, Head of Product Management, McAfee India&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:15pm to 4:00pm&lt;/td&gt;
&lt;td&gt;Session V &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Security 3.0
– Embedding Security in Design&lt;/strong&gt; – Trusted Computing, Trusted Environment&lt;br /&gt;
&lt;strong&gt;Session Chair&lt;/strong&gt;&lt;/p&gt;
&lt;ul type="disc"&gt;&lt;li&gt;Mr. P.S. Venkat Subramanyan,
     Head – Data Protection &amp;amp; Privacy, CSC India&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Panelists&lt;/strong&gt;&lt;/p&gt;
&lt;ul type="disc"&gt;&lt;li&gt;Mr. Mark Schiller, TCG Promoter
     Board Member, Director of HP Security Technology, Hewlett Packard Corp.&lt;/li&gt;&lt;li&gt;Mr. Sanjay Bahl, CSO, Microsoft
     India&lt;/li&gt;&lt;li&gt;Mr. Avinash Kadam, Lead
     Instructor, (ISC)2 and Director, MIEL e-Security&lt;/li&gt;&lt;li&gt;Mr. Chris Leach, CISO, ACS Inc&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:00pm to 4:45pm&lt;/td&gt;
&lt;td&gt;Session VI &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Securing Business Transactions&lt;br /&gt;
Session Chair &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Mr. B. Sambamurthy, Director, IDRBT&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Panelists &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Ms. Smitha Murthy, Head of Product Management, McAfee India&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Shankara Narayanan, Head – Professional Services, Verizon Business&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Kartik Shahani, Country Manager – India and SAARC, RSA&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:45pm to 5:00pm&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea/Coffee Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5:00pm to 6:00pm&lt;/td&gt;
&lt;td&gt;Session VII&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;DSCI Study Reports&lt;br /&gt;
Session Chair &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Mr. B J Srinath, DIT&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Presentations &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Theme Introduction – Rahul Jain, Sr. Consultant, DSCI&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Insider Threats – Sivarama K, Executive Director, PwC&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Service Provider Assessment Framework – Terry Thomas, Partner, E&amp;amp;Y&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Reasonable Security Practices – PVS Murthy, Global Head IRM Consulting Practice, TCS&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Security and Privacy Issues in Cloud Computing – Sai Lakshmi, General Manager, Information Security, Wipro&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;:30pm onwards&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Networking Cocktail and Dinner&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DAY 2&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;3-Dec-10&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TIME&lt;/td&gt;
&lt;td&gt;SESSION&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;AGENDA&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30am to 10:30am&lt;/td&gt;
&lt;td&gt;Session I &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Economics of Security&lt;/strong&gt; – ‘Business Flexibility’ and ‘Security 
&amp;amp; Investment’ in the wake of Cyber crime and expanding compliance 
regimes&lt;br /&gt;
&lt;strong&gt;Session Chair &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Brian J. Manning, President and Managing Director, CSC India&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Panelists &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Laxmikanth Venkatraman, Head – India Operations, Broadridge Financial Solutions&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Kumar Rao, Global Head, Cards &amp;amp; Payments Practice, Tata Consultancy Services&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;
Prof. Anjali Kaushik, MDI Gurgaon&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;0:30am to 11:15am&lt;/td&gt;
&lt;td&gt;Session II&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel Discussion – DSCI Best Practices Advisory Group&lt;br /&gt;
Session Chair &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Dr. Kamlesh Bajaj, CEO, DSCI&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Panelists &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. B.J. Srinath, DIT&lt;/li&gt;&lt;li&gt;
Ms. Nandita Jain Mahajan, IBM&lt;/li&gt;&lt;li&gt;
Mr. Abhay Gupte, Deloitte&lt;/li&gt;&lt;li&gt;
Mr. Anurana Saluja, Infosys&lt;/li&gt;&lt;li&gt;
Mr. Rahul Biswari, HP&lt;/li&gt;&lt;li&gt;
Mr. Chalam Peddada, Fidelity&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15am to 11:30am&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea/Coffee Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30am to 12:15pm&lt;/td&gt;
&lt;td&gt;Session III&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Evolution of Privacy in India&lt;/strong&gt; – ITAA, UIDAI, Privacy Laws, Global Regulations&lt;br /&gt;
&lt;strong&gt;Session Co-chairs &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Dr. Gulshan Rai, Director General, CERT-In&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Mr. Rajeev Kapoor, Joint Secretary, DoPT, Govt. of India&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Speakers &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Hitesh Barot, Director – Global Public Policy, Intel Corporation&lt;/li&gt;&lt;li&gt;Mr. Sunil Abraham, Executive Director, Centre for Internet and Society&lt;/li&gt;&lt;li&gt;
Mr. Vakul Sharma, Advocate, Supreme Court of India&lt;/li&gt;&lt;li&gt;
Mr. Vikram Asnani, Sr. Consultant – Security Practices, DSCI&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:15pm to 12:30pm&lt;/td&gt;
&lt;td&gt;Session IV&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Deloitte’s India Security Survey &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Sundeep Nehra, Sr. Director, Deloitte&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30pm to 1:30pm&lt;/td&gt;
&lt;td&gt;Session V &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Technology
Challenges To Fight Data Breaches and Cyber Crimes:&lt;/strong&gt; Collaboration through Public
Private Partnerships – The Way Forward&lt;br /&gt;
&lt;strong&gt;Moderator&lt;/strong&gt;&lt;/p&gt;
&lt;ul type="disc"&gt;&lt;li&gt;Mr. Pratap Reddy, Director,
     Cyber Security, NASSCOM&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Principal
Speaker&lt;/strong&gt;&lt;/p&gt;
&lt;ul type="disc"&gt;&lt;li&gt;Mr. Michael West, Member of the
     Board, NCFTA (National Cyber-Forensics Training and Alliance), USA and
     Strategic Technology Investigator, Fidelity Investments&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Panelists&lt;/strong&gt;&lt;/p&gt;
&lt;ul type="disc"&gt;&lt;li&gt;Mr. Krishna Sastry Pendyala,
     Cyber Forensics Expert at GEQD, Central Forensics Sciences Laboratory, MHA,
     Government of India&lt;/li&gt;&lt;li&gt;Dr. Srinivas Mukkamala, Sr.
     Research Scientist Institute for Complex Additive Systems Analysis (ICASA)
     Adjunct Faculty New Mexico Tech., USA and Advisor Cyber Security Works
     Pvt. Ltd.&lt;/li&gt;&lt;li&gt;Mr. Anil Kona, Specialist and
     Sr. Manager, Analytics and Forensics Technologies, Deloitte&lt;/li&gt;&lt;li&gt;Mr. Samir Datt, Founder CEO,
     Foundation Futuristic Technologies&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:30pm to 2:30pm&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Networking Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:30pm to 3:15pm&lt;/td&gt;
&lt;td&gt;Session VI&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Security Technologies in Focus&lt;br /&gt;
Session Chair &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Mr. Srikant Vissamsetti, Vice President – Network Security, McAfee India&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Panelists &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Prashant Gupta, Head of Solutions – India, Verizon Business&lt;/li&gt;&lt;li&gt;
Mr. Kartik Shahani, Country Manager – India and SAARC, RSA&lt;/li&gt;&lt;li&gt;
Ms. Rashmi Chandrashekar, Vice President, Accenture India&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:15pm to 4:00pm&lt;/td&gt;
&lt;td&gt;Session VII&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Making their Presence felt in the Security Market: Indian Vendors&lt;br /&gt;
Session Chair &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Dr. Gulshan Rai, Director General – Cert-In, DIT&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Panelists &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Mr. Prakash Baskaran, CEO, Pawaa Software&lt;/li&gt;&lt;li&gt;
Mr. Ajay Data, CEO, Data Infosys Ltd&lt;/li&gt;&lt;li&gt;
Mr. Arnab Chattopadhyay, VP Technology, iViz Technosolutions&lt;/li&gt;&lt;li&gt;
Mr. Tushar Sighat, Vice President, Cyberoam – India and SAARC, Elitecore Technologies&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:00pm to 4:15pm&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea/Coffee Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:15pm to 5:00pm&lt;/td&gt;
&lt;td&gt;Session VIII&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;E-Security Strategy for the next 5 years – The Way Forward&lt;br /&gt;
Session Chair &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Prof. N. Balakrishnan, Chairman, DSCI&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Panelists &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
Dr. Gulshan Rai, Director General, CERT-In, DIT&lt;/li&gt;&lt;li&gt;
Mr. Kumar Ranganathan, Principal Engineer and Manager, Intel Labs&lt;/li&gt;&lt;li&gt;
Mr. Sanjay Bahl, CSO, Microsoft India&lt;/li&gt;&lt;li&gt;
Mr. Y.D. Wadaskar, Managing Director, WYSE Biometrics Systems&lt;/li&gt;&lt;li&gt;
Dr. Kamlesh Bajaj, CEO, DSCI&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5:00pm to 5:15pm&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Closing Remarks by DSCI&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;br /&gt;See the original &lt;a class="external-link" href="http://www.dsci.in/events/agenda/95"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/security-summit'&gt;https://cis-india.org/news/security-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T06:33:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/all-india-radia">
    <title>This Is All India Radia</title>
    <link>https://cis-india.org/news/all-india-radia</link>
    <description>
        &lt;b&gt;Our news media blanked it out, but the Internet forced the issue, says Debarshi Dasgupta in an article published in the Outlook Magazine.&lt;/b&gt;
        
&lt;p&gt;If you depend on just the &lt;em&gt;Times of India &lt;/em&gt;or &lt;em&gt;Hindustan Times&lt;/em&gt; for your daily news fix, chances are you have missed the story that has put Indian journalism under its fiercest gaze ever. For it turns out that a majority of Indian journalism censors news about its own indiscretions. After Open and Outlook magazine &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?268071"&gt;published transcripts&lt;/a&gt; of conversations between Niira Radia and high-profile journalists, much of the&lt;a class="external-link" href="http://blogs.outlookindia.com/default.aspx?ddm=10&amp;amp;pid=2385&amp;amp;eid=5"&gt; mainstream media&lt;/a&gt; erased the coverage about the controversy. Even the few papers and TV stations that covered the issue in the days to follow did not name names and avoided the meat of the story, hiding behind the sophistry of the transcripts being “unauthenticated”.&lt;/p&gt;
&lt;p&gt;Among the few that did, The New Indian Express and Mail Today (it did not name a former editor at the group though) picked up pieces of the conversations and the Deccan Herald carried an editorial on November 22. Among the vernacular papers, Sakshi and Andhra Jyoti in Andhra carried some excerpts. The Malayalam news channel Asianet picked up the story, but the English news channels were deafeningly quiet. CNN-IBN had a show on November 22 that claimed to “break the silence” but neither identified the people involved nor featured the transcripts; instead it pontificated on where to draw the line between lobbying and journalism. G. Sampath, deputy editor at Daily News &amp;amp; Analysis, Mumbai, wrote on his blog, “What is really scary is that, despite living in a ‘democracy’ that boasts of a ‘free press’, if you were dependent only on TV and the big newspapers for the biggest news developments of the day, you would never have known about the Niira Radia tapes, and the murky role of media as political power brokers.”&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/TOI.jpg/image_preview" alt="TOI" class="image-inline image-inline" title="TOI" /&gt;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;Sevanti Ninan of &lt;em&gt;The Hoot&lt;/em&gt;, an online media watch website, latched on to this “great media blackout”. “The list of those who took no note is long and illustrious: The&lt;em&gt; Indian Express&lt;/em&gt;, always quick off the mark on sensational disclosures. &lt;em&gt;The Hindu&lt;/em&gt;, &lt;em&gt;The Times of India&lt;/em&gt;, &lt;em&gt;Hindustan Times&lt;/em&gt;,&lt;em&gt; India Today&lt;/em&gt;, all those Hindi news channels,” Sevanti wrote. “Not a story that three prominent journalists were trying to help a lobbyist get A. Raja a ministerial berth in the second upa government.” Filling the gap, the site has opened a forum to debate the ethical transgressions in the Radia tapes.&lt;/p&gt;
&lt;p&gt;Despite its blackout in print, the story has largely survived because of the tremendous interest among India’s netizens. The news was also carried prominently online in &lt;em&gt;The Wall Street Journal&lt;/em&gt;, &lt;em&gt;The Washington Post&lt;/em&gt; and &lt;em&gt;The Huffington Post&lt;/em&gt;. Blogs are abuzz with indignant reactions to this censorship. The ‘Radia Tapes Controversy’ is now even a rapidly evolving and fairly detailed Wikipedia entry. YouTube throws up 35 matches for Radia and Barkha (Dutt), with one video (a transcript of one of the conversations) viewed close to 72,000 times. There are also numerous Facebook groups with discussions on how to “fix” the media. Google Barkha Dutt and the engine throws up Niira Radia as a prompt. And there’s no dearth of tweets about “Barkhagate”—there are several every minute asking for these journalists to resign and some even call for them to be jailed. For some, especially among the Right, the controversy has come as a boon, lending credence to their argument that the “pseudo-secular” English media has sold its soul.&lt;/p&gt;
&lt;p&gt;Finally, when the &lt;em&gt;ToI &lt;/em&gt;reported online on November 25 about how the internet had kept the story alive, there were bursts of self-congratulatory messages and tweets exchanged online. For Sunil Abraham, executive director, Centre for Internet and Society, the Radia tapes controversy illustrates the “tension and disconnect” that exists between the internet and traditional media. “This is unlike on 26/11 when there was a kind of synergy between the two in their coverage,” he says. Yet Net users deserve some credit for having made the debate interactive and infusing it with a much-needed spunk and pluralism. “For me, the most exciting thing about the ‘Barkhagate’ controversy is not the internet’s influence on the attention economy,” adds Abraham. “It’s actually been its crowd-sourcing ability to bring together the intelligence of many amateurs from across the world and to put their insights into one collective analysis of the controversy.” While the Net, with just about 20 million users, is yet to rival the traditional media’s hold on India, the latter undoubtedly have a force it must now reckon with.&lt;/p&gt;
&lt;p&gt;Read the original article in the &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?268206"&gt;Outlook&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/all-india-radia'&gt;https://cis-india.org/news/all-india-radia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T07:28:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/niira-radia-tapes">
    <title>The Niira Radia Tapes: Scrutinizing the Snoopers</title>
    <link>https://cis-india.org/news/niira-radia-tapes</link>
    <description>
        &lt;b&gt;There’s been plenty of outrage in India over taped phone calls between corporate lobbyist Niira Radia and local journalists, revealing what some people believe is evidence that star reporters at the country’s newspapers and TV channels are too cozy with the subjects they’re supposed to be reporting on.&lt;/b&gt;
        
&lt;p&gt;Amid that firestorm, though, there’s been much less scrutiny of why and how the wiretaps happened in the first place, whether they were justified or a governmental overreach, and how these infamous tapes got from the government into the hands of media companies.&lt;/p&gt;
&lt;p&gt;Here are just a few questions that merit more consideration: Who orders telephone surveillance in India and on what grounds? How often is it done? What protections are in place to ensure government officials don’t abuse their surveillance authority to settle scores with journalists, corporate officials or ordinary citizens they have a beef with?&lt;/p&gt;
&lt;p&gt;The quick answer to all of these: India trusts its bureaucrats to do the right thing. The central government’s Home Secretary, along with some intelligence agencies and state officials, has the authority to approve wiretaps. Unlike in the U.S. and other countries, where investigators must generally obtain court warrants for surveillance to pursue matters ranging from drug-trafficking to insider trading, in India there is no such legal tradition or rule.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“There is no oversight infrastructure, either in parliament or in the judiciary,” said Sunil Abraham, executive director of the Bangalore-based Center for Internet and Society.&amp;nbsp; There is only “post facto” protection in the sense that you can sue the government later if you feel you were wrongly wiretapped, he said.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;According to local media reports,&lt;a class="external-link" href="http://www.indianexpress.com/news/2g-tapes-my-privacy-violated-tata-tells-sc/717442/"&gt; industrial giant Ratan Tata on Monday petitioned the Supreme Court over the leaking of the tapes&lt;/a&gt;, on which he is heard bantering with Ms. Radia (his lobbyist) about a range of topics related to the $70 billion Tata Group. The reports say he feels the episode violated his privacy and wants the leakers to be punished. (While there’s no explicit constitutional protection of privacy in India, the Supreme Court in some cases has held it is covered by Article 21 of the Constitution, which says, “No person shall be deprived of his life or personal liberty except according to procedure established by law.”)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://economictimes.indiatimes.com/news/news-by-industry/telecom/Ratan-Tata-may-move-SC-against-tape-leaks-today/articleshow/7007167.cms"&gt;A report in the Economic Times Monday said government is going to investigate the leak&lt;/a&gt;. A Home Ministry spokesman declined to comment on whether an inquiry has been launched but &lt;span class="visualHighlight"&gt;&lt;/span&gt; said India’s system of allowing a handful of security and intelligence officials to approve or deny wiretaps sufficiently guards Indian citizens’ privacy. “It isn’t an unchecked kind of thing, that anyone can just do it,” the spokesman said.&lt;/p&gt;
&lt;p&gt;India draws its wiretap authority from a few laws, including the 1885 Telegraph Act and a separate information technology law enacted in 2000 and amended in 2008. The government can tap phones or intercept emails for reasons such as “any public emergency” or “in the interest of the public safety” – pretty broad language that gives a lot of leeway to bureaucrats, critics say.&lt;/p&gt;
&lt;p&gt;A report in &lt;a class="external-link" href="http://www.thehindu.com/news/national/article905944.ece"&gt;the Hindu last week claimed that more than 5,000 Indian phones are being bugged daily&lt;/a&gt;, citing anonymous sources. Mr. Abraham, of the Center for Internet and Society, says that breadth of surveillance in a country of 1.2 billion people wouldn’t be unreasonable. But his organization is planning a Right to Information request to find out more about the scope of government wiretapping.&lt;/p&gt;
&lt;p&gt;The government may have had good reasons to conduct the wiretaps of Ms. Radia, which local media reports say were done by the income tax department for two four-month stints in 2008 and 2009, &lt;a class="external-link" href="http://www.indianexpress.com/news/5-851-radia-calls-on-cbi-checklist-its-at-halfway-mark/714716/"&gt;during which time they reportedly logged 5,851 calls&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The income tax agency hasn’t stated publicly what the rationale was and its officials declined to comment Monday.&lt;/p&gt;
&lt;p&gt;Media reports suggest that the material was supposed to help probe the irregular allocation of mobile phone spectrum in 2008 to several Indian telecom firms. (The official in charge of that allocation, A. Raja, resigned as telecom minister Nov. 14 amid charges that he rigged the process to favor some companies over others.)&lt;/p&gt;
&lt;p&gt;But much of the content in the several hours of so-called “2G tapes” that have leaked to Indian news organizations has little or nothing to do with taxes or 2G spectrum. There’s talk of the billionaire Ambani brothers’ natural gas pricing dispute, mining policy, a dog who is named Google because he is good at finding things, which corporate honchos are easy to get on the phone, and plenty of titillating exchanges between New Delhi’s power brokers on the politics of cabinet appointments. Some pretty top-notch gossip, in other words.&lt;/p&gt;
&lt;p&gt;To be sure, the content on the tapes does raise disturbing and serious questions about whether some elements of the Indian media carry water for particular government ministers or corporations. And it pulls the veil back on how the titans of Indian business and politics shape policy away from the public spotlight, &lt;a class="external-link" href="http://www.thehindu.com/opinion/columns/siddharth-varadarajan/article920054.ece"&gt;as Siddharth Varadarajan explained in Monday’s edition of the Hindu when he made a clever analogy to the movie The Matrix&lt;/a&gt;. (&lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2010/11/29/2010/11/22/oh-vir-what-can-the-matter-be/"&gt;We’ve separately parsed the contents of some of the tapes for their potential significance&lt;/a&gt;.)&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But it’s still worth asking tough questions about the legal and ethical foundations of wiretapping citizens, because, as Indian civil liberties expert Lawrence Liang said in an email, “if this can happen to a Nira Radia, then it can easily be used for a Nida Nobody.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Update, 5:09 p.m.&lt;/strong&gt;: “A Home Ministry spokesman confirmed the ministry has asked the Intelligence Bureau and Central Board of Direct Taxes to conduct a probe into the leak.”&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2010/11/29/the-tapes-scrutinizing-the-snoopers/"&gt;Wall Street Journal&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/niira-radia-tapes'&gt;https://cis-india.org/news/niira-radia-tapes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T07:29:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/bury-email">
    <title>Time to bury e-mail?</title>
    <link>https://cis-india.org/news/bury-email</link>
    <description>
        &lt;b&gt;Earlier this week, Mark Zuckerberg, founder of Facebook, had a simple message to the world: email is outdated since it can no longer handle the sort of digital communication that we’ve got used to. Facebook Messages, which integrates email, SMS, instant messaging and social networking, is the way forward, he claimed.&lt;/b&gt;
        
&lt;p&gt;Zuckerberg isn’t the first one to point out the limitations of email. Last year Google too said that email, a technology invented in the ’60s, was not equipped to serve our current needs. “Wave is what email would look like if it were invented today,” Google proclaimed during the launch of Google Wave.&lt;/p&gt;
&lt;p&gt;As it turned out, Wave was a great product but served an entirely different purpose — collaboration. While this made sense at the enterprise level, it didn’t offer much added value to email users engaging in one-to-one conversations. Google Wave today is defunct since users didn’t buy into Google’s argument. Will Facebook Messages suffer the same fate?&lt;/p&gt;
&lt;p&gt;The answer depends a lot on whether users face the problem that Zuckerberg claims they do. “A lot of people are trying to solve the problem of email. But I don’t know what that problem is,” says Mahesh Murthy, CEO, Pinstorm, a digital marketing agency. According to Murthy, there are three main issues with email: storage space, spam filtering and prioritising messages. And modern email services such as Gmail have evolved to address these concerns.&lt;/p&gt;
&lt;p&gt;Facebook obviously thinks otherwise. According to the company we need one inbox for all our digital communication, which includes emails, chats and SMS. Second, messages from your Facebook contacts will be considered more important and will go into Social Inbox. All other messages will go into a separate folder. Third, messages will be threaded according to people and not subject lines as is the case with Gmail and other email services.&lt;/p&gt;
&lt;p&gt;According to Gaurav Mishra, head, social media practise, MS&amp;amp;L Group, these are compelling reasons to start using Facebook Messages. But enough to ditch your email account? Not quite, say experts.&lt;/p&gt;
&lt;p&gt;“Integration is a marketing myth,” says Nishant Shah, director, Centre for Internet and Society, a Bangalore-based research organisation, “Many of us like to keep our information in different silos. We have heard of young people getting fired from their jobs because they were not able to keep personal information compartmentalised.”&lt;/p&gt;
&lt;p&gt;Secondly, giving greater priority to messages from people in your contact list may be misplaced. “The nature of conversation on Facebook is casual and the criticality of a message and hence the need for an immediate response may not be that high,” points out Murthy. An email from, say, a client or a prospective recruiter who may not be on your friends list, may be more critical.&lt;/p&gt;
&lt;p&gt;There’s no doubting that Facebook Messages could change the way we conduct our casual conversations. But email serves basic and universal needs. For example, while introducing the new service, Zuckerberg pointed out how school kids felt email was too slow. According to Shah, however, it is important to understand what the kids found email slow for. A movie plan can be made quicker through SMS, but the same kids might submit their assignments via email.&lt;/p&gt;
&lt;p&gt;Of course, Zuckerberg has not claimed that Facebook Messages will be an email — or more specifically Gmail — killer. But Facebook’s PR machinery would have known how the media would react. By undermining the very concept of email — one of Google’s strongest products — Facebook has managed to make Google look like the hero of yesteryears.&lt;/p&gt;
&lt;p&gt;Analysts agree that Facebook Messages is really about retaining users on its website — if Facebook can give its users a reason to spend more time on its website rather than that of an email service, it can serve more ads. “It is about economics. But Facebook is trying to turn it into a cultural argument,” says Shah.&lt;/p&gt;
&lt;p&gt;Still, one thing is certain; Facebook Messages will not suffer the same fate as Google Wave, partly because it is simply an update (and a rather good one) to an existing feature within Facebook. But it is far from a replacement to email. As Mishra puts it, “I will not close down my existing email ids. But I will start using Facebook to message my relatives and friends. It is going to be the future of messaging, not the future of email.”&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://www.dnaindia.com/scitech/report_time-to-bury-e-mail_1469662"&gt;DNA&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bury-email'&gt;https://cis-india.org/news/bury-email&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T07:30:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2010-bulletin">
    <title>November 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/november-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The internet’s new billion: New web users — in countries like Brazil and China — are changing the culture of the internet.&lt;a href="http://bit.ly/hKUb5n" target="_blank"&gt;&lt;br /&gt;http://bit.ly/hKUb5n&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;‘Piracy is now a mainstream political phenomenon': “Piracy has become a mainstream political phenomenon,” said Sunil Abraham, executive director of the Centre for Internet and Society in the city. The piracy that he was referring to was not the piracy of the high seas but the piracy of intellectual property.&lt;a href="http://bit.ly/gMC1Br" target="_blank"&gt;&lt;br /&gt;http://bit.ly/gMC1Br&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Open standards policy in India: A long, but successful journey: Last week, India became another major country to join the growing, global open standards movement. After three years of intense debate and discussion, India's Department of IT in India finalized its Policy on Open Standards for e-Governance, joining the ranks of emerging economies like Brazil, South Africa and others. This is a historic moment and India's Department of Information Technology (DIT) deserves congratulations for approving a policy that will ensure the long-term preservation of India's e-government data.&lt;a href="http://bit.ly/dGo6Qo" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dGo6Qo&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Information, the world's new capital - Digital Natives: Information is the new capital and currency of the world, Nishant Shah, of the India-based Digital Natives with a Cause, told Bizcommunity.com yesterday, 10 November 2010, as the three-day workshop on digital and internet technologies that brought together young delegates from nine African countries ended in Johannesburg, South Africa. "If the 20th century was the age of the industrial revolution, the 21st century is now actually the age of the knowledge information," Shah said.&lt;a href="http://bit.ly/dpXIKY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dpXIKY&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;What it means to be a child today: They move seamlessly between reality and virtual reality. The digital landscape they inhabit comprises generations — not of family — but of technology such as Web 2.0, 3G, PS4 and iPhone5. Their world has moved beyond their neighbourhood, school and childhood friends to encompass a 500-channel television universe, the global gaming village, the endless internet. These are the children born in the last decade and half — possibly the first generation that has never known a world without hi-tech.&lt;a href="http://bit.ly/cz3nBJ" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cz3nBJ&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Report: Digitally Open: Innovation and Open Access Forum, 23 Oct 2010, Doha, Qatar: A summary of the event "Digitally Open: Innovation and Open Access Forum" held in Doha.&lt;a href="http://bit.ly/catHoi" target="_blank"&gt;&lt;br /&gt;http://bit.ly/catHoi&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;DOC 2.0: A Resources Sharing Mela by NGO Documentation Centres: A Resource Sharing Mela and Meet of DCM (Document Centres Meet) at the Centre for Education &amp;amp; Documentation in Domlur, Bangalore.&lt;a href="http://bit.ly/dnwQMf" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dnwQMf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Wi-Fi Direct promises range, bandwidth higher than Bluetooth: Sharing, printing and connecting for Wi-Fi devices is going to be more convenient than ever with soon-to-be-launched technology Wi-Fi Direct, which enables devices to connect to each other without a conventional Wi-Fi hub. This article by Ramkumar Iyer was published in the Hindu on 31 October 2010.&lt;a href="http://bit.ly/aUul9f" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aUul9f&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Access to Knowledge in the Age of Intellectual Property: Access to Knowledge in the Age of Intellectual Property charts the rise of the access to knowledge movement, a movement in which Open Society Foundations have played a key role. It maps the vast terrain of legal, cultural, and technical issues that activists and thinkers aligned to the movement negotiate every day.&lt;a href="http://bit.ly/9nkQFM" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9nkQFM&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Social Mashup!: Save the Date Join us to meet India’s most passionate, innovative, and curious start-up social entrepreneurs for two groundbreaking days of conversations, connections and inspiration. This event will be held on 2-3 December 2010 at the Indian School of Business in Hyderabad.&lt;a href="http://bit.ly/bKKcar" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bKKcar&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Digitally Open: Innovation and Open Access Forum: Promoting Openness in Today's Digital World&lt;a href="http://bit.ly/961Ieg" target="_blank"&gt;&lt;br /&gt;http://bit.ly/961Ieg&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Crisis for identity or identity crisis?: The hurry with which the government is pushing its most ambitious project to assign a number (UID) to every citizen without any feasibility study or public debate has raised many questions. &lt;a href="http://bit.ly/8Zt9mf" target="_blank"&gt;http://bit.ly/8Zt9mf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Identity, Identification and Media Representation in Video Game Play: An Audience Reception Study: Adrienne Shaw from the Annenberg School of communications, who is a visiting fellow at MICA is giving a public talk on research on representation in video games on 27 November 2010 at the Centre for Internet and Society in Bangalore.&lt;a href="http://bit.ly/909xkU" target="_blank"&gt;&lt;br /&gt;http://bit.ly/909xkU&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;My Bubble, My Space, My Voice Workshop - Perspective and Future&lt;br /&gt;The second workshop for the “Digital Natives with a Cause?” research project named “My Bubble, My Space, My Voice” took place at the Link Center of Wits University, in Johannesburg, South Africa from 6 November 2010 to 9 November 2010. Samuel Tettner, Digital Natives Co-cordinator shares his perspective on the workshop.&lt;a href="http://bit.ly/bPX6Xd" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bPX6Xd&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Archive and Access: Call for Review&lt;br /&gt;The Archive and Access research project by Rochelle Pinto, Aparna Balachandran and Abhijit Bhattacharya is a part of the Researchers @ Work Programme at the Centre for Internet and Society, Bangalore. The project that attempts to look at the ways in which the notion of the archive, the role of the archivist and the relationship between the state and private archives that has undergone a transition with the emergence of Internet technologies in India has been put up for public review. &lt;a href="http://bit.ly/d4o809" target="_blank"&gt;http://bit.ly/d4o809&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Just Where We Like It&lt;br /&gt;The micro space for status updates might become the new public space for discussion. Nishant Shah's column on Digital Natives was published in the Sunday Eye of the Indian Express on 21 November 2010.&lt;a href="http://bit.ly/96cK8q" target="_blank"&gt;&lt;br /&gt;http://bit.ly/96cK8q&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Taking It to the Streets&lt;br /&gt;The previous posts in the Beyond the Digital series have discussed the distinct ways in which young people today are thinking about their activism. The fourth post elaborates further on how this is translated into practice by sharing the experience of a Blank Noise street intervention: Y ARE U LOOKING AT ME?&lt;a href="http://bit.ly/ciyiiR" target="_blank"&gt;&lt;br /&gt;http://bit.ly/ciyiiR&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Talking Back without "Talking Back"&lt;br /&gt;The activism of digital natives is often considered different from previous generations because of the methods and tools they use. However, reflecting on my conversations with The Blank Noise Project and my experience in the ‘Digital Natives Talking Back’ workshop in Taipei, the difference goes beyond the method and can be spotted at the analytical level – how young people today are thinking about their activism.&lt;a href="http://bit.ly/bHAvDE" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bHAvDE&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The 'Beyond the Digital' Directory&lt;br /&gt;For the past few months, Maesy Angelina has been sharing the insights gained from her research with Blank Noise on the activism of digital natives. The ‘Beyond the Digital’ directory offers a list of the posts on the research based on the order of its publication.&lt;a href="http://bit.ly/b3TK3C" target="_blank"&gt;&lt;br /&gt;http://bit.ly/b3TK3C&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;First Thing First&lt;br /&gt;Studies often focus on how digital natives do their activism in identifying the characteristics of youth digital activism and dedicate little attention to what the activism is about. The second blog post in the Beyond the Digital series reverses this trend and explores how the Blank Noise Project articulates the issue it addresses: street sexual harassment.  &lt;a href="http://bit.ly/cM1HFf" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cM1HFf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Change has come to all of us&lt;br /&gt;The general focus on a digital generational divide makes us believe that generations are separated by the digital axis, and that the gap is widening. There is a growing anxiety voiced by an older generation that the digital natives they encounter — in their homes, schools and universities and at workplaces — are a new breed with an entirely different set of vocabularies and lifestyles which are unintelligible and inaccessible. It is time we started pushing the boundaries of what it means to be a digital native.&lt;a href="http://bit.ly/9J82YY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9J82YY&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;br /&gt;The Centre for Internet and Society is proud to announce the launch of its first publication, the “e-Accessibility Policy Handbook for Persons with Disabilities" in collaboration with the G3ict (Global Initiative for Inclusive Information Communication Technologies) and ITU (International Telecommunications Union), and sponsored by the Hans Foundation. The handbook is compiled and edited by Nirmita Narasimhan. Dr. Hamadoun I. Toure, Secretary-General, International Telecommunication Union has written the preface, Dr. Sami Al-Basheer, Director, ITU-D has written the introduction and Axel Leblois, Executive Director, G3ict has written the foreword.&lt;a href="http://bit.ly/gfKNYO" target="_blank"&gt;&lt;br /&gt;http://bit.ly/gfKNYO&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Statement of CIS on the Work of the Committee in the 21st SCCR&lt;br /&gt;The twenty-first session of the Standing Committee on Copyright and Related Rights was held in Geneva from 8 to 12 November 2010. Nirmita Narasimhan attended the conference and represented the Centre for Internet and Society.&lt;a href="http://bit.ly/fJVNPI" target="_blank"&gt;&lt;br /&gt;http://bit.ly/fJVNPI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;We’ve All Got Some Baggage&lt;br /&gt;America’s newest trade agreement is not going to kill only iPods. The article appeared in the Tehelka Magazine Vol 7, Issue 45, Dated November 13, 2010 &lt;a href="http://bit.ly/cVrpWd" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cVrpWd&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Consumer Privacy - How to Enforce an Effective Protective Regime?&lt;br /&gt;In a typical sense, when people think of themselves as consumers, they just think about what they purchase, how they purchase and how they use their purchase. But while doing this exercise we are always exchanging personally identifiable information, and thus our privacy is always at risk. In this blog post, Elonnai Hickok and Prashant Iyengar through a series of questions look through the whole concept of consumer privacy at the national and international levels. By placing a special emphasis on Indian context, this post details the potential avenues of consumer privacy in India and states the important elements that should be kept in mind when trying to find at an effective protective regime for consumer privacy.&lt;a href="http://bit.ly/eEs5Qx" target="_blank"&gt;&lt;br /&gt;http://bit.ly/eEs5Qx&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS Responds to Privacy Approach Paper&lt;br /&gt;A group of officers was created to develop a framework for a privacy legislation that would balance the need for privacy protection, security, sectoral interests, and respond to the domain legislation on the subject. Shri Rahul Matthan of Tri Legal Services prepared an approach paper for the legal framework for a proposed legislation on privacy. The approach paper is now being circulated for seeking opinions of the group of officers and is also being placed on the website of the Department of Personnel and Training for seeking public views on the subject. The Privacy India team at CIS responded to the approach paper and has called for the need for a more detailed study of statutory enforcement models and mechanisms in the creation of privacy legislation.&lt;a href="http://bit.ly/eVTwVC" target="_blank"&gt;&lt;br /&gt;http://bit.ly/eVTwVC&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Privacy and Banking: Do Indian Banking Standards Provide Enough Privacy Protection&lt;br /&gt;Banking is one of the most risky sectors as far as privacy is concerned due to the highly sensitive and personal nature of information which is often exchanged, recorded and retained. Although India has RBI guidelines and legislations to protect data, this blog post looks at the extent of those protections, and what are the areas that still need to be addressed.&lt;a href="http://bit.ly/flq09V" target="_blank"&gt;&lt;br /&gt;http://bit.ly/flq09V&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Privacy and Telecommunications: Do We Have the Safeguards?&lt;br /&gt;All of you often come across unsolicited and annoying telemarketing calls/ SMS's, prank calls, pestering calls for payment, etc. Do we have any safeguards against them? This blog post takes a look at the various rules and regulations under Indian law to guard our privacy and confidentiality.&lt;a href="http://bit.ly/hnTwKp" target="_blank"&gt;&lt;br /&gt;http://bit.ly/hnTwKp&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Privacy, Free/Open Source, and the Cloud&lt;br /&gt;A look into the questions that arise in concern to privacy and cloud computing, and how open source plays into the picture.&lt;a href="http://bit.ly/awpCyF" target="_blank"&gt;&lt;br /&gt;http://bit.ly/awpCyF&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Privacy Concerns in Whole Body Imaging: A Few Questions&lt;br /&gt;Security versus Privacy...it is a question that the world is facing today when it comes to using the Whole Body Imaging technology to screen a traveller visually in airports and other places. By giving real life examples from different parts of the world Elonnai Hickok points out that even if the Government of India eventually decides to advocate the tight security measures with some restrictions then such measures need to balanced against concerns raised for personal freedom. She further argues that privacy is not just data protection but something which must be viewed holistically and contextually when assessing new policies.&lt;a href="http://bit.ly/9rvQPt" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9rvQPt&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;American Bar Association Online Privacy Conference: A Report&lt;br /&gt;On 10 November 2010, I attended an American Bar Association online conference on 'Regulating Privacy Across Borders in the Digital Age: An Emerging Global Consensus or Vive la Difference'. The panelists addressed many important global privacy challenges and spoke about the changes the EU directive is looking to take.  &lt;a href="http://bit.ly/dy41zc" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dy41zc&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;3G Life&lt;br /&gt;You can video chat, stream music and watch TV on your phone. Offering high-speed internet access, 3G would change the world of mobile computing. Nishant Shah's article was published in the Indian Express on 14 November 2010.&lt;a href="http://bit.ly/gyxaW2" target="_blank"&gt;&lt;br /&gt;http://bit.ly/gyxaW2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Ideology and ICT Policies&lt;br /&gt;For better policies, decision-makers need to know their own and others’ biases, and consider what others are doing, writes Shyam Ponappa in an article published in the Business Standard on 4 November 2010. &lt;a href="http://bit.ly/dbl3Ai" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dbl3Ai&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Looking forward to your feedback. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2010-bulletin'&gt;https://cis-india.org/about/newsletters/november-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-08-07T11:46:10Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-new-billion">
    <title>The internet’s new billion</title>
    <link>https://cis-india.org/news/internet-new-billion</link>
    <description>
        &lt;b&gt;New web users — in countries like Brazil and China — are changing the culture of the internet.&lt;/b&gt;
        
&lt;p&gt;The harried mother had little wish to visit an internet cafe with two squirmy boys in tow, but she said there was no choice.&lt;/p&gt;
&lt;p&gt;New to this potholed neighborhood on the city’s northern edge, Fabina da Silva, 31, needed to enroll her sons in school. Registering online was the only way.&lt;/p&gt;
&lt;p&gt;“If it wasn’t a necessity, I wouldn’t be here,” da Silva said on a recent afternoon as her 6-year-old, Lucas, thumped his toy Sponge Bob on the mouse pad beside her. “Nowadays, internet in Brazil is a necessity.”&lt;/p&gt;
&lt;p&gt;Brazil has long been a bellwether nation for emerging-market internet trends and it’s riding a wave that will soon sweep the globe. The newest billion people to venture online are doing so in developing countries rather than North America or Europe.&lt;/p&gt;
&lt;p&gt;And whether those newcomers are getting online for fun or because they must, they’re doing so en masse. For businesses nimble enough to serve markets as diverse as Brazil, Russia, India, China and Indonesia, the shift promises a staggering number of new customers.&lt;/p&gt;
&lt;p&gt;But internet trend-watchers say there’s more at stake than the emergence of a worldwide class of digital consumers. The new users are changing the culture of the internet itself. Researchers say the web as it was originally, if idealistically, conceived — a largely free, monolingual space where a shared digital culture prevailed — may soon be a distant memory. And it’s happening remarkably fast.&lt;/p&gt;
&lt;p&gt;“Potentially explosive” is how Marcos Aguiar describes the growth. He’s a senior partner at the Boston Consulting Group’s Sao Paulo office who co-authored a report released in September called “The Internet’s New Billion.” It concludes the number of web users in developing-world “BRICI” countries — Brazil, Russia, India, China and Indonesia — will jump from 610 million this year to 1.2 billion by 2015.&lt;/p&gt;
&lt;p&gt;When the internet crossed the billion-user threshold just five years ago, the developed world commanded a 60-40 majority online, according to the United Nations’ International Telecommunications Union. Today, that proportion has roughly reversed.&lt;/p&gt;
&lt;p&gt;The new users are younger, poorer and more numerous than ever before, BCG’s analysts said, and increasing numbers will need web access and won't be able to afford broadband in their living room.&lt;/p&gt;
&lt;p&gt;As Fabina da Silva pecked away on a keyboard to register her sons for school, she was in many ways typical of low-income Brazilian users. Those who don’t have web access at home often pay small fees to use ad hoc cybercafes known here as “LAN houses.” Many began as rooms full of connected computers, or local area networks, for multi-player gaming, but their customer base has since broadened.&lt;/p&gt;
&lt;p&gt;In India, those following the trend say a huge portion of the new billion will enter the web via mobile devices.&lt;/p&gt;
&lt;p&gt;“If you look at our broadband figures in India, it’s quite pathetic,” said Sunil Abraham, director of the Centre for Internet and Society, a think tank in Bangalore. “And less than 1 percent of the population has ever accessed the internet.”&lt;/p&gt;
&lt;p&gt;But recently, many Indian telecommunication firms have begun giving out free data plans with their mobile devices — a move Sunil said will instantly send millions of Indians onto the internet. “The moment an end user acquires a smart phone they become a data user because they’re not paying for it,” he said. “But they’re not coming onto the internet like you and I know.”&lt;/p&gt;
&lt;p&gt;Instead, phone companies only provide access to a few sites, such as Wikipedia and Facebook Zero, a stripped-down mobile version of the social networking site that omits photos but allows messaging and status updates. “They’re coming onto a network that, from the beginning, is a complete walled garden,” he said.&lt;/p&gt;
&lt;p&gt;The new walls dividing regions of the internet aren’t likely to stop there. Even as more users join the web worldwide, they are increasingly separated by language. What the nearly 400 million users in China experience as the internet is vastly different than the web surfed by Americans. Much of the software and websites on the Chinese web are produced domestically in the local language. That’s also how it works in Russia and Indonesia.&lt;/p&gt;
&lt;p&gt;Some observers say this difference has political consequences. “Many of the local companies provide far better service than the likes of Google and Facebook in those markets,” said Evgeny Morozov, a digital technology researcher at Stanford University. “But also those local websites are much easier to censor because the corporate entities behind those sites all have some domestic presence.”&lt;/p&gt;
&lt;p&gt;Morozov is author of an up-coming book “The Net Delusion: The Dark Side of Internet Freedom,” and he said there’s a dark side to be found in the internet’s new billion, too. Because poorer users resort to more centralized methods for getting online — cybercafes, cell-phone towers — their activity will be much easier to monitor.&lt;/p&gt;
&lt;p&gt;“The fact that so much of this is happening in cybercafes and mobile devices actually empowers the government because those two things are much easier to control than a desktop computer in your house,” Morozov said.&lt;/p&gt;
&lt;p&gt;Morozov is also skeptical of notions that greater diversity of cultures online will lead to more cultural dialogue. “There is very little interaction between communities and it’s not because the tools are lacking. It’s just that modern-day Indians and modern-day Russians have nothing to talk about most of the time,” he said. “There may simply be no demand for joining that global village.”&lt;/p&gt;
&lt;p&gt;More optimistic web scholars argue there will be cultural conversations, but bridging the gaps between communities will take effort. “The internet has become a bunch of interlinked but linguistically distinct and culturally specific spaces,” said Ethan Zuckerman, a senior researcher at Harvard University’s Berkman Center for Internet and Society. “There’s some interface between them but there’s a lot less than there was years back when we were sort of pretending that this was one great global space.”&lt;/p&gt;
&lt;p&gt;Instead of becoming the world’s biggest tool for cultural exchange, Zuckerman said the web could become its principal medium for mutual misunderstanding. “We’re mostly talking to people like ourselves rather than talking across cultural boundaries,” Zuckerman said. “And when we do cross cultural boundaries, it’s often in a way where we’re overhearing something that really pisses us off.”&lt;/p&gt;
&lt;p&gt;Take for example the 2005 scandal after a Danish newspaper posted cartoons depicting the prophet Mohammed, sparking riots across the Muslim world. Zuckerman said such incidents may become routine. “It’s a problem of unseen audiences,” he said. “We always have to be aware there are other audiences out there listening, and they’re particularly listening for mentions of themselves.”&lt;/p&gt;
&lt;p&gt;For a more amusing and recent online snafu, Zuckerman prefers citing a topic that went viral on the micro-blogging site Twitter this summer. The topic, the Brazilian Portuguese phrase “Cala boca, Galvao,” was mysterious to many English-speaking users. Asked to explain, a few mischievous Brazilians claimed the Galvao was a rare Amazon bird being slaughtered to extinction for its colorful feathers. For everyone who re-tweeted the phrase, so the pranksters claimed, 10 cents would be donated to a global effort to save the bird.&lt;/p&gt;
&lt;p&gt;The encouragement helped catapult the phrase into the ranks of Twitter’s top-trending topics, or most-repeated phrases worldwide last June. But in reality, Galvao was the first name of Galvao Bueno, a Brazilian sports commentator on the Globo network, whose pronouncements during the World Cup had irritated many of his compatriots. In Brazilian Portuguese, “Cala boca” roughly means, “shut up.”&lt;/p&gt;
&lt;p&gt;“There’s an entirely different conversation going on that’s so incomprehensible to Americans that the Brazilians make fun of us when we try to understand,” Zuckerman said. “In many ways that sort of characterizes for me what’s going on with the contemporary ‘net.'”&lt;/p&gt;
&lt;p&gt;But Zuckerman still believes virtual borders can be crossed. In 2005, he co-founded Global Voices, an aggregator and translator of blogs from around the world, in part to help the next billion web users communicate.&lt;/p&gt;
&lt;p&gt;“These billion users are sort of proxy for the global middle class,” he said. “They’re an increasing economic force, an increasing cultural force, and they are the people we need to negotiate with and have a conversation with if we want to address problems like climate change.”&lt;/p&gt;
&lt;p&gt;In the run-down Engenho da Rainha neighborhood in Rio de Janeiro, some of the LAN house customers seemed more interested in using the web to play games than solve the world’s problems.&lt;/p&gt;
&lt;p&gt;One wiry teen in a blue baseball cap barely glanced away from his screen to answer questions. “I’ll spend all day, all night on the internet if I’m allowed,” said Carlos Wallace Cruz, 16. “I’d say I’m 98 percent addicted.”&lt;/p&gt;
&lt;p&gt;Cruz’s drug of choice isn’t likely to ring a bell with Americans his age. It’s a video game available only on Orkut, a Google social networking site, wildly popular in Brazil and India but less so in the United States.&lt;/p&gt;
&lt;p&gt;When a visitor asked if he ever spent time on Orkut’s much more famous rival site, Cruz responded with earnest puzzlement.&lt;/p&gt;
&lt;p&gt;“What’s Facebook?” he asked.&lt;/p&gt;
&lt;p&gt;Read the original in the &lt;a class="external-link" href="http://www.globalpost.com/dispatch/brazil/101112/internet-growth-web-traffic"&gt;Global Post&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-new-billion'&gt;https://cis-india.org/news/internet-new-billion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T07:31:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing">
    <title>Privacy, Free/Open Source, and the Cloud </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing</link>
    <description>
        &lt;b&gt;A look into the questions that arise in concern to privacy and cloud computing, and how open source plays into the picture. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;Cloud computing, in basic terms,&amp;nbsp; is internet-based computing where shared resources and services are taken from the primary infrastructure of the internet and provided on demand. Cloud computing creates a shared network between major corporations like Google, Microsoft, Amazon and Yahoo. In this way, cloud systems are related to grid computing systems/service- oriented architectures, and create the potential for the entire I.T. infrastructure to be programmable. Because of this, cloud computing establishes a new consumption and delivery standard for IT services based on the internet. It is a new consumption and delivery model, because it is made up of services delivered through common centers and built on servers which act as a point of access for the computing needs of consumers.&amp;nbsp; The access points facilitate the tailoring and delivering of targeted applications and services to consumers.&amp;nbsp; Details are taken from the users, who no longer need to have an understanding of, or control over the technology infrastructure in the cloud that supports their desired application.&lt;/p&gt;
&lt;p&gt;There are both corporate and consumer implications for such a system. For example, according cloud computing lowers the barriers to entry for corporations and new services. It also enables innovative enterprise in locations where there is an insufficient supply of human or other resources through the provision of inexpensive hardware, software, and applications. The consumer, in turn, is provided with information that he or she is projected to be interested in based on information he or she has already “consumed.”&amp;nbsp; Thus, for example: Google has the ability to monitor a person’s consuming habits through searches and to reduce those habits to a pattern which selects applications to display – and consumption of those reinforces the pattern.&lt;/p&gt;
&lt;h3&gt;Privacy Concerns:&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Though cloud computing can be a useful tool for&amp;nbsp; consumers, corporations, and countries, cloud computing poses significant privacy concerns for all actors involved. For the consumer, a major concern is that future business models may rely on the use of personal data from consumers of cloud services for advertising or behavioral targeting. This concern brings to light the fundamental problem of cloud computing which is that consumers consent to the secondary use of their personal data only when they are signing up for services, and that “consent” is almost automatically generated. How can the cloud assure users that their private data will be properly protected? It is true that high levels of encryption can be (and are) used, and that many companies also take other precautionary measures, but protective measures vary, and the secondary sources that gain access to information may not protect it as well as the initial source.&amp;nbsp; Moreover, even strong protection measures are vulnerable to hackers. As well, what happens if a jurisdiction, like the Indian government, gains access to information about a foreign national?&amp;nbsp;&amp;nbsp; India still does not have a comprehensive data protection law, nor does it have many forms of redress for violations of privacy. How is that individuals information protected?&lt;/p&gt;
&lt;p&gt;These questions give rise to other privacy concerns with respect to the data that is circulated and stored on the cloud, which are the questions of territory, sovereignty, and regulation. Many of these were brought up at the Internet Governance Forum, which took place on the 16th of September including: Which jurisdiction has authority in cases of dispute or digital crime? If you lose data or your data is damaged, stolen, or manipulated, where do you go? Is the violation enforced under local laws, and, if so, under the law of the violator or the law of the violated?&amp;nbsp; If international law, who can access the tribunals, and which tribunals have this jurisdiction?&amp;nbsp; What if a person's data is replicated in two data centres in two different countries? &amp;nbsp;Are the data subject to scrutiny by the officials of all three?&amp;nbsp; Is there a remedy against abuse by any of them?&amp;nbsp; Does it matter whether the country in which the data centre resides does not require a warrant for government access?&amp;nbsp; And how will a consumer know any of that up front?&amp;nbsp; As a corollary, if content is being sent to one country but resides on a data centre in another country, whose data protection standards apply?&amp;nbsp; For example, certain governments in Europe require data retention for limited amount of time for purposes for law enforcement, but other countries may allow retention of data for shorter or longer periods of time.&lt;/p&gt;
&lt;h3&gt;How are privacy, free/open source, and the cloud related ?&lt;/h3&gt;
&lt;p&gt;Eben Moglen, a professor from Columbia law school, and founder and chairman of the Software Freedom Law Center who spoke on cloud computing, privacy, and free/open software at the Indian Institute for science on Thursday September 25, had another solution to the privacy concerns that arise out of the cloud. His lecture explains how the internet has moved from a tool that once promoted equality between people – no servants and no masters – to a tool that reinforces social hierarchies. The reinforcement of these hierarchies is directly related to the language used and communication facilitated between the computer and the individual.&amp;nbsp; Professor Moglen describes how initially, when computers were first introduced to the public, humans spoke directly to computers, and computers responded directly to humans. This open, two-way communication changed when Microsoft, Apple, and IBM removed the language between humans and computers and created proprietary software based on a server-client computing relationship. By removing the language between humans and computers, these corporations dis-empowered individuals. Professor Moglen used this as a springboard to address the privacy concerns that come up in cloud computing. Privacy at its base is the ability of an individual to control access to various aspects of self, such as decisional, informational, and locational. In having the ability to control these factors, privacy consists of a relation between a person and another person or an entity. Professor Moglen postulated that free/open access to code would make the internet an environment where choices over that relationship were still in the hands of an individual, and, among other protections, the individuals could build up their desired levels of privacy.&lt;/p&gt;
&lt;h3&gt;Is free/open software the solution?&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Eben Moglen's solution to the many privacy concerns that arise out of cloud computing is the application and use of free software/open source by individuals.&amp;nbsp; Unlike some applications on the cloud, open source is free, and once an individual has access to the code, that person can control how a program functions, including how a program uses personal information, and thus the person would be able to protect their privacy. Of course, this presumes that the consumer of the internet is sophisticated enough to access and manipulate code.&amp;nbsp; But even putting that presumption aside, is the ability to write code enough to protect data (will help you protect data better – add more security)?&amp;nbsp; Perhaps if a person could create his own server and bypass the cloud, but this does not seem like an ideal (or practical) solution. Though free/open source is an important element that should be incorporated into cloud computing, free/open source depends on open standards.&amp;nbsp;According to Pranesh Prakash, in his presentation at the Internet Governance Forum, the role of standards in ensuring interoperability is critical to allowing consumers to choose between different devices to access the cloud, to choose between different software clients, and to shift between one service and another. This would include moving information, both the data and the metadata, from one cloud to another. Clouds would need to be able to talk to one another to enable data sharing, and open source is key to this, though it is important to note that if one uses free/open source, they must set up their own infrastructure.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Even though Moglen believes that free/open source software brings freedom and provides the solution to protect an individual’s privacy in the context of cloud computing, he was not speaking to the specific context of India. To do that, it is important to expand the definitions that one uses of free/open source and privacy, and then to contextualize them.&amp;nbsp; Looking closely at the words “free/open source,” they are not limited to access to a software's code, even though that is free/open source’s base.&amp;nbsp; For the ideology of free/open source to work, access to code is just a key to the puzzle. A person, community, culture and state must understand the purpose of free/open source, know how to use it,&amp;nbsp; and know how it can be applied in order for it to be transformative, liberating, and protective. There needs to be a shared understanding that free/open source is&amp;nbsp; not just about being able to change code, but about a shared commitment to sharing code and making it transparent and accessible. In the United States and other countries,&amp;nbsp; free/open source did not just enter into American society and immediately fix issues of&amp;nbsp; privacy by bringing freedom, as it seems Professor Moglen is suggesting free/open source will do in India.&amp;nbsp;&amp;nbsp;&amp;nbsp; Though Professor Moglen promises freedom and privacy protection through free/open source, perhaps this is not an honest appraisal of the technology.&amp;nbsp; Free/open source, if not equally accessed or misapplied, protects neither freedom nor privacy.&amp;nbsp; As noted above, even if a person has access to code, he can protect data only to a certain extent.&amp;nbsp; Thus, he might think that he has created a privacy wall around information that actually is readily accessible.&amp;nbsp; In other words, free/open source cannot be the only answer to freedom, but instead a piece to a collective answer.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:50:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/doc-2.0">
    <title>DOC 2.0:  A Resources Sharing Mela by NGO Documentation Centres</title>
    <link>https://cis-india.org/news/doc-2.0</link>
    <description>
        &lt;b&gt;A Resource Sharing Mela and Meet of DCM (Document Centres Meet) at the Centre for Education &amp; Documentation in Domlur, Bangalore.
 &lt;/b&gt;
        
&lt;h2&gt;Programme&lt;/h2&gt;
&lt;p&gt;18th Nov: 9.30 am to 20th Nov. 2 pm&lt;/p&gt;
&lt;p&gt;Draft 3 ( to be finalised )&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;div align="left"&gt;&lt;strong&gt;For DCMers&lt;/strong&gt;&lt;br /&gt;9.30 pm to 12 noon&lt;br /&gt;
&amp;nbsp;&amp;nbsp; CED Terrace&lt;/div&gt;
&amp;nbsp;
&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;div align="left"&gt;&amp;nbsp;&lt;/div&gt;
&lt;strong&gt;Interaction&lt;/strong&gt;&lt;br /&gt;2&amp;nbsp; pm to 4 pm&lt;br /&gt;CED Exhibition Hall&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="left"&gt;&lt;strong&gt;Public Session&lt;/strong&gt;&lt;br /&gt;5 pm to 7 pm&lt;br /&gt;CED Terrace&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;18th Nov.&lt;/td&gt;
&lt;td&gt;Multi-Media/New Media. AVs, Photos, Internet - blogs&lt;/td&gt;
&lt;td&gt;Managing Data&lt;br /&gt;&lt;br /&gt;Akshara Class.; Mapping Data: Timbaktu experience- Anne Marie.&lt;/td&gt;
&lt;td&gt;Knowledge in an Internet Era: Role of DCs in Info-digital Society: Avinash Jha -&amp;nbsp; KICS Sharing Session: Chair: Ashish Rajadhaksha&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19th Nov.&lt;/td&gt;
&lt;td&gt;Print Media&lt;br /&gt;&lt;br /&gt;Training Manuals, Newsletters, Posters etc&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Producing Data:&lt;br /&gt;&lt;br /&gt;Data generation tools used by Aalochana in PC4D, Jagori safety audit&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Internet : Reclaiming Civil society on the Internet. Public domain V/s copyright: Sunil Abraham:&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20th Nov.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Interactive Media:&lt;br /&gt;Theatre, Melas?; Yuvati Mela:&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Dissemination&lt;br /&gt;Marketing issues: Alvito; Mobile Libraries (Aalochana)&lt;/td&gt;
&lt;td&gt;Ends&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Workshop Banner&lt;/h2&gt;
&lt;img src="https://cis-india.org/home-images/bannerdoc20small.png/image_preview" title="DOC2.0" height="202" width="730" alt="DOC2.0" class="image-inline image-inline" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
See the original &lt;a class="external-link" href="http://ced.org.in/dcm/index.php?option=com_content&amp;amp;view=category&amp;amp;layout=blog&amp;amp;id=2&amp;amp;Itemid=5"&gt;here&lt;/a&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/doc-2.0'&gt;https://cis-india.org/news/doc-2.0&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T08:13:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/identity-crisis">
    <title>Crisis for identity or identity crisis?</title>
    <link>https://cis-india.org/news/identity-crisis</link>
    <description>
        &lt;b&gt;The hurry with which the government is pushing its most ambitious project to assign a number (UID) to every citizen without any feasibility study or public debate has raised many questions.




&lt;/b&gt;
        
&lt;p&gt;“It will empower all”, declared Prime Minister Manmohan Singh when he issued the first UID card to a villager from Tembhli village in Maharashtra. But as days pass and relevant issues come for public discourse, many people have begun to doubt prime minister’s assurance.&lt;/p&gt;
&lt;p&gt;Unique identification number (UID), named Aadhaar is a 12 digit identification number that the government plans to issue to all citizens that will not only be an identity card but will also serve multiple purposes for its holder.&lt;/p&gt;
&lt;p&gt;Infosys co-founder Nandan Nilekani has been assigned the responsibility to execute this proposal as Chairman of the Unique Identification Authority of India (UIDAI). Mr Nilekani leads a team of 120 people having the task of assigning unique identities to 1.2 billion people. He plans to take Aadhaar beyond being just a 12-digit identification number for every Indian. This ambitious and mammoth project is pitched to handle projects as diverse as a national-highway toll-collection system, a technology backbone for the forthcoming Goods and Services Tax (GST) and reform of the vast public distribution system (PDS) for subsidized foodgrains.&lt;/p&gt;
&lt;p&gt;Government plans to cover 60 per cent of the nation’s population under this project in the next three years starting October this year. This project is intended to collect identification data about all residents in the country. It is said that it will impact the PDS and NREGA programmes, and plug leakages and save the government large sums of money.&lt;/p&gt;
&lt;p&gt;But the UID will not replace ration cards and passports, and is not mandatory as of now. No questions would be asked related to language, caste or religion of the person applying for UID.&lt;/p&gt;
&lt;p&gt;The UID number is linked to the fingerprints and the pattern of the eyes of the person assigned that number. This inimitable biometric data ensures that any given number is linked to only one person. So there is hardly a chance of any misgiving or stealing of rations and wages from the holder. It is believed that soon banks, insurance companies, cell phone providers and hospitals will demand UID number before doing business with you.&lt;/p&gt;
&lt;p&gt;In short, in the future our name, address, bank account numbers, personal information and identity as a whole will be solely linked and governed by those 12 digit number we hold.&lt;/p&gt;
&lt;div class="pullquote"&gt;Critics say that there has been no feasible study conducted about UID project, neither has there been a cost benefit analysis done. To add to it, there are serious concerns about data and identity theft.&lt;/div&gt;
&lt;p&gt;But apart from the buzz about this new project, there is an air of suspicion surrounding it too.&lt;/p&gt;
&lt;p&gt;The launch of the UID has led to a flurry of debate amongst policy-makers, legal experts and civil society at large. In response, Mr Nilekani claims the UID to be “a foolproof project implemented at a low cost”.&lt;/p&gt;
&lt;p&gt;However, some critical issues remain unanswered.&lt;/p&gt;
&lt;p&gt;One of the major objections about UID is that there has been no feasible study conducted, neither has there been a cost benefit analysis done. There is no project document as such.&lt;/p&gt;
&lt;p&gt;To add to it, there are serious concerns about data and identity theft.&lt;/p&gt;
&lt;p&gt;In a world where cyber terrorism is the new threat, and the countries are gearing themselves to protect against such a threat, projects like UID come as an open invitation to terrorist outfits to infiltrate their defences.&lt;/p&gt;
&lt;div&gt;The UID number is linked to fingerprints and the patterns of the holder’s eye. But medical studies show that our eye's iris patterns can change due to aging, disease or malnourishment. More over the government has no alternative option for many millions who fall outside this pattern of identification owing to callused hands, corneal scars and cataract induced by malnourishment. Even as enrollment is poised to begin, authentication is still an unstudied field. Fake fingerprints can very easily be made. Hence, the unique element of these numbers can be tampered.&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;&lt;span class="Apple-style-span"&gt;Recently, Sunil Abraham, Director, Centre for Internet and Society has remarked, “If I leave my fingerprints around, my identity can be stolen and transactions done on my behalf. They could use that number, to share information about anybody.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;A cyber-criminal having access to any person’s identification number can virtually control that person. Telephone numbers, addresses, family history can all be tracked down. Bank accounts can be manipulated and transactions done without the person knowing. Since these days, a lot of money transactions are done through internet, a cyber criminal can easily steal few UID numbers and impersonate those persons to manipulate the bank or credit card accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;In an even uglier scenario, where people might be tracked and judged by their numbers, a criminal’s fingerprints left behind on a scene of crime can be mixed with some one else through a slight manipulation and exchange of UID numbers, making an entirely innocent person a suspect in the eyes of law. Some incompetent or revengeful government officials can also frame innocents for a crime one never committed.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Human rights activists claim that a tech-savvy person can hack into the system and gain any person’s information from the servers unless the government tightens the defenses. A reminiscence of the Bruce Willis starrer Hollywood blockbuster Die Hard 4, a bunch of techno geeks operating from trailer truck hold the entire United States hostage as they hack into every main frame computing network from transportation, communication, power, defence and individual accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The number can also be used for real time tracking, profiling, mounting surveillance and ‘convergence’ of information. Apart from the concerns about identity theft, the number can also invade our private space. If in the future insurance companies and hospitals merge their databases, the insurance companies can increase premium, or simply refuse insurance cover to a person who is not keeping well.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Poor labourers and immigrants who are on the move in search of work could also be the victims of the ‘Aadhaar’. In future, in case of card being lost or misplaced, poor labour would be threatened with financial and welfare exclusion. Where being a legal resident is to be closely tied in with having a UID number, it could render the poor vulnerable to exclusion and expulsion by exploitative employers and others.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="pullquote"&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Though Mr Nilekani claims that UID would be a cost effective project, however deeper analysis throws a different story. It is reported that the UIDAI project will cost Rs 45,000 crores to the exchequer in the next 4 years. This does not seem to include the costs that will be incurred by Registrars, Enrollers, additional costs on the PDS system to connect it to the UID, the estimated cost to the end user and to the number holder.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Defending himself from the flurry of queries, Mr Nilekani has stressed that the identification number is not mandatory for everyone and only those interested can enroll. The project aims to first enroll the poor and uneducated masses promising them better wages and ration schemes. As was reported, the first villager to get the UID card was ‘happy but did not know its benefits’. Critics allege that the reason why Aadhaar is selling itself to millions of poor in the country is to create a foundation of legitimacy to deflect concerns over its possible misuse, unsafe technology and huge costs. Later, with a larger foundation, the UID can be enforced upon all citizens in the near future as the apex identity proof, making everyone vulnerable to several risks described above.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;The UIDAI project has proceeded so far without any legal authorization. There has been no feasibility study or cost-benefit analysis preceding the setting up of such a pervasive project. All calculations are of the back-of-the envelope variety. Data theft is a very serious threat to every individual and the country as a whole. There are deeply disconcerting facts about the project that should make even a die-hard UID supporter worry about its long term implications.&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;em&gt;This article has been written by Sushant Sharma. He is a college fresher and avid reader.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The decision came after about 15,000 citizens had already been enrolled and given their numbers. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/p&gt;
&lt;p&gt;The UK system like the Indian UID had also started with much fanfare, claiming to save nearly 900 million pounds for the taxpayers. While the project was axed, UK’s Home Secretary Theresa May stated - “It (the identity card project) is intrusive and bullying, ineffective and expensive. It is an assault on individual liberty that does not promise a great good.”&lt;/p&gt;
&lt;p&gt;The same logic implies to the India as well. But instead of scraping this over-hyped-failure-in-the-making project, our Prime Minister claims the UID project “will empower all”. But will it actually? That is for us to decide now.&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read the original article &lt;a class="external-link" href="http://www.d-sector.org/article-det.asp?id=1396"&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/identity-crisis'&gt;https://cis-india.org/news/identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T08:16:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/october-2010-bulletin">
    <title>October 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/october-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Internet, szabadon&lt;br /&gt;A polgárjogi aktivisták konfrontálódtak és panaszkodtak, a Google és a Facebook hárított és panaszkodott az Internet at Liberty konferencián, amelyet kedden és szerdán rendezett a Google és a CEU Budapesten.&lt;a href="http://bit.ly/dwNhRw"&gt;&lt;br /&gt;http://bit.ly/dwNhRw&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Hogyan szűrik a kormányok az internetes tartalmakat?&lt;br /&gt;Az internet szabadságáról tartanak háromnapos konferenciát Budapesten a Google és a Közép-Európai Egyetem (CEU) szervezésében. Kedden az internetes tartalmak szűrése volt a legfontosabb téma a rendezvényen.&lt;a href="http://bit.ly/aFApER"&gt;&lt;br /&gt;http://bit.ly/aFApER&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Konferencia az internetes szólásszabadságról Budapesten&lt;br /&gt;Az internet és szólásszabadság viszonyát vitatják meg Budapesten, a Közép-Európai Egyetem és a Google szervezte, háromnapos konferencián&lt;a href="http://bit.ly/9evwE4"&gt;&lt;br /&gt;http://bit.ly/9evwE4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;How the UID project can be a cause for concern&lt;br /&gt;The Unique Identification Authority of India (UIDAI), headed by Nandan Nilekani, is the UPA government's most ambitious project, where one billion Indians are branded with a unique identity number.&lt;a href="http://bit.ly/bl7INY"&gt;&lt;br /&gt;http://bit.ly/bl7INY&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;In new Facebook features, a comeback for community&lt;br /&gt;Nearly 750 tweets bombard the web every second. Internet traffic is growing by 40 per cent a year. People post 2.5 billion photos on Facebook every month. Every minute, 24 hours of video is uploaded on YouTube. But who owns all that data? Until now, big business was in complete control and used the data to monetise operations. But all that is set to change. With Facebook launching two new features, ‘Groups' and a ‘Download your information,' the community is making a comeback.&lt;a href="http://bit.ly/arEi4V"&gt;&lt;br /&gt;http://bit.ly/arEi4V&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Stiff Resistance Dogs India's ID Plan &lt;br /&gt;An article about the UID project by Indrajit Basu in Asia Times Online.&lt;a href="http://bit.ly/bMcOSs"&gt;&lt;br /&gt;http://bit.ly/bMcOSs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Data Activism and Grassroots Empowerment in India&lt;br /&gt;Glover Wright of the Center for Internet and Society talks about Data Activism and Grassroots Empowerment in India at the Innovate/Activate Unconference in New York Law School on 24 September 2010.&lt;a href="http://bit.ly/alnjsn"&gt;&lt;br /&gt;http://bit.ly/alnjsn&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Enabling Access to Education through ICT&lt;br /&gt;ICT workshop in Delhi....Registrations open! &lt;a href="http://bit.ly/9flyEK"&gt;&lt;br /&gt;http://bit.ly/9flyEK&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Network Culture: Archaeological and Artistic Interventions Public Seminar – Talk by Kristoffer Gansing and Linda Hilfing&lt;br /&gt;Kristoffer Gansing and Linda Hilfling will give a talk on Network Culture on 8 November 2010 in the Centre for Internet and Society, Bangalore.&lt;a href="http://bit.ly/cEmOZw"&gt;&lt;br /&gt;http://bit.ly/cEmOZw&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;City in the Internet 1: Geography Imagined (Part 1) &lt;br /&gt;“The estuaries that flirt with the land mass before they finally perish in the vast deep blue ocean beyond were perfect in their shape and grace. And you know what; from top it appears like a surreal landscape that is so restive and peaceful, almost heaven. The countryside is actually very beautiful”, says Pratyush Shankar in his latest blog post. A random conversation between two persons discovering the joys of seeing our existence through Google Earth!&lt;a href="http://bit.ly/9klUn1"&gt;&lt;br /&gt;http://bit.ly/9klUn1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;A Digital Native coordinating Digital Natives&lt;br /&gt;Samuel Tettner, joined CIS as a Research Coordinator for the Digital Natives project. He has written a blog entry about his experiences in the project.&lt;a href="http://bit.ly/cpJMQq"&gt;&lt;br /&gt;http://bit.ly/cpJMQq&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;You Are Here&lt;br /&gt;Geo-tagging applications are creating new and impromptu communities of true, says Nishant Shah in his column on Digital Natives in the Indian Express.&lt;a href="http://bit.ly/a64kj7"&gt;&lt;br /&gt;http://bit.ly/a64kj7&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;નિશાંત શાહ: ડિજિટલ પેઢીનો ઉદય&lt;br /&gt;‘ડિજિટલ નાગરિક’ તેમને કહેવામાં આવે છે જેણે સામાન્ય જનજીવનમાં ડિજિટલ ટેક્નોલોજીના પ્રવેશ થઈ ગયા બાદ જન્મ લીધો છે. ડિજિટલ નાગરિકો દરેક જગ્યાએ છે. હવે સમય આવી ગયો છે કે આપણે એ જાણવાનો પ્રયાસ કરીએ કે આ લોકો કોણ છે, તેઓ શું કરી રહ્યા છે, તેઓ પોતાના અંગે શું વિચારે છે અને કેવી રીતે તેઓ કશું પણ જાણ્યા વગર આપણા ભવિષ્યને નવો આકાર આપવાનું કામ કરી રહ્યા છે. (A column by Nishant Shah in the Gujarati newspaper Divya Bhaskar)&lt;a href="http://bit.ly/9HnyBa"&gt;&lt;br /&gt;http://bit.ly/9HnyBa&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Digital Natives with a Cause?— Workshop in South Africa—FAQs&lt;br /&gt;The second international Digital Natives Workshop "My Bubble, My Space, My Voice" will be held in Johannesburg from 7 to 9 November 2010. Some frequently asked questions regarding the upcoming workshop are answered in this blog entry.&lt;a href="http://bit.ly/c1XJHO"&gt;&lt;br /&gt;http://bit.ly/c1XJHO&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The silent rise of the Digital Native&lt;br /&gt;In late August, this year, the world shook for many when they went online (on their computers, PDAs, iPads, laptops) and realised that the comfortable zone of talking, chatting, sharing and doing just about everything else, had suddenly, without a warning, changed overnight (or afternoon, or morning, depending upon the time-zone they lived in). With a single change in its privacy and location settings, Facebook, home to billions of internet hours consisting of relationships, friendships, professional networks, social gaming, entertainment trivia, memories and exchanges, allowed its users to geo-tag themselves when on-the-move.&lt;a href="http://bit.ly/bHY72Y"&gt;&lt;br /&gt;http://bit.ly/bHY72Y&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The geek shall inherit the earth&lt;br /&gt;Demystifying the mysterious -agents changing the world around you...A column on Digital Natives by Nishant Shah in the Indian Express.&lt;a href="http://bit.ly/aq2BqY"&gt;&lt;br /&gt;http://bit.ly/aq2BqY&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Digital Natives Workshop in South Africa - Call for Participation&lt;br /&gt;The African Commons Project, Hivos and the Centre for Internet and Society have joined hands for organising the second international workshop "My Bubble, My Space, My Voice" in Johannesburg from 07 to 09 November 2010. Send in your applications now!&lt;a href="http://bit.ly/d0rl7E"&gt;&lt;br /&gt;http://bit.ly/d0rl7E&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Broad-basing Broadband&lt;br /&gt;Education and training through the Internet need Commonwealth Games-like crisis management, says Shyam Ponappa in an article on broadband for education and training published in the Business Standard on 7 October 2010.&lt;a href="http://bit.ly/dnMtpU"&gt;&lt;br /&gt;http://bit.ly/dnMtpU&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/october-2010-bulletin'&gt;https://cis-india.org/about/newsletters/october-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-07T12:02:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-szabadon">
    <title>Internet, szabadon</title>
    <link>https://cis-india.org/news/internet-szabadon</link>
    <description>
        &lt;b&gt;A polgárjogi aktivisták konfrontálódtak és panaszkodtak, a Google és a Facebook hárított és panaszkodott az Internet at Liberty konferencián, amelyet kedden és szerdán rendezett a Google és a CEU Budapesten.&lt;/b&gt;
        
&lt;p&gt;– Célunk a szabad, nyílt és biztonságos internet. A Google igyekszik maximalizálni az információhoz való szabad hozzáférést, bár néha hibázunk. Útelágazáshoz érkeztünk, valószínű, hogy az internet korlátozottabb lesz, és a felhasználókat megfosztják hatalmuktól. 2002-ben még csak négy, 2010-ben már 40 ország – köztük Irán, Törökország, Oroszország és Kína – kormánya blokkol tartalmat a neten. Azon vannak, hogy kiépítésék saját, államilag támogatott és feltehetően cenzúrázott keresőiket. A Google célja, hogy a net szabad maradjon – röviden ezt mondta David Google Drummond, a Google jogi igazgatója, egyben a Google egyik alelnöke a Google és a CEU és a Google által szervezett nemzetközi konferencián, az Internet at Liberty 2010-en kedden Budapesten.&lt;br /&gt;&lt;br /&gt;Hát ezért kár volt ilyen messzire jönni.&lt;/p&gt;
&lt;p&gt;De még mielőtt a hallgatóság egy emberként a laptopjába bújt volna, hogy a Farmville-ben bekkelje ki az elkövetkező két napot, szerencsére kiderült, hogy a jelenlévők között akad rengeteg polgárjogi aktivista, netes szabadságharcos és született privacymániás a világ minden részéről. Ők gondoskodtak róla, hogy személyes, országos, sőt globális volumenű panaszaikkal árnyalják a süppedő padlószőnyegből és az erdei gigantposzterből áradó, felelősségteljes corporate derűt.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DavidDrummer.jpg/image_preview" alt="David Drummond, Senior Vice President, Google" class="image-inline image-inline" title="David Drummond, Senior Vice President, Google" /&gt;&lt;/p&gt;
&lt;p&gt;„Az internet önmagában nem változtat meg semmit. Ki kell menni az utcára, és a vérünkkel kell fizetnünk!”; „Legalább mondják meg, mi a szart csinálnak!”; „Tudja maga, milyen rendőrségünk van nekünk Pakisztánban?” - ilyen és ehhez hasonló hozzászólások árnyékolták be a felelősségteljes corporate derűt. Amely a sötét fellegek ellenére egészen kedd estig kitartott; de ne szaladjunk ennyire előre.&lt;/p&gt;
&lt;h3&gt;A jó, a csúf és az illegális&lt;/h3&gt;
&lt;p&gt;Az internetes szólásszabadság története a jó, a csúf és az illegális története, mondta a konferencia első beszélgetésén Rob Faris, a Harvard Berkman internetes központjának kutatási igazgatója és a nyílt internetért ügyködő OpenNet Initiative munkatársa. A legfontosabb feladat Faris szerint eldönteni azt, hol húzódik a határ a csúf, de még törvényes, és az illegális tartalom között. Erre a legjobb példa a netes pornó helyzete az Egyesült Államokban: az USA Legfelsőbb Bírósága kétszer is megsemmisítette a betiltást célzó törvényeket, és most ott tart az ügy, hogy csak az iskolákban és a könyvtárakban elérhetetlen a pornó, egyébként alkotmányos védelmet élvez. Nem úgy, mint Indiában, de ne szaladjunk ennyire előre.&lt;/p&gt;
&lt;p&gt;Faris szerint ugyanakkor világszerte mostanában jelennek meg az internetszabályozás második generációs módszerei, amelyek között ott vannak a szerzői jogi alapon benyújtott eltávolítási kérelmek, sőt az aktivisták és a médiaszájtok ellen intézett kibertámadások is. Az egyes országok kormányai finomítottak szűrési módszereiken, Bahreinben és Jemenben például a választások idején csak speciális szájtokat és információt blokkoltak, Argentína eljutott odáig, hogy néhány éve sikerült a Yahooból elérhetetlenné tennie a Diego Maradonára vonatkozó találatokat. Faris konklúziója: nemzetközi megoldásokra van szükség. De ne szaladjunk ennyire előre.&lt;/p&gt;
&lt;h3&gt;Panaszfal extra&lt;/h3&gt;
&lt;p&gt;Nem kellett sok idő hozzá, hogy a konferencia egyetlen hatalmas panaszfallá változzon, vicces és kevésbé vicces panaszrohamokkal. A kirgiz meghívott, Tattu Mambetalieva elmondta, hogy Kirgizisztánban kevesen neteznek, mert drága. Sunil Abraham, az indiai meghívott elmondta, hogy náluk blokkolják a pornót, különös tekintettel a Savita Bhabhi kalandjait ábrázoló &lt;a class="external-link" href="http://kirtu.com/index.php"&gt;képregénysorozatra&lt;/a&gt; &lt;strong&gt;[Warning: Not safe for work - adult content]&lt;/strong&gt;. Sazad Ahmad, a pakisztáni meghívott elmondta, hogy a náluk a kormány blaszfémiára hivatkozva blokkol, de mindig kiderül, hogy politikai okok állnak a háttérben.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/MadeleineMorris.jpg/image_preview" alt="Madeleine Morris moderál a BBC-től. A Twitteren mad_morris " class="image-inline image-inline" title="Madeleine Morris moderál a BBC-től. A Twitteren mad_morris " /&gt;&lt;/p&gt;
&lt;p align="left"&gt;Egy szíriai aktivista arra panaszkodott, hogy a tunéziai kormány 12 millió dollárért vett a netes forgalom ellenőrzésére szolgáló szervert, és hogy a fejlődő országokban a tartalomszűrésre használt szoftvert nyugatról szerzik be. Egy jemeni aktivista arra panaszkodott, hogy a yemenportal.net-et blokkolja a kormányzat, és hogy a világ semmit nem tud az országban zajló tömegtüntetésekről, nem beszélve a helyi LGBT-közösségéről és a rockegyüttesekről. Tunéziában az a probléma, hogy ha tömegmegmozdulás szerveződik a neten, húszezren feliratkoznak ugyan rá, de csak tízen mennek el. Törökország több száz szájtot blokkol, köztük a YouTube-ot és a Google számos szolgáltatását (Docs, Books, Translate). Azerbajdzsánban két bloggert bebörtönöztek írásaik miatt, és azért nem engedik ki őket, mert nem számítanak újságírónak. A Facebook törli a szoptató anyákról készült képeket, és a Wikipédián az emberi anatómiát taglaló szócikkeket illusztráló fotókat egyre gyakrabban váltják fel rajzok.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/SurfingatLiberty.jpg/image_preview" alt="Surfing at Liberty" class="image-inline image-inline" title="Surfing at Liberty" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;Csodák csodájára a panaszok úgy pattantak le a jelen lévő politikusokról, diplomatákról és üzletemberekről, mint eltévedt golflabda a moha lepte kőkerítésről: a Facebook, a Google és a francia külügyminisztérium jelen lévő képviselői, részben tehát a közvetlen címzettek végig ügyesen hárítottak. Folyamatosan hangoztatták, milyen irtózatosan nehéz dolguk van ebben az egyre globálisabb világban, ahol diktatúrák és demokráciák között kell zsonglőrködniük, mindenkinek a kedvében járniuk, és ők mindent megtesznek ugyan, de hát Kína, ugye. Meg Irán. Főleg Irán. Így aztán nem hozott érdemi vitát a Facebook és a Google közös színpadi szereplése sem, pedig a két cég magas szinten képviseltette magát: a Google-től Drummond, a Facebooktól egyenesen Lord Richard Allan, Hallam bárója, volt brit parlamenti képviselő jött el Budapestre, akivel &lt;a class="external-link" href="http://index.hu/tech/2010/09/22/hogyan_kuzd_a_facebook_a_mellekkel/"&gt;interjút is készítettünk&lt;/a&gt; [2].&lt;/p&gt;
&lt;h3 align="left"&gt;Még a kritikus sem kritizál&lt;/h3&gt;
&lt;p align="left"&gt;„Nem áll szándékomban a privacy-vel kapcsolatos kritikát megfogalmazni”, mondta nekik kérdésnek látszó expozéjában Marc Rotenberg, az Electronic Privacy Information Center (EPIC) igazgatója, akitől joggal lehetett várni, hogy rendesen megszorongatja a Google és a Facebook tökét. Rotenberg a két cég képviselőihez intézett beszédében annyit mondott, hogy nem feltétlenül hasznos a szólásszabadságot és a magánszférát két ütköző, egymással kiegyensúlyozandó területként felfogni. Szerinte a kettő inkább kiegészíti egymást: az anonim véleménynyilvánítás joga például olyan terület, ahol kéz a kézben jár a magánszférához fűződő jog és a szólásszabadság.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DavidDrummondLordRichard.jpg/image_preview" alt="David Drummond (Google) és Lord Richard Allan (Facebook)" class="image-inline image-inline" title="David Drummond (Google) és Lord Richard Allan (Facebook)" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;Rotenberg szerint még a privacy semmibe vételével folyamatosan vádolt Facebook sem az ördögtől való, olyannyira, hogy ő maga is fent van rajta. „A Facebook olyan, mint a telefon vagy az email. Használjuk csak politikai aktivizmusra, de legyünk tisztában a hiányosságaival” - mondta Rotenberg, aki szerint a kritikánál többet használ a dialógus.&lt;/p&gt;
&lt;p align="left"&gt;Mindeközben Lord Allan of Hallam szorgalmasan jegyzetelt az általa csak fPadként emlegetett, Facebook-kék színű füzetbe, Drummond a Google-től pedig atyai stílusban oktatta: „Sok-sok hibát fognak még elkövetni – mondta a Google főjogásza a brit bárónak. – De idővel majd beletanulnak”.&lt;/p&gt;
&lt;p align="left"&gt;A példátlan kultúrdialógus-kényszerben szinte elsikkadt az egyik legeredetibb résztvevő, Jevgenyij Morozov mondanivalója, pedig Morozov a techvilág jelenleg talán legnépszerűtlenebb álláspontját képviseli: azt hangoztatja, hogy az internet hozzásegíti a diktatúrákat ahhoz, hogy megerősítsék saját hatalmukat A belorusz származású blogger, újságíró és kutató általában szkeptikusan gondolkodik az internet demokratizáló hatásáról. Morozov, aki a tavalyi TED konferencián egész &lt;a class="external-link" href="http://www.ted.com/talks/evgeny_morozov_is_the_internet_what_orwell_feared.html"&gt;előadást&lt;/a&gt; [3]&amp;nbsp; tartott arról, hogyan élnek vissza a diktatúrák a modern technológiai eszközök és a web általában jótékonynak tartott adományaival, azt mondja, hogy az internet egyszerre autonóm erő, és egyszerre a hatalom eszköze. A kutató szerint túlságos leegyszerűsítés a kérdést az aktivisták és a kormányok közötti harcra lebontani. Először meg kell érteni a kultúra, a vallás, a nacionalizmus közötti kapcsolatokat, és csak utána kitalálni, hogyan vonatkoztatható mindez az internetre. A tanulság: tovább kell tanulmányozni a kérdést. Morozov nézeteit nem mindenki osztotta, egy hozzászóló szerint például Iránban kifejezetten jót tesz, hogy a bloggerek fényképeznek, írnak és az anyagot feltöltik a netre, legalább el tudják mondani, hogy a világ figyeli őket. És ez már önmagában reményt kelt.&lt;/p&gt;
&lt;p align="left"&gt;Read the original in &lt;strong&gt;&lt;a class="external-link" href="http://index.hu/tech/2010/09/22/internet_szabadon/"&gt;index&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-szabadon'&gt;https://cis-india.org/news/internet-szabadon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T09:25:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/uid-project-concern">
    <title>How the UID project can be a cause for concern</title>
    <link>https://cis-india.org/news/uid-project-concern</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI), headed by Nandan Nilekani, is the UPA government's most ambitious project, where one billion Indians are branded with a unique identity number. &lt;/b&gt;
        &lt;p&gt;Prime Minister Manmohan Singh&amp;nbsp; handed over the first of the Aadhaar cards at Tembhli village in Nandurbar district of Maharashtra. This mammoth project aims to provide Indian residents with a unique 12-digit identification number that will serve multiple purposes.&lt;/p&gt;
&lt;p&gt;Given the reach and the impact of such an exercise there is much excitement around the Unique Identity (UID) number (also known as Aadhaar) drive, along with some confusion.&lt;/p&gt;
&lt;p&gt;However, there remains some concerns of identity theft.&lt;/p&gt;
&lt;p&gt;For example, the number is linked to their fingerprints and the patterns in their eyes. Since those markers are unique to each of us, no one will steal their rations and wages again. They will be issued only after verification. But our eye's Iris patterns change, with age, disease or malnourishment. Fake fingerprints can very easily be made. Hence, the unique element of these numbers can be tampered.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, Director, Centre for Internet and Society said, “If I leave my fingerprints around, my identity can be stolen and transactions done on my behalf.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Activists claim that in a few years, banks, insurance companies, cell phone providers and hospitals will demand UID number before doing business with you. They could use that number, to share information about anybody.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Hence, Abraham said, “An insurance company and a hospital can merge databases. If you have AIDS or TB, they can bump up your premium, or refuse you cover.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Usha Ramanathan, lawyer said, “Say I go to Srinagar six times in a month. That information could be accessed by the government because the airlines asked for my number before booking a ticket. And that could make me a suspect. There's something wrong in being treated as a suspect for no other reason, than state paranoia.”&lt;/p&gt;
&lt;p&gt;Interestingly, even though India seems excited about this project, Britain recently stopped attempts at biometric based identification systems, after warnings that such a database could easily be hacked.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;See the &lt;a class="external-link" href="http://ibnlive.in.com/videos/132833/how-the-uid-project-can-be-a-cause-for-concern.html"&gt;video&lt;/a&gt; here.&lt;br /&gt;See the original coverage in &lt;a class="external-link" href="http://ibnlive.in.com/news/how-the-uid-project-can-be-a-cause-for-concern/132375-3.html"&gt;IBN Live&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/uid-project-concern'&gt;https://cis-india.org/news/uid-project-concern&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-09T12:59:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-facebook-features">
    <title>In new Facebook features, a comeback for community </title>
    <link>https://cis-india.org/news/new-facebook-features</link>
    <description>
        &lt;b&gt;Nearly 750 tweets bombard the web every second. Internet traffic is growing by 40 per cent a year. People post 2.5 billion photos on Facebook every month. Every minute, 24 hours of video is uploaded on YouTube. But who owns all that data? Until now, big business was in complete control and used the data to monetise operations. But all that is set to change. With Facebook launching two new features, ‘Groups' and a ‘Download your information,' the community is making a comeback.&lt;/b&gt;
        
&lt;h3&gt;More control over data&lt;/h3&gt;
&lt;p&gt;If Facebook CEO Mark Zuckerberg is to be believed, users now have more control over who sees their data and how much. They can also bundle up their entire social graph (as a zip file) and walk away to another service.&lt;/p&gt;
&lt;p&gt;‘Groups' tries to tackle one of Facebook's long-standing problems. On Facebook, everyone, from your boss to your long-lost school friend, is a “friend.” And this means annoying, sometimes embarrassing situations.&lt;/p&gt;
&lt;p&gt;An easy way to form small private groups on a social network, as we do in real life, is the “biggest problem in social networking,” Mr. Zuckerberg told journalists after the announcement.&lt;/p&gt;
&lt;p&gt;The Groups feature allows you to form small circles of friends. Up to 300 Groups per user are allowed, and the tool also allows Group chat and emails. The groups can be open, closed, or secret, depending on the privacy settings.&lt;/p&gt;
&lt;p&gt;Gaurav Mishra, Director (Digital and Social Media), MS&amp;amp;L Group, Asia-Pacific, says this step is important for Facebook, given the rising competition in social networking.&lt;/p&gt;
&lt;p&gt;With alternatives on the horizon, such as Diaspora, which is being designed as an open-source, privacy-conscious social network, and Google's plans to integrate social networking elements into its services through ‘Google Me,' Facebook has to take up this “strategic pre-emptive move,” says Mr. Mishra.&lt;/p&gt;
&lt;p&gt;But the Groups feature comes with its own baggage. It is not ‘opt in.' A friend can add you to the Group, and you get to decide whether you want to be in it or not. It appears that in the trade-off between giving the user more control and encouraging use, Facebook has chosen the latter.&lt;/p&gt;
&lt;p&gt;Users will also have to be prepared for more noise as the new features offer a mirage of secure conversation space that will encourage them to share more personal details.&lt;/p&gt;
&lt;p&gt;“The amount of sharing will go up massively and will be completely addictive,” Mr. Zuckerberg predicted.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, says: “Facebook has always taken a more promiscuous approach to configuring our social behaviour online, the primary motivation being the maximisation of user transactions and consequently profits.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;According to him, the logic of adding a user to a group without seeking permission first makes a lot of assumptions, including that you check your account regularly to do early damage control and that your friends follow best security practices.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;“I would warn people not to do anything on a Facebook group — open, closed or secret — that they would not do on email.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original in the&lt;a class="external-link" href="http://www.hindu.com/2010/10/10/stories/2010101055841600.htm"&gt; Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-facebook-features'&gt;https://cis-india.org/news/new-facebook-features&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T09:58:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
