<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2911 to 2925.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/information-beautiful"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/july-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/internet-governance-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/government-enter-homes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/complaint-against-rogue-auto-driver"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/talk-by-shibayan-raha"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/information-technology-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/debate-on-uid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/uid-udayavani-news"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/june-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/networking-not-working"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2010-bulletin">
    <title>August 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/august-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society. We bring you news and media coverage, research and event updates for the month of August 2010&lt;/b&gt;
        &lt;h3&gt;News Updates&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;RIM Offered Security Fixes&lt;br /&gt; &lt;/b&gt;In India Talks, BlackBerry Maker Said It Could Share Metadata, Notes Show&lt;br /&gt; &lt;a href="http://bit.ly/ahT7jD" target="_blank"&gt;http://bit.ly/ahT7jD&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;New Project to Assess Potential of Creating Open Government Data&lt;/b&gt; &lt;b&gt;Initiatives in Chile, Ghana and Turkey&lt;/b&gt;&lt;br /&gt; Steve Bratt, CEO of the World Wide Web Foundation (founded in 2009 by Tim Berners-Lee) has made an announcement on moving forward with a project to assess the potential of creating open government data&lt;br /&gt; initiatives in Chile, Ghana, and Turkey - the first step of what we hope to be a global initiative focusing on low- and middle-income countries.&lt;br /&gt; &lt;a href="http://bit.ly/d337Ex" target="_blank"&gt;http://bit.ly/d337Ex&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Govt and BlackBerry firm wait for the other to hang up&lt;/b&gt;&lt;br /&gt;Sunil Abraham speaks to Archna Shukla on the stand-off between the Government of India and RIM. The news was published in expressindia.com.&lt;br /&gt; &lt;a href="http://bit.ly/cGeipL" target="_blank"&gt;http://bit.ly/cGeipL&lt;/a&gt;&lt;br /&gt; &lt;br /&gt;&lt;b&gt;Call, text, email complaint against rogue auto driver&lt;/b&gt;&lt;br /&gt; Harassed by an auto driver? Helplines give you no relief? Here's the people's way to help you out. Just report your issue online, call or even SMS sitting in a noisy restaurant, and be heard.&lt;br /&gt; &lt;a href="http://bit.ly/atiiGW" target="_blank"&gt;http://bit.ly/atiiGW&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Call to increase awareness of intellectual property rights&lt;br /&gt; &lt;/b&gt;We need more knowledge on IPR itself, says IT Secretary&lt;br /&gt; &lt;a href="http://bit.ly/avxY16" target="_blank"&gt;http://bit.ly/avxY16&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Civil Society groups urge State Judicial Academy to restructure agenda for Judges' Roundtable meet&lt;/b&gt;&lt;br /&gt; Some of the Civil Society groups in the country have urged the Maharashtra State Judicial Academy to restructure the agenda for the 'Judges Roundtable on Intellectual Property Rights Adjudication' being held in Mumbai on July 24 and 25 to promote public interest and a deeper understanding of intellectual property amongst judicial officers. FICCI is the joint organiser of the event.&lt;br /&gt; &lt;a href="http://bit.ly/dCDZl0" target="_blank"&gt;http://bit.ly/dCDZl0&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;More Debate on UID Project Needed&lt;br /&gt; &lt;/b&gt;A press conference on UID was held at the Press Club in Bangalore on 26 July, 2010. It was co-organised by Citizen's Action Forum, Alternate Law Forum and the Centre for Internet and Society. Mathew Thomas and Vinay Baindur spoke about the UID. Proceedings from the conference was covered in the Hindu on 27 July, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/cSEsaP" target="_blank"&gt;http://bit.ly/cSEsaP&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;UID coverage in Udayavani&lt;/b&gt;&lt;br /&gt; A press conference was held at the Press Club in Bangalore on 26 July, 2010. It was co-organised by Citizen's Action Forum, Alternate Law Forum and the Centre for Internet and Society. Mathew Thomas and Vinay Baindur were the speakers. Leading Kannada newspaper Udayavani covered this event.&lt;br /&gt; &lt;a href="http://bit.ly/c3AU5s" target="_blank"&gt;http://bit.ly/c3AU5s&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open is the Future&lt;br /&gt; &lt;/b&gt;The third Open World Forum will gather together decision-makers from the open digital world, in Paris. 1,500 participants from 40 countries will come together to analyze the technological, economic and social impact of Open Source, the invisible engine behind the digital revolution. The aim: to interpret future trends and cross-fertilize initiatives.&lt;a href="http://bit.ly/amY9Qc" target="_blank"&gt;&lt;br /&gt;http://bit.ly/amY9Qc&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://bit.ly/amY9Qc" target="_blank"&gt; 
&lt;hr /&gt;
&lt;/a&gt;Upcoming Events&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;No UID till Complete Transparency, Accountability and People's Participation: A Public Campaign &lt;br /&gt;&lt;/b&gt;An interactive meeting on UID's lack of a feasibility study, cost involved and dangers of abuse is being held in New Delhi at the Constitution Club Auditorium, Rafi Marg on 25 August, 2010. The meeting is jointly organised by INSAF, PEACE, Citizens' Action Forum, People's Union for Civil Liberties - Karnataka, Slum Janandolana - Karnataka, Alternate Law Forum, The Centre for Internet and Society and concerned individuals.&lt;br /&gt; &lt;a href="http://bit.ly/8YsBIJ" target="_blank"&gt;http://bit.ly/8YsBIJ&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Governance and Human Rights: Strategies and Collaborations for Empowerment&lt;/b&gt;&lt;br /&gt;Leading up to the 2010 IGF, The Association for Progressive Communications (APC), Global Partners, the Centre for Internet and Society (CIS) and the Dynamic Coalition on Internet Rights and Principles are hosting, on 13 September 2010 in Vilnius, an event on 'Internet Governance and Human Rights: Strategies and Collaborations for Empowerment'.&lt;br /&gt; &lt;a href="http://bit.ly/aoOkPR" target="_blank"&gt;http://bit.ly/aoOkPR&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Freedom of Expression or Access to Knowledge: Are We Taking the Necessary Steps Towards an Open and Inclusive Internet?&lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society is co-organising a workshop on Freedom of Expression or Access to Knowledge: Are We Taking the Necessary Steps towards an Open and Inclusive Internet? at the Internet&lt;br /&gt; Governance Forum on 14 September, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/dl1WRL" target="_blank"&gt;http://bit.ly/dl1WRL&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sexual Rights, Openness and Regulatory Systems&lt;/b&gt;&lt;br /&gt;The Centre for Internet and Society is co-organising a workshop on Sexual Rights, Openness and Regulatory Systems at the Internet Governance Forum on 14 September, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/dl1WRL" target="_blank"&gt;http://bit.ly/dl1WRL&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Data in the Cloud: Where Do Open Standards Fit In?&lt;br /&gt; &lt;/b&gt;The Centre for Internet and Society is co-organising a workshop on Data in the Cloud: Where do Open Standards Fit In? on 16 September, 2010 at the Internet Governance Forum.&lt;br /&gt; &lt;a href="http://bit.ly/94AF4h" target="_blank"&gt;http://bit.ly/94AF4h&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;International Conference on Enabling Access to Education through ICT&lt;br /&gt; &lt;/b&gt;The Centre for Internet and Society (CIS), Bangalore in cooperation with the Global Initiative for Inclusive ICT (G3ICT), a flagship advocacy organization of the UN Global Alliance on ICT and Development (UN-GAID), the International Telecommunications Union (ITU), UNESCO, Digital Empowerment Foundation, Society for Promotion of Alternative Computing and Employment and the Deafway Foundation is organizing an international conference, Enabling Access to Education through ICT in New Delhi from&lt;br /&gt; 27th to 29th October, 2010....Registrations to begin soon!&lt;br /&gt; &lt;a href="http://bit.ly/9flyEK" target="_blank"&gt;http://bit.ly/9flyEK&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Research&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Political is as Political does&lt;br /&gt; &lt;/b&gt;The Talking Back workshop has been an extraordinary experience for me. The questions that I posed for others attending the workshop have hounded me as they went through the course of discussion, analysis and dissection. Strange nuances have emerged, certain presumptions have been questioned, new legacies have been discovered, novel ideas are still playing ping-pong in my mind, and a strange restless excitement – the kind that keeps me awake till dawning morn – has taken over me, as I try and figure out the wherefore and howfore of things. I began the research project on Digital Natives in a condition of not knowing, almost two years ago. Since then, I have taken many detours, rambled on strange paths, discovered unknown territories and reached a mile-stone where I still don’t know, but don’t know what I don’t know, and that is a good beginning.&lt;br /&gt; &lt;a href="http://bit.ly/9hY9sR" target="_blank"&gt;http://bit.ly/9hY9sR&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Digital Natives: Talking Back&lt;br /&gt; &lt;/b&gt;One of the most significant transitions in the landscape of social and political movements, is how younger users of technology, in their interaction with new and innovative technologised platforms have taken up responsibility to respond to crises in their local and immediate environments, relying upon their digital networks, virtual communities and platforms. In the last decade or so, the digital natives, in universities as well as in work spaces, as they experimented with the potentials of internet technologies, have launched successful socio-political campaigns which have worked unexpectedly and often without precedent, in the way they mobilised local contexts and global outreach to address issues of deep political and social concern. But what do we really know about this Digital Natives revolution?&lt;br /&gt; &lt;a href="http://bit.ly/bZNoSX" target="_blank"&gt;http://bit.ly/bZNoSX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Beyond the Digital: Understanding Digital Natives with a Cause&lt;/b&gt;&lt;br /&gt;Digital Natives with a cause: the future of activism or slacktivism? Maesy Angelina argues that the debate is premature given the obscured understanding on youth digital activism and contends that an effort to&lt;br /&gt; understand this from the contextualized perspectives of the digital natives themselves is a crucial first step to make. This is the first out of a series of posts on her journey to explore new insights to understand youth digital activism through a research with The Blank Noise Project under the Hivos-CIS Digital Natives Knowledge Programme.&lt;br /&gt; &lt;a href="http://bit.ly/b1GS7F" target="_blank"&gt;http://bit.ly/b1GS7F&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Accessibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to Knowledge: Barriers and Solutions for Persons with Disabilities in India&lt;/b&gt;&lt;br /&gt; Consumers International, Kuala Lumpur and Consumers Association of India in association with Madras Library Association organised a seminar on Access to Knowledge on 31st July, 2010 at the Tamil Nadu Pollution Control Auditorium in Guindy, Chennai. The Principal Secretary to the Government of Tamil Nadu Department of Information Technology was the chief guest. Former Central Vigilance Commissioner N. Vittal gave the keynote address. Prof Subbiah Arunachalam, Nirmita Narasimhan and Pranesh Prakash participated in the seminar. Nirmita and Pranesh made presentations on access to knowledge.&lt;br /&gt; &lt;a href="http://bit.ly/cJXSX8" target="_blank"&gt;http://bit.ly/cJXSX8&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Intellectual Property&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and the Indian Copyright Act, 1857 as Amended in 2010 &lt;br /&gt;&lt;/b&gt;In this post the author examines the issue of privacy in light of the Indian Copyright Act, 1857 as amended by the Copyright Amendment Bill in 2010. Four key questions are examined in detail and the author gives&lt;br /&gt; suitable recommendations for each of the questions that arise.&lt;br /&gt; &lt;a href="http://bit.ly/cJXSX8" target="_blank"&gt;http://bit.ly/cJXSX8&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Internet Governance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Does the Government want to enter our homes?&lt;/b&gt;&lt;br /&gt;When rogue politicians and bureaucrats are granted unrestricted access to information then the very future of democracy and free media will be in jeopardy. In an article published in the Pune Mirror on 10 August,&lt;br /&gt; 2010, Sunil Abraham examines this in light of the BlackBerry-to-BlackBerry messenger service that the Government of India plans to block if its makers do not allow the monitoring of messages. He says that civil society should rather resist and insist on suitable checks and balances like governmental transparency and a fair judicial oversight instead of allowing the government to intrude into the privacy&lt;br /&gt; and civil liberties of its citizens.&lt;br /&gt; &lt;a href="http://bit.ly/dkVHoS" target="_blank"&gt;http://bit.ly/dkVHoS&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UID Project in India - Some Possible Ramifications&lt;/b&gt;&lt;br /&gt;Having a standard for decentralized ID verification rather than a centralized database that would more often than not be misused by various authorities will solve ID problems, writes Liliyan in this blog entry. These blog posts to be published in a series will voice the expert opinions of researchers and critics on the UID project and present its unique shortcomings to the reader.&lt;br /&gt; &lt;a href="http://bit.ly/bOyBS8" target="_blank"&gt;http://bit.ly/bOyBS8&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Liberties and the amended Information Technology Act, 2000&lt;/b&gt;&lt;br /&gt;This post examines certain limitations of the Information Technology Act, 2000 (as amended in 2008). Malavika Jayaram points out the fact that when most countries of the world are adopting plain English instead of the conventional legal terminology for better understanding, India seems to be stuck in the old-fashioned method thereby, struggling to maintain a balance between clarity and flexibility in drafting its laws. The present Act, she says, is although an improvement over the old Act and seeks to address and improve on certain areas in the right direction but still comes up short in making necessary changes when it comes to fundamental rights and personal liberties. The new Act retains elements from the previous one making it an abnormal document and this could have been averted if there had been some attention to detail.&lt;br /&gt; &lt;a href="http://bit.ly/croc9T" target="_blank"&gt;http://bit.ly/croc9T&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Feedback to the NIA Bill&lt;br /&gt;&lt;/b&gt;Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/bhinUB" target="_blank"&gt;http://bit.ly/bhinUB&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Open Access to Science and Scholarship - Why and What Should We Do? The National Institute of Advanced Studies held the eighth NIAS-DST training programme on “Multidisciplinary Perspectives on Science, Technology and Society” from 26 July to 7 August, 2010. The theme of the project was ‘Knowledge Management’. Dr. MG Narasimhan and Dr. Sharada Srinivasan were the coordinators for the event. Professor Subbiah Arunachalam made a presentation on Open Access to Science and Scholarship.&lt;br /&gt; &lt;a href="http://bit.ly/ciohYy" target="_blank"&gt;http://bit.ly/ciohYy&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Civic Hacking Workshop&lt;br /&gt; &lt;/b&gt;CIS, with the UK Government's Foreign Office and the Cabinet Office Team for Digital Engagement, and Google India, is organizing a workshop on open data (or the lack thereof) and 'civic hacking'.&lt;br /&gt; &lt;a href="http://bit.ly/c3TF2t" target="_blank"&gt;http://bit.ly/c3TF2t&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Telecom&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;'Containing Inflation' - A myth&lt;/b&gt;&lt;br /&gt; We need problem-solving, not confused rhetoric or misguided action, says Shyam Ponappa. The article was published in Business Standard on 7 August, 2008.&lt;br /&gt; &lt;a href="http://bit.ly/9frC8q" target="_blank"&gt;http://bit.ly/9frC8q&lt;/a&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt; 
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2010-bulletin'&gt;https://cis-india.org/about/newsletters/august-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-10T10:40:34Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/information-beautiful">
    <title>Information is Beautiful hacks in India with David Cameron</title>
    <link>https://cis-india.org/news/information-beautiful</link>
    <description>
        &lt;b&gt;The Prime Minister took some of the UK's top hackers and data experts with him to India this week. David McCandless was with them.&lt;/b&gt;
        
&lt;p&gt;This week, I was lucky enough to accompany &lt;a class="external-link" href="http://www.guardian.co.uk/politics/wintour-and-watt/2010/jul/27/davidcameron-india"&gt;UK Prime Minister's delegation to India&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I was part of a small contingent of politically active programmers and civic-minded dataheads out to explore links between tech, transparency and community-based democracy in India. The raw stuff of &lt;a class="external-link" href="http://www.guardian.co.uk/politics/davidcameron"&gt;David Cameron&lt;/a&gt;'s 'Big Society' initiative.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;(To the businessmen, journos and politicos in the delegation, we were known simply as "The Hackers" - an image we played up by sometimes rebelliously removing our ties)&lt;/p&gt;
&lt;p&gt;The key event of the trip was a hackday hosted by &lt;a class="external-link" href="http://www.google.co.in/"&gt;Google India&lt;/a&gt; in the southern central city of Bangalore.&lt;/p&gt;
&lt;p&gt;I have to confess a slight colonial attitude going into the meet. Thinking of the UK as a great &lt;a class="external-link" href="http://www.guardian.co.uk/technology/hacking"&gt;hacking&lt;/a&gt; &amp;nbsp;nation and leading data port, I was expecting to be helping the collected Indian IT professionals and activists improve their skills and give them fresh ideas on how to bootstrap their democracy.&lt;/p&gt;
&lt;p&gt;However, our Indian counterparts very quickly astonished us with brilliant and powerful data projects and grass roots hacks using simple tools and technologies to solve everyday civic issues. Some of which I wanted to exhibit here.&lt;/p&gt;
&lt;h2&gt;Bus Map Hack&lt;/h2&gt;
&lt;p&gt;Information designer &lt;a class="external-link" href="http://www.google.com/profiles/arunganesh03"&gt;Arun Ganesh&lt;/a&gt; was frustrated by the bus maps in his native Chennai.&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_IndiahackdayBus1006.jpg/image_preview" alt="India hack" class="image-inline image-inline" title="India hack" /&gt;&lt;/p&gt;
&lt;p&gt;Chennai's bus map goes from this…&lt;/p&gt;
&lt;p&gt;The official map was incomplete and incomprehensible - and had been 'under construction' for six years.&lt;/p&gt;
&lt;p&gt;Passionate about maps and geo-mapping, Arun took it upon himself to design a new map to help the enormous number of people (Chennai has a population of over 4 million) who used the buses every day. Unfortunately, he faced a major challenge: over 5,000 separate buses &amp;amp; bus routes.&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/Hack.jpg/image_preview" alt="Hack" class="image-inline image-inline" title="Hack" /&gt;&lt;/p&gt;
&lt;p&gt;… to this&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;So he turned to crowd-sourcing on the web to gather data on all the routes. Local travellers poured timetables and bus details into his app. And in just 3 days he had compiled enough data to create a fresh map with a clean comprehensible design. And an accompanying interactive app &lt;a class="external-link" href="http://busroutes.in/chennai/"&gt;BusRoutes.in&lt;/a&gt; for painless route planning.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Then he went further. Using the data - and a fair walking distance of 500 metres - he visualised the areas covered by all the bus routes. The resulting heatmap instantly and cleverly reveals which areas of the city are poorly served by the bus network.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Karnataka Learning Partnership&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Education is a big issue in India, where close to 35% of the population are illiterate. The Karnataka Learning Partnership works to improve government schools in Karnataka region by running literacy, maths and library-use programs across the southern Indian state.&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/Hackschools.jpg/image_preview" alt="Hackschools" class="image-inline image-inline" title="Hackschools" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;Karnataka schools monitored&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;Mashing Googlemaps and their detailed data through a web interface, the &lt;a class="external-link" href="http://www.aksharafoundation.org/"&gt;Akshara Foundation&lt;/a&gt; &amp;nbsp;provides a dynamic monitoring and look up service for the quality of schools in each area. It's not unlike the recently launched &lt;a class="external-link" href="http://www.schooloscope.com/"&gt;SchooloScope&lt;/a&gt; here in the UK.&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;(Please note: the site is in beta and not live yet. You can see their work at blog.klp.org.in.)&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;National Election Watch&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;Using information liberated by the 2006 Right to Information Act in India, Nationalelectionwatch.org &amp;nbsp;tracks the backgrounds of every single politician in India. An incredible feat given the enormity and intricacies of Indian democracy.&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;Over 1200 NGOs work to collect data from affidavits filed by the candidates on their financial, criminal and educational background. The myneta.info website acts as an instant power check on a system unfortunately tainted by widespread corruption and bribery.&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;&lt;img src="https://cis-india.org/home-images/CriticalInformation.jpg/image_preview" alt="Critical Information" class="image-inline image-inline" title="Critical Information" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;The crime-o-meter&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span"&gt;Pages on particularly criminal MPs feature a 'crime dial' visualisation to get the message across.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Missed Calls&lt;/h2&gt;
&lt;p&gt;Despite a thriving tech-sector, India still has relatively low internet uptake. Just 0.05% of the 1.2 billion population are active internet users. Compared to around 40% in the UK and 29% in China.&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;But nearly half the population own mobile phones. So SMS and missed calls have become a dominant form of free information exchange, especially when ingeniously hacked together.&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;In a typical hacked service, information providers set up phone numbers. Information seekers phone the number and then immediately hang up, registering a 'missed call'. The information provider then sends them an SMS with the info they might be seeking. Carpenter jobs or internet cafes in the locality, for example.&lt;/p&gt;
&lt;p&gt;Ironically, lax privacy protection - by our standards - in the country actually improves this service. While banned here, triangulation of mobile signals to determine the location of a call is freely permitted in India. So services are able to text back localised information. All for free.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Hacktastic!&lt;/p&gt;
&lt;p&gt;Thanks to Harry Metcalfe at &lt;a class="external-link" href="http://tellthemwhatyouthink.org/"&gt;TellThemWhatYouThink.Org&lt;/a&gt;, Tim Green from &lt;a class="external-link" href="http://www.democracyclub.org.uk/"&gt;DemocracyClub.org.uk&lt;/a&gt;, Edmund von der Burg at &lt;a class="external-link" href="http://www.yournextmp.com/"&gt;YourNextMp.com&lt;/a&gt;, and Pranesh Prakash at the Centre for Internet and Society for their help and input.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: left;"&gt;Read the original in the&lt;a class="external-link" href="http://www.guardian.co.uk/news/datablog/2010/jul/30/information-beautiful-india-cameron"&gt; Guardian&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/information-beautiful'&gt;https://cis-india.org/news/information-beautiful&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T10:22:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/july-2010-bulletin">
    <title>July 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/july-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet &amp; Society. We bring you updates of our research, news and media coverage, information on our events and other updates for the month of July 2010.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Call for Case Studies on ICT&lt;/b&gt;&lt;br /&gt; CIS invites organisations to participate in a study focusing on best practices in the use of ICTs in education for persons with disabilities.&lt;br /&gt; &lt;a href="http://bit.ly/d03jS0"&gt;http://bit.ly/d03jS0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Networking? Not working&lt;/b&gt;&lt;br /&gt; Concerns about privacy, wastage of time and trivialized communication are some reasons ‘refuseniks’ are going off sites such as Facebook and MySpace, writes Shreya Ray in Livemint.&lt;br /&gt; &lt;a href="http://bit.ly/dpdKhX"&gt;http://bit.ly/dpdKhX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Digital them about yourself?&lt;/b&gt;&lt;br /&gt; If you’re on Facebook or have a blog, you could be a digital native, says Akhila Seetharaman.&lt;br /&gt; &lt;a href="http://bit.ly/ahA6Ts"&gt;http://bit.ly/ahA6Ts&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Next CPOV Conference in Leipzig&lt;/b&gt;&lt;br /&gt; Two CPOV conferences have been held so far. The first one in Bangalore and the second one in Amsterdam, the third is to be held in Leipzig.&lt;br /&gt; &lt;a href="http://bit.ly/cLN8XE"&gt;http://bit.ly/cLN8XE&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS featured in the &lt;span class="visualHighlight"&gt;Report on Research and Funding Landscape within the Arts and Humanities in India&lt;/span&gt;&lt;br /&gt; Centre for Internet and Society has been listed as an area of excellence and innovative research in this report.&lt;br /&gt; &lt;a href="http://bit.ly/9GJsJ7"&gt;http://bit.ly/9GJsJ7&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;UID Act may be released for debate, may be introduced in monsoon session&lt;/b&gt;&lt;br /&gt; An article by Karen Leigh &amp;amp; Surabhi Agarwal in livemint on June 30, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/9Hq5dg"&gt;http://bit.ly/9Hq5dg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A New Age in News&lt;/b&gt;&lt;br /&gt; Citizen journalism and online piracy were key topics during the opening day of the Mekong Information and Communication Technology conference. The 2010 Mekong ICT conference in Chang Mai, Thailand, has brought together an experienced crowd of experts from all over the globe. They have gathered to discuss the status, trends and the current situation of the ICT world.&lt;br /&gt; &lt;a href="http://bit.ly/bdGzbQ"&gt;http://bit.ly/bdGzbQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Activists welcome privacy Bill, but point out concerns&lt;/b&gt;&lt;br /&gt; Experts have welcomed the government's move to bring in a law for protecting individual privacy, amid concerns about the potential misuse of personal data it is collecting to execute social welfare and security schemes.&lt;br /&gt; &lt;a href="http://bit.ly/bnddaJ"&gt;http://bit.ly/bnddaJ&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Locating Gender Politics in the New Techno-Industrial Complex: A Lecture by Dr. Lisa McLaughlin&lt;/b&gt;&lt;br /&gt; The Centre for the Study of Culture and Society (CSCS), IT for Change and the Centre for Internet and Society (CIS) are hosting a lecture by Dr. Lisa McLaughlin, Associate Professor in Media Studies and Women's Studies, Miami University, Ohio, USA at CIS, Bangalore on 23 July, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/9zy2Fa"&gt;http://bit.ly/9zy2Fa&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Promoting Education through ICT&lt;/b&gt;&lt;br /&gt; ICT workshop in New Delhi from 27th to 29th October, 2010...Registrations to begin soon!&lt;br /&gt; &lt;a href="http://bit.ly/9flyEK"&gt;http://bit.ly/9flyEK&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Attention Economy - A Brief Introduction&lt;/b&gt;&lt;br /&gt; This post examines attention economy as a brief prelude to a paper and monograph to be published on it. It examines the current theses on attention economy and a few approaches to reading attention economy in gaming besides foregrounding the attention economy and its functions and influence in MMORPGs.&lt;br /&gt; &lt;a href="http://bit.ly/OP7QFl"&gt;http://bit.ly/OP7QFl&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Making of an Asian City&lt;/b&gt;&lt;br /&gt; Nishant Shah attended the conference on 'Pluralism in Asia: Asserting Transnational Identities, Politics, and Perspectives' organised by the Asia Scholarship Foundation, in Bangkok, where he presented the final paper based on his work in Shanghai. The paper, titled 'The Making of an Asian City', consolidates the different case studies and stories collected in this blog, in order to make a larger analyses about questions of cultural production, political interventions and the invisible processes that are a part of the IT Cities.&lt;br /&gt; &lt;a href="http://bit.ly/MXxyXP"&gt;http://bit.ly/MXxyXP&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet, Society and Space in Indian City: First Report&lt;/b&gt;&lt;br /&gt; This is the first report on the progress of the research on Internet, Society and Space in Indian City. The post is a collection of some of the initial focus of these studies. I have started simultaneously exploring and testing various arguments and have listed some key observations from the ones that are nearing completion.&lt;br /&gt; &lt;a href="http://bit.ly/Ndmday"&gt;http://bit.ly/Ndmday&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Digital Natives Workshop in Taipei: Only a Few Seats Left!!!&lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society in collaboration with the Frontier Foundation is holding a three day Digital Natives workshop in Taipei from 16 to 18 August, 2010. The three day workshop will serve as an ideal platform for the young users of technology to share their knowledge and experience of the digital and Internet world and help them learn from each other’s individual experiences.&lt;br /&gt; &lt;a href="http://bit.ly/P4mCKv"&gt;http://bit.ly/P4mCKv&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;NMEICT Funds Book Conversion Project for the Print Disabled&lt;/b&gt;&lt;br /&gt; IIT, Kharagpur, Daisy Forum of India, Inclusive Planet and the Centre for Internet and Society have joined hands to undertake a project for the print disabled. The National Mission on Education through Information and Communication Technology (NMEICT) is funding this project.&lt;br /&gt; &lt;a href="http://bit.ly/bWHi00"&gt;http://bit.ly/bWHi00&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right to Read: Campaign Updates&lt;/b&gt;&lt;br /&gt; A nationwide campaign on Right to Read was co-organised by CIS along with the Daisy Forum of India and Inclusive planet to highlight the lack of content in accessible formats and accelerate change in the provisions of the Indian Copyright Act, 1957, which presently does not permit the conversion of books in accessible formats for the benefits the blind, visually impaired and other reading disabled persons. The campaign is affiliated with the global R2R campaign started by the World Blind Union in April 2008.&lt;br /&gt; &lt;a href="http://bit.ly/akoaSj"&gt;http://bit.ly/akoaSj&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Analysis of the Copyright (Amendment) Bill, 2010&lt;/b&gt;&lt;br /&gt; CIS analyses the Copyright (Amendment) Bill, 2010, from a public interest perspective to sift the good from the bad, and importantly to point out what crucial amendments should be considered but have not been so far.&lt;br /&gt; &lt;a href="http://bit.ly/KLBQDx"&gt;http://bit.ly/KLBQDx&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A Guide to Key IPR Provisions of the Proposed India-European Union Free Trade Agreement&lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society presents a guide for policymakers and other stakeholders to the latest draft of the India-European Union Free Trade Agreement, which likely will be concluded by the end of the year and may hold serious ramifications for Indian businesses and consumers.&lt;br /&gt; &lt;a href="http://bit.ly/Rw7whN"&gt;http://bit.ly/Rw7whN&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Access to International Agricultural Research&lt;/b&gt;&lt;br /&gt; Open access advocates have urged the top management of the Consultative Group on International Agricultural Research to give open access to its research publications. A report by Subbiah Arunachalam on 3 June, 2010 was also circulated to all the signatories of the letter.&lt;br /&gt; &lt;a href="http://bit.ly/cspMYY"&gt;http://bit.ly/cspMYY&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Catching up on broadband&lt;/b&gt;&lt;br /&gt; The govt can invest some of the Rs 1,00,000 crore from the spectrum auctions to help India catch up on broadband, says Shyam Ponappa in his latest article published in the Business Standard on July 1, 2010.&lt;br /&gt; &lt;a href="http://bit.ly/ag67TU"&gt;http://bit.ly/ag67TU&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/july-2010-bulletin'&gt;https://cis-india.org/about/newsletters/july-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-10T09:41:01Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/internet-governance-human-rights">
    <title>Internet Governance and Human Rights: Strategies and Collaborations for Empowerment </title>
    <link>https://cis-india.org/events/internet-governance-human-rights</link>
    <description>
        &lt;b&gt;Leading up to the 2010 IGF, The Association for Progressive Communications (APC), Global Partners, the Centre for Internet and Society (CIS), IT for Change, and the Dynamic Coalition on Internet Rights and Principles are hosting, on 13 September 2010 in Vilnius, an event on 'Internet Governance and Human Rights: Strategies and Collaborations for Empowerment'. &lt;/b&gt;
        
&lt;p&gt;Internet governance has significant impact on human rights. This is reflected by the inclusion of human rights considerations in the Geneva Declaration of Principles and the Tunis Agenda, which gave the IGF its mandate. However, human rights discussions have not featured prominently at the IGF. What discussions there have been tended to focus on civil and political rights without also sufficiently considering how the internet relates to cultural, social and economic rights. The indivisibility of rights has not received the attention it requires.&lt;/p&gt;
&lt;p&gt;The Internet governance and human rights communities work in different spaces and rarely have the opportunity to interact. The presence of the UN Special Rapporteur on Freedom of Expression, Frank la Rue at the 2009 IGF and again at the 2010 IGF shows that this is beginning to change. The 2010 IGF presents a valuable opportunity to place human rights more firmly on the Internet governance map and to identify opportunities for collaboration with mainstream human rights communities.&lt;/p&gt;
&lt;p&gt;With an increasing emphasis on the development agenda in the IGF it is also a good opportunity to look at the links between human rights, development and the Internet.&lt;/p&gt;
&lt;p&gt;Join the conversation with human rights, Internet governance and development activists as we review pressing IG issues such as access, diversity, equality, freedom, openness and development with a view to strengthening the human rights agenda at the IGF.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;More concretely, we hope to:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;continue building effective collaborations promoting human rights in Internet governance, and,&amp;nbsp;&lt;/li&gt;&lt;li&gt;identify appropriate spaces for intervention in the 2010 IGF.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Agenda:&amp;nbsp; &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
Moderator: Chad Lubelsky. Global Networking, Policy &amp;amp; Advocacy Coordinator,
&lt;p&gt;Association for Progressive Communications (APC)&lt;/p&gt;
&lt;p&gt;14:00 Introduction: Background and rationale of the session, aims and objectives. Anriette Esterhuysen (APC)&lt;/p&gt;
&lt;p&gt;Keynote speaker : Frank La Rue, UN Special Rapporteur on the Right to Freedom of Opinion and Expression.&lt;/p&gt;
&lt;p&gt;Keynote speaker: Arvind Ganesan, Director or Business and Human Rights Program, Human Rights Watch.&lt;/p&gt;
&lt;p&gt;14:45 Questions&lt;/p&gt;
&lt;p&gt;15:00 Open discussion session on 'Human rights and internet policy: the interconnectedness of economic, social, cultural, civil and political rights'. Moderated by Lisa Horner (Global Partners) and Anja Kovacs (the Centre for Internet and Society).&lt;/p&gt;
&lt;p&gt;15:40 Coffee/tea break&lt;/p&gt;
&lt;p&gt;16:00 Breakout group discussions&lt;/p&gt;
&lt;p&gt;16:40 Report Backs&lt;/p&gt;
&lt;p&gt;17:00 Plenary discussion on the way forward (Anriette Esterhuysen, APC and Parminder Jeet Singh, IT for Change)&lt;/p&gt;
&lt;p&gt;17:20 Closing remarks&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/internet-governance-human-rights'&gt;https://cis-india.org/events/internet-governance-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T03:59:50Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/freedom-of-expression">
    <title>Freedom of Expression or Access to Knowledge: Are We Taking the Necessary Steps Towards an Open and Inclusive Internet? </title>
    <link>https://cis-india.org/events/freedom-of-expression</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is co-organising a workshop on Freedom of Expression or Access to Knowledge: Are We Taking the Necessary Steps Towards an Open and Inclusive Internet? at the Internet Governance Forum on &lt;/b&gt;
        
&lt;p&gt;Although cyber-utopian visions have long been discredited, the promise that the Internet contains as a tool to work towards democratisation and greater social justice has not yet lost its attraction. This workshop will consider what kind of Internet architecture is needed, what kind of 'openness' and Internet 'freedom' is required to ensure that such visions can actually translate into reality. While the importance of freedom of expression has been fairly widely acknowledged, a concerted approach to many more Internet governance issue is urgently required if those who are at the forefront of struggles for social justice online are to continue to do their important work. The interplay between access to knowledge (including access to information and access to culture) on the one hand and human rights on the other, too, for example, requires our urgent attention.&lt;/p&gt;
&lt;p&gt;The aim of this workshop will be, then, to come to a more in-depth and more rounded understanding of what issues impact the democratising potential of the Internet and how exactly they do so, so that we can also start communicating about these with greater clarity. To reach this aim, the workshop will bring together activists, researchers and other stakeholders with expertise on different regions of the world and, consequently, at times diverging opinions on what the problems and solutions with regard to Internet governance are, and will bring them in debate with each other.&lt;/p&gt;
&lt;p&gt;The workshop will be organized in a roundtable format in order to increase the involvement of the participants. Initial remarks of the speakers will be followed by debate, and active moderation will ensure that the discussions are dynamic. The issues raised by the speakers will be grouped under several axes, including: (i) Civic empowerment online: towards a new public sphere?; (ii) governmental and private control over information and personal data; (iii) Cases of tension between copyright protection and access to knowledge online. Cases such as the adoption of laws following the three strikes model and the adoption of open data regulations will be taken into consideration.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Which of the five broad IGF Themes or the Cross-Cutting Priorities does your workshop fall under?&lt;br /&gt;&lt;/strong&gt;Security, Openness and Privacy&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Have you organized an IGF workshop before?&lt;/strong&gt; Yes&lt;br /&gt;&lt;strong&gt;If so, please provide the link to the report&lt;/strong&gt;:&lt;br /&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=94"&gt;http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=94&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Provide the names and affiliations of the panellists you are planning to invite:&lt;br /&gt;Civil Society:&lt;/strong&gt;&lt;br /&gt;Robert Guerra – Freedom House, US&lt;br /&gt;Anja Kovacs – Centre for Internet and Society, India&lt;br /&gt;Kevin Bankston – EFF, US&lt;/p&gt;
&lt;p&gt;Academics:&lt;br /&gt;Marília Maciel - Center for Technology and Society - Brazil &lt;br /&gt;Jeremy Malcolm - Consumers International, Kuala Lumpur, Malaysia&lt;/p&gt;
&lt;p&gt;Government:&lt;br /&gt;Johan Hallenborg – Swedish Ministry for Foreign Affairs, Sweden&lt;br /&gt;José Murilo Junior – Brazilian Ministry of Culture, Brazil&lt;/p&gt;
&lt;p&gt;Business sector:&lt;br /&gt;Alan Davidson – Director of Public Policy and Government Affairs for the Americas&lt;br /&gt;Cornelia Kutterer, Microsoft, Belgium&lt;/p&gt;
&lt;p&gt;Multistakeholder initiative:&lt;br /&gt;Susan Morgan, Global Network Initiative&lt;/p&gt;
&lt;p&gt;Remote moderator: &lt;br /&gt;Carlos Affonso Pereira de Souza - Center for Technology and Society, Getulio Vargas Foundation, Brazil&lt;/p&gt;
&lt;p&gt;(A moderator is still to be determined but will be chosen from among the civil society and academic speakers. All speakers have confirmed their participation)&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Biographies&lt;/em&gt;:&lt;br /&gt;There are no panelists biographies associated to this workshop at the moment.&lt;/p&gt;
&lt;p&gt;Provide the name of the organizer(s) of the workshop and their affiliation to various stakeholder groups:&lt;br /&gt;Carlos Affonso Pereira de Souza - Center for Technology and Society, Getulio Vargas Foundation – civil society&lt;br /&gt;Johan Hallenborg, Swedish Ministry for Foreign Affairs - government&lt;br /&gt;Anja Kovacs, Centre for Internet and Society - civil society&lt;br /&gt;Jeremy Malcolm. Consumers International - civil society&lt;br /&gt;Marília Maciel - Center for Technology and Society, Getulio Vargas Foundation – civil society&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Organization&lt;/strong&gt;:Centre for Internet and Society, India, and Center for Technology and Society of the Getulio Vargas Foundation, Brazil&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contact Persons&lt;/strong&gt;: Anja Kovacs and Marília Maciel&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/freedom-of-expression'&gt;https://cis-india.org/events/freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T03:59:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/government-enter-homes">
    <title>Does the Government want to enter our homes?</title>
    <link>https://cis-india.org/internet-governance/blog/government-enter-homes</link>
    <description>
        &lt;b&gt;When rogue politicians and bureaucrats are granted unrestricted access to information then the very future of democracy and free media will be in jeopardy. In an article published in the Pune Mirror on 10 August, 2010, Sunil Abraham examines this in light of the BlackBerry-to-BlackBerry messenger service that the Government of India plans to block if its makers do not allow the monitoring of messages. He says that civil society should rather resist and insist on suitable checks and balances like governmental transparency and a fair judicial oversight instead of allowing the government to intrude into the privacy and civil liberties of its citizens.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;What? Me worry about the blackberry imbroglio?&lt;/strong&gt;&lt;br /&gt;If Pierre Trudeau were alive today, he would feel similarly about the Canadian innovation that is making news these days. But, given the Indian media's objective take on the ongoing BlackBerry tussle, one would assume that the media is unaffected.&lt;/p&gt;
&lt;p&gt;Many internet observers say that&amp;nbsp; the very future of democracy and free media is at stake. If rogue politicians and bureaucrats are able to eavesdrop on the communications of media houses, wouldn't that sound the death knell for sting operations, anonymous informants and whistle-blowers?&lt;/p&gt;
&lt;p&gt;And, consequently, free press and democracy? How can the media keep its calm when one of the last bastions of electronic privacy in India is being stormed?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Isn’t this a lost cause already?&lt;/strong&gt;&lt;br /&gt;Perhaps, our reporters and editors have remained complacent, because they do not want to swim against the tide. After all, governments across the world have used excuses like cyber-terrorism, organised crime, pornography, piracy etc. to justify censorship and surveillance regimes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The priveleged access that the governments of India, Saudi Arabia and UAE are demanding has already been provided to the governments of USA, Canada and Russia, for example.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We don't know how much they know about us!&lt;/strong&gt;&lt;br /&gt;The average reader might not be aware of the access that the Indian government has to his/her personal information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To be clear, the Indian government, like most other governments, is able to intercept, decrypt, monitor and record sms and voice call traffic by working in partnership with ISP and Telecom operators.&lt;/p&gt;
&lt;p&gt;This is legalised through ISP licence agreements, which requires ISPs to provide monitoring equipment that can be used to by various law enforcement and intelligence agencies. There is no clear policy on data-retention policies.&lt;/p&gt;
&lt;p&gt;Industry insiders say that SMS messages, telephone call logs, email headers, and web requests are archived from anywhere between three months and a year.&lt;/p&gt;
&lt;p&gt;Do these ISPs and telecom operators then delete, anonymise or obfuscate this data? Or do they they retain it for posterity for market research?&lt;/p&gt;
&lt;p&gt;In the absence of a privacy law — the Indian citizen can only make intelligent guesses.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Encryption is our friend&lt;/strong&gt;&lt;br /&gt;As a student, when I passed a love note to my lady-love in class, I would use a symmetric key encryption scheme.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;She would use the same key as I did to unencrypt the machine, ie, substituting the alphabet with the next/previous one.&lt;/p&gt;
&lt;p&gt;If someone was able to intercept the key, then all communication between us in both directions would be compromised.&lt;/p&gt;
&lt;p&gt;Asymmetric key encryption solves this problem by giving both parties two keys — a public key and a private key. I would use my lady-love’s public key to encrypt a message meant for her.&lt;/p&gt;
&lt;p&gt;Only she would be able to unencrypt the message by using her private key. The size of the key — 40bit, 128bit, 256bit etc. determines the strength of the encryption.&lt;/p&gt;
&lt;p&gt;The more bits you have, the longer it will take for someone to break through using a brute force method. The brute force method or dictionary method is when you try every single combination —just as you would with an old suitcase.&lt;/p&gt;
&lt;p&gt;The time taken also depends on computing resources — whether you are a jealous boyfriend, or the FBI, or a corporation like Google. These days, governments depend on corporations for hardware and network muscle.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How does Blackberry encrypt differently?&lt;/strong&gt;&lt;br /&gt;Other smart phone providers like IPhone and Nokia make email and Internet traffic transparent to the ISP and telecom operator, making it easy for governments are able to keep track of Internet users on mobile phones just as they monitor dial-up or broadband users.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Most mobile services come with a basic encryption. Blackberry is different because it introduces an additional level of encryption, and then routes traffic either through corporate servers or through its own servers in Canada and other parts of the world.&lt;/p&gt;
&lt;p&gt;The fact that information is routed thus can pose a threat to the Indian government, if officials are using Blackberries to exchange highly classified information.&lt;/p&gt;
&lt;p&gt;Then, GoI could be worried if western intelligence agencies are eavesdropping.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How will this end? Will Blackberry leave?&lt;/strong&gt;&lt;br /&gt;Blackberry has never exited a country, because in the end it has prioritised consumer privacy over commercial compulsions. For example Blackberry has now ‘resolved’ security probwith Saudi Arabia.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I don’t think we should worry about deals or compromises. However, this is not to say that Blackberry should not be applauded.&lt;/p&gt;
&lt;p&gt;They have taken a public stand against unrestricted governmental access to their clients’ information; one should always applaud corporates who fight hard for privacy and civil liberties.&lt;/p&gt;
&lt;p&gt;What the Blackberry dilemma is showing us is the social cost of the electronic Big Brother will be steep, as it should be.&lt;/p&gt;
&lt;p&gt;To protect citizens’ rights, civil society must resist and insist on suitable checks and balances like governmental transparency and fair judicial oversight.&lt;/p&gt;
&lt;p&gt;Read the article in &lt;a class="external-link" href="http://www.punemirror.in/index.aspx?page=article&amp;amp;sectid=2&amp;amp;contentid=2010081020100810224737834e2c8a329&amp;amp;sectxslt="&gt;Pune Mirror&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/government-enter-homes'&gt;https://cis-india.org/internet-governance/blog/government-enter-homes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:12:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-in-india">
    <title>UID Project in India - Some Possible Ramifications</title>
    <link>https://cis-india.org/internet-governance/blog/uid-in-india</link>
    <description>
        &lt;b&gt;Having a standard for decentralized ID verification rather than a centralized database that would more often than not be misused by various authorities will solve ID problems, writes Liliyan in this blog entry. These blog posts to be published in a series will voice the expert opinions of researchers and critics on the UID project and present its unique shortcomings to the reader.

&lt;/b&gt;
        
&lt;p&gt;Researchers at CIS have been grappling with the UID project from research, advocacy, and legal standpoints though all approach it from their own perspective and opinions are rarely duplicated. In an attempt to make their expert opinions more accessible to readers, a series of blog posts, this being the first, will be put up. These posts will not, and cannot because of its length and format, try to address all the possible issues the UID poses. However, they will present the bare bones of the arguments and research questions that the independent voices at CIS see as crucial. These posts will also ask many more questions than they answer, in an attempt to spur further dialogue about the UID project.&lt;/p&gt;
&lt;p&gt;Central to understanding the nature of the UID project and its possible ramifications is the idea that technology is not merely a tool to be used by an unchanging, monolithic state. In fact, its very adoption can create ripple effects throughout the apparatus of the state. When the state adoptsa mainstream and ubiquitous technology, the structure of the government and methods of governance change. These changes are not always so dramatic as to be immediately noticeable without some informed inspection, but if one considers the way the state and the citizen interact the significance of these changes becomes starkly apparent. Can we trust the government to use touch screen voting machines like the ones we see every day at the bank? Do government surveillance cameras make us safer or introduce worrisome intrusion into our privacy, or both? Technology is not as neutral as it appears. That is not to say that it is inherently good or bad, but that it is not inert, it is transformative in nature.&lt;/p&gt;
&lt;p&gt;The nation state as we know it is built on the printed word, or at least analogue technology. The ways in which we codify, distribute, and assimilate information have, for centuries, been dominated by the printing press. With the introduction of “database governance” there will inevitably be a shift, and a radical one at that. The Indian government has announced its intention to move towards “SMART” (simple, moral, accountable, responsive and transparent) governance, and this implies both an acceptance of the neo-liberal philosophy of government and techno-governance. To achieve a new level of transparency, accountability, and responsiveness, the move towards e-governance could be a major turning point, but how does this shift complicate and change the citizen-state relationship in India? How does this change shift the relationship of India with the rest of the international community?&lt;/p&gt;
&lt;h2&gt;The UID and Shifts in the Citizen-State Relationship &lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;One way that the citizen-state relationship will change with the shift towards techno-governance, specifically in regard to the UID project, is that the UID posits the state as both the safe-keeper and arbiter of identity. Proponents of the UID project are adamant that it is a voluntary program, but even the UID website states that “in time, certain service providers may require a person to have a UID to deliver services”. As the UID becomes increasingly ubiquitous, could not having a number mean being cut off from some or many of the basic privileges of citizenship if one's identity is becoming more difficult to verify? If having a UID number is the most prominent marker of identity, then it is through state definition, arbitration and upon the state's technical capacity that all will rely.&lt;/p&gt;
&lt;p&gt;Moreover, how do we begin to address the privacy issues raised by technological advances in relation to non-changing legal structures? What does it mean to capture all this identity data without introducing a new privacy legislation to protect the citizen? Without new legal accommodation, otherwise benign processes like a statistical census can become a potent tool in a shift towards a police state. As state apparatus's shift, there must be some paradigmatic shift in law to accompany these new technologies and government roles.&lt;/p&gt;
&lt;p&gt;If the state transforms through the integration of e-governance forms, then there will inevitably be a recalibration of the relationship between the state, the market, and the citizen. Traditionally the separation of these entities creates arbitration and within a development paradigm there is dynamic, active triangulation. One way we can see this triangulation is through government intervention in markets on behalf of the citizen. There are certain spaces of consumption, for example, such as a cinema where state intervention against discrimination creates a marker for citizenship. That is, because I am able to access a cinema without discrimination, as one of my constitutional rights, this demonstrates my citizenship. However, with the introduction of public- private partnerships, or PPPs, the fact of having multiple stake-holders of political economy allows for the state to disinvest in the production and delivery of certain public services.&amp;nbsp; Satisfying the needs of the citizen for services like sanitation, public education, delivery of power and clean water, maintenance of infrastructure like roads and bridges, can be handed over to corporate entities. The Indian government has enthusiastically embraced PPPs as a way to bring needed capital to the infrastructure demands that accompany their economic growth goals. However, how does this kind of task delegation affect transparency and accountability? If the state decides to stop producing or supplying a good or service, and instead turns this over to a corporation, can the mechanisms for state oversight realistically be trusted to make sure quality and accountability are not adversely affected and rectify the situation if they are? Where does the citizen come into all of this, in terms of what they stand to gain and lose?&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;The Definition of Citizenship and the UID &lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;As the state and the market enters into new relationships the definition of citizenship changes.&amp;nbsp; If the citizen is seen as the intended beneficiary of state programs, this new relationship between state and market begs the question “Who is subject to (or the subject of) the state?” When the corporate sphere creates micro-financing that helps farmers, they may help the people at the bottom of the economic pyramid manage their debt, but does it necessarily address the problems that created the debt in the first place? How does the market mediate the citizen-state dialogue? As the state and the market enter into new relationships there is a recalibration of the citizen-government relationship. Do market demands for an e-literate consumer put pressure on the state to create one where one did not exist before, and if so, can this not have profound implications for the definition of citizenship?&lt;/p&gt;
&lt;p&gt;Part of the movement towards e-governance is signalled by the fact that there has been a shift away from state-sponsored literacy campaigns to e-literacy programs. Does this use of information and communications technology for development (or ITC4D) alienate significant portions of the population? Can such programs in fact widen the digital divide? With the introduction of e-governance the state asks the citizen to participate in governance by creating new avenues for civic participation, such as providing databases of information pertaining to the state that is freely accessible for analysis and manipulation by anyone with the skills to do so. But, if this makes it impossible for some portions of the citizenry to communicate effectively with the state, does this run the risk of making certain, traditional forms of citizenship redundant? How are people with low literacy and little or no access to the necessary technologies supposed to communicate with this new high-tech bureaucracy? Will those who cannot navigate the new systems be inadvertently relegated to second-class status?&lt;/p&gt;
&lt;p&gt;This is of particular concern when thinking about the UID project. To properly manage and distribute social services, ID management in some form is crucial. However, when trying to make sure services are properly delivered to the uneducated poor the danger for digital-analogue slippage that is not in their favour increases, and accountability is not necessarily adequately addressed. For example, if I am an illiterate farmer entitled to a certain ration and the person conducting the transaction decides to defraud me, they can easily ask me to authenticate my biometrics, make it appear that they have been simply checking my identity when they have actually fooled me into authenticating the “completed” transaction and simply tell me the computer says, I've already received my share, that I'm only entitled to half of the normal amount, or some other such lie. In this scenario, how would I know this person wasn't telling me the truth? If they lie using a simple ledger, I can take the ledger itself or a copy of it to a literate friend and have them help me navigate the situation. I can seek redress and substantiate my claims more easily if I am not alienated by the technologies being used. Technologies can be empowering or dis-empowering depending on their application. How then, do we balance the demands of the market and the duties of the state against the rights of the citizen? Or rather, how do we apply technology in such a way that the demands of the market and the duties of the state mutually balance each other?&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Centralization and Cost-effectiveness of the UID&amp;nbsp; &lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;While ID management is indisputably important, it does not require a centralized database. In the US there are multiple pieces of information, stored in separate databases that can be used to authenticate a transaction. No one can open a bank account with just a social security insurance number. You also need a separate form of ID, often two, that can be used to verify identity. In this way, the SSI number is a bit like a “username” and the other forms of ID, driver's license or passport, function like a corresponding “password”. With the UID project, however, the “username” (the number itself) and the “password” (the number holder's biometrics) are stored in the same place. Thereby, should the database be in some way compromised, all the information needed to verify and complete transactions would be available. If storing this information in a central database is really a good idea, then one must also accept the premise that merging all existing email servers into one monolithic server is also a good idea. Furthermore, centralization is not only more dangerous, it is totally unnecessary. Trillions of dollars worth of trade take place every year using PIN numbers issued by banks and verified without the verifying data being centralized. Having a standard for decentralized ID verification, rather than a centralized database would solve ID problems without creating a database that would be vulnerable to attack.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are lots of examples of governments implementing costly safety measures that don't actually make anyone safer. Take for example the cameras put up all over London to monitor the movements of people. Unfortunately, something as low-tech as a hooded sweatshirt can thwart these attempts at surveillance. Moreover, if I am a criminal, I am going to make it a priority to know where the cameras are so that I can strategically avoid them. Another example is the millions of dollar the U.S. government spent on putting an armed Federal Air Marshal on every flight, post 9/11. While traditional intelligence gather has thwarted other attempted attacks since 9/11, Air Marshals have not been responsible for stopping any. Simply because the UID project is more technologically advanced does not make it more effective. It seems to greatly increase the risk of fraud that there can be so many separate biometrics machines scattered in different places to verify so many transactions. Having the machines sequestered in private businesses where they will not be constantly monitored or regulated seems to be both costly and easily subject to tampering. It seems to make more sense to have, say, one central, monitored machine per so many people that could be used to settle identity disputes when they arise rather than making the technology a part of every transaction.&lt;/p&gt;
&lt;h2&gt;Infallibility and Circumvention of the UID &lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;The UID is not infallible and circumvention will certainly be a problem with the project. We find an analogy in the field of digital rights management. If I copy an mp3 without permission or payment, that is illegal. Digital rights management law was introduced to stop this practice, but it was circumvented. This legislation has not stopped the first crime. It has merely created a second, that of circumventing the law.&amp;nbsp; The UID, in so far as it may be used to try to stop the crime of illegally siphoning resources such as, for example, grain intended to go to the poor, cannot stop people from circumventing the system. Circumventing the UID will be a crime. If doing so were truly impossible there would be no need to criminalize it. So, instead of preventing the initial crime of siphoning may not prevent the first crime, while introducing another.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are basically two possible types of circumvention that are possible, though they might present themselves in various different forms. “Type A” or “the Mission Impossible” kind of fraud&amp;nbsp; might involve fake thumb prints and contact lenses being worn by someone trying to fool the person conducting the biometric authentication. “Type B” occurs when the person operating the biometrics machine is working to defraud the system, most likely with one or many accomplices.&lt;/p&gt;
&lt;p&gt;“Type A” involves one dishonest person, who is trying to access someone else's account or a ghost account, and there are various proposed methods to prevent against this type of fraud. To prevent against people using fake thumb prints, the biometrics machines will measure the heat of the thumb as well as the image of the thumb. With the iris scan, there will be a pulse of light to cause contraction in the iris so that a contact lens, which cannot adjust for light, can be detected. All of this will drastically raise the price of the machines in question. It is hard to imagine farmers and labourers defrauding the system with elaborate biometric defrauding devices, so these expensive machines are much more appropriate for monitoring the top of the economic pyramid, who steal in larger sums and have more sophisticated technology at their disposal.&lt;/p&gt;
&lt;p&gt;“Type B” involves dishonesty either by the person in control of the biometric authentication, or both that person and others. This seems to be a much more likely and problematic scenario. Right now, bank accounts that are not connected to a name are regularly created so that people can cheat the tax man. Since the bank profits from these accounts, it's in the bank's interest to help people set up such accounts. Ghost ID numbers, and things like bank accounts that are connected to them, can still be produced with biometrics. How is this possible? Well, to make it possible for so many biometric authentications to happen every day, the whole set of ten finger prints won't be sent. That would be way too much data. So, instead of overwhelming the channels, only one thumb print will be sent. Even that many thumb prints would be an information overload, so each thumb print's image will be reduced to a set of 30 data points that will be compared against the original scans. So, where is there a possibility for fraud? When the scan of the finger is taken, and image is rendered. If someone wants to create a ghost ID they only have to manipulate this image, like with a Photoshop filter, and alter the data points. Once I've created a set of biometric markers that doesn't connect to anyone, I can conduct transactions for a ghost. One can easily imagine a market emerging for ghost IDs. People might start trying to pay foreign tourists for their biometric information, which could be sold to a local office. There are certain settings where biometrics works well, for example, at an airport. There, everything is under constant video surveillance. If someone were to tamper with or try to replace the machinery it would be quickly noticed by the cameras. Even if it weren't, different people would routinely be operating the same machine and this would be an added safe guard against fraud. However, at a bank, or any place where the machines used for verification are operated behind closed doors it is quite likely that the technology will be abused.&amp;nbsp; This abuse could easily go unnoticed, because the draft UID bill has proposed strict accountability measures for the Authority, and has conveniently overlooked extending these to collecting and enrolling agencies.&lt;/p&gt;
&lt;h2&gt;Digital/Analogue Slippage&lt;/h2&gt;
&lt;p&gt;There is always the possibility of digital/analogue slippage or, more simply put, the computer records not reflecting what actually happened even if no fake identity was used. This happens all the time in IT buildings in the form of tailgating. Four people go out to lunch together and as they re-enter the building they're supposed to each swipe their ID card individually. It is easier and faster for one person to swipe for everyone so, despite signs discouraging this behaviour, this is a common occurrence. If you were to try to analyse the data collected after a day of such comings and goings it would be indecipherable.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I can also authenticate my biometrics, in order to authorize a transaction, without the transaction actually being complete. Let's say I'm a poor farmer entitled to a ration of 10 kilos of grain. The person who is supposed to give me the grain is not an honest person and insists that I authenticate the transaction before he or she gives me my ration. I do what I'm told but only receive 5 kilos. The computer record shows that I have gotten my full ration, so I have no grounds to contest. In this scenario, more complex technology does not necessarily mean greater accountability. Furthermore, even if I am illiterate, if there is a simple ledger that has recorded the transaction, I can physically take the ledger or a copy of it and show it to some literate person willing to help me. If the only record of the transaction is in a database that I can't access or can't understand it will be even more difficult for me to seek help. Moreover, if I don't understand the technology and the shop owner decides not to give me the grain at all they can simply say “Oh, I'm sorry, your account has been denied” or “The computer says you've already been given your ration” and I have little chance of successfully negotiating that situation. Built in to this example is the disadvantage that the illiterate and the computer illiterate face when dealing with this technology but, this is not necessarily always present in cases where digital/analogue slippage causes confusion or complication.&lt;/p&gt;
&lt;p&gt;Commonly, things are bought by or registered to one person and used by another. For example, in a small office building, all the phone lines and computers may have been bought in the name of one person. Each office worker will not buy their own computer or equipment, but instead the computers will be bought in the name of the person who runs the organization or an administrator with financial authority. If someone in the office uses their computer to make a bomb or store child pornography, who is accountable? This is the problem when there is digital/analogue slippage.&amp;nbsp; There is the digital record of events and then things as they really are, which are not always identical, and there is no accountability or safeguard against mistake. In the context of the UID, the possibility of such slippage is too high, and will work against the goal of delivering benefits to the poor instead of facilitating it.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-in-india'&gt;https://cis-india.org/internet-governance/blog/uid-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Liliyan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:13:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/complaint-against-rogue-auto-driver">
    <title>Call, text, email complaint against rogue auto driver</title>
    <link>https://cis-india.org/news/complaint-against-rogue-auto-driver</link>
    <description>
        &lt;b&gt;Harassed by an auto driver? Helplines give you no relief? Here's the people's way to help you out. Just report your issue online, call or even SMS sitting in a noisy restaurant, and be heard.
&lt;/b&gt;
        
&lt;p&gt;Right from drivers with no proper identity cards, to those refusing to ply or those who attempt sexual assault enroute, you can report them all to a team of volunteers who manage a complaint book 24x7. There is also a map online, where you can pinpoint the exact place, time and even upload videos or photographs taken on the spot.&lt;br /&gt;&lt;br /&gt;This complaint management system, recently launched by Kiirti (part of the Centre for Internet and Society) is an attempt to help tackle the cases of auto menace in the city. "It's quite like the Fix My Street initiative of the West. This is for the people and maintained by the people. What makes it different from the existing helpline mechanism in Bangalore is that there is better transparency and more options given to people on how they can file their complaint 24x7,'' explains Sudha Nair, project community manager for Kiirti in India.&lt;br /&gt;&lt;br /&gt;All the complaints received will be scrutinised and verified by a backend support team of volunteers and then sent across to the department concerned for action. Besides, the complainant will be able to check the status of the complaint.&lt;br /&gt;&lt;br /&gt;"Recently, in The Times of India, we read about the sad state of the official helplines provided by the transport department. There is no transparency in it nor is it available all the time, so we decided to launch this system. We are only working as a catalyst. The portal can also be effectively used by various RWAs to help check the problem in their area,'' Sudha added. Various NGOs like Janaagraha, Environment Support Group, Public Affairs Centre and Children's Movement for Civic Action have also come forward to support this initiative.&lt;/p&gt;
&lt;p&gt;Read the original in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Call-text-email-complaint-against-rogue-auto-driver/articleshow/6253847.cms"&gt;Times of India&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/complaint-against-rogue-auto-driver'&gt;https://cis-india.org/news/complaint-against-rogue-auto-driver&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T10:45:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/talk-by-shibayan-raha">
    <title>Digital Activism and Online Advocacy: Experiences from the Tibetan Freedom Movement – A Talk by Shibayan Raha</title>
    <link>https://cis-india.org/events/talk-by-shibayan-raha</link>
    <description>
        &lt;b&gt;A talk on  the role of digital activism, online advocacy and use of social media in the Tibetan freedom struggle by Shibayan Raha at the Centre for Internet and Society, Bangalore on 9 August, 2010.&lt;/b&gt;
        
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Shibayan.jpg/image_preview" alt="Shibayan Raha" class="image-inline image-inline" title="Shibayan Raha" /&gt;&lt;/p&gt;
&lt;p&gt;The Tibetan freedom movement began in the 1950’s when it started its campaign to highlight the sufferings of the Tibetan community under the Chinese regime through conventional means. Today the movement has come a long way in that it engages the Chinese Government on every possible world stage including the online world. Online advocacy and digital activism forms an integral part of this movement as is reflected from the use of advanced e-mailing servers and social media as an activism tool to mobilise people online and press international bodies to extend support for the movement.&lt;/p&gt;
&lt;p&gt;Shibayan Raha, a young activist, will talk on the role of digital activism, online advocacy and the use of social media to further the cause of the Tibetan freedom movement.&lt;/p&gt;
&lt;h3&gt;About Shibayan Raha&lt;/h3&gt;
&lt;p&gt;Shibayan Raha is the grassroots co-coordinator for ‘Students for a Free Tibet, India’.&amp;nbsp; A native of Kolkata, he did various odd jobs in his hometown before devoting himself to social work, particularly the Tibetan freedom struggle, five years ago. As a grassroots co-coordinator, he takes the Tibetan issue to the youngsters and gathers more people to join the movement. He has been imprisoned thrice, twice in Tihar jail and once in the Colaba police station. Further, he has also been involved in other areas like the Bhopal gas leak tragedy, the Burmese issue and AFSPA.&lt;/p&gt;
&lt;p&gt;VIDEO&lt;/p&gt;
&amp;nbsp;
&lt;iframe src="http://blip.tv/play/AYLTqjcA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYLTqjcA" style="display:none"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/talk-by-shibayan-raha'&gt;https://cis-india.org/events/talk-by-shibayan-raha&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-23T05:46:27Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/information-technology-act">
    <title>Civil Liberties and the amended Information Technology Act, 2000</title>
    <link>https://cis-india.org/internet-governance/blog/information-technology-act</link>
    <description>
        &lt;b&gt;This post examines certain limitations of the Information Technology Act, 2000 (as amended in 2008). Malavika Jayaram points out the fact that when most countries of the world are adopting plain English instead of the conventional legal terminology for better understanding, India seems to be stuck in the old-fashioned method thereby, struggling to maintain a balance between clarity and flexibility in drafting its laws. The present Act, she says, is although an improvement over the old Act and seeks to address and improve on certain areas in the right direction but still comes up short in making necessary changes when it comes to fundamental rights and personal liberties. The new Act retains elements from the previous one making it an abnormal document and this could have been averted if there had been some attention to detail. &lt;/b&gt;
        
&lt;p&gt;After close to a decade of dealing with English statutes, European directives and pan-European regulations, I was struck anew by the antique style of Indian draftsmanship on my return. Much of the world is moving away from stiff legal speech and&amp;nbsp;&amp;nbsp; towards plain English. Even England has converted to a simpler, more concise legal rhetoric. India, however, has a peculiar genius for imprecision and euphemism that makes the purpose and implications of the law hard to understand and apply. While it may seem quaint, to pepper a law with terms like ‘inconvenience’, ‘nuisance’ or ‘annoyance’, the language fails to convey&amp;nbsp; the&amp;nbsp; seriousness of the offences being defined. A reading of the Information Technology Act, 2008, in its new incarnation incorporating the latest amendments and rules (ITA), is a case in point.&lt;/p&gt;
&lt;p&gt;Legal draftsmen inevitably wrestle with the age-old dilemma of the generic versus the specific, the potential dangers of a broad definition versus the built-in obsolescence of a narrow spotlight. The crafters of the ITA, in their admittedly admirable attempts to redress some of the gaps and ambiguity in the original law, appear to have struggled in their efforts to strike a balance between clarity and flexibility. While the new avatar is certainly an improvement in some areas, one can’t help but regret the missed opportunity to make necessary changes. Most importantly is the negative impact of the occasionally sloppy and sometimes overly wide drafting on deeply cherished fundamental rights and personal liberties.&lt;/p&gt;
&lt;p&gt;Among other things, the ITA has sought to address and improve aspects such as technology neutrality, data protection, phishing and spam, child pornography, the liability of intermediaries and cyber terrorism. While many of these amendments are a step in the right direction, the actual drafting that implements the high level objectives suffers in many respects. For example, the previous emphasis on ‘digital signatures’ has shifted to the technologically neutral ‘electronic signatures’ but the changes have not been carried out thoroughly enough to expunge the old concept entirely. The current law is a bit of an abnormal document in that it contains elements of both concepts, which some attention to detail could easily have averted. Another example is that the provisions meant to combat spam and phishing end up using the dreaded ‘annoyance’ and ‘inconvenience’ terminology with the effect of casting the net of criminality over far more than is appropriate. For example, mail sent with the purpose of causing ‘annoyance’ or ‘inconvenience’ (not exactly the worst offence in the offline world) could put someone behind bars.&lt;/p&gt;
&lt;p&gt;An important set of well intentioned but woefully inadequate provisions are those relating to the protection of data. The absence of a specific law on data protection had, in itself, garnered much criticism both within the country as well as in the context of international transactions and outsourcing. The old Act offered the feeble protection of a single provision (section 43) that dealt with unauthorised access and damage to data. In an attempt to meet industry demands and international market standards, the ITA introduced two sections that address civil and criminal sanctions. While this exercise understandably falls far short of a comprehensive law relating to data (being squeezed into an omnibus piece of technology related legislation, rather than one geared up only to deal with data), there was considerable anticipation of its role in papering over the existing cracks and provide a workable, if temporary, data protection regime.&lt;/p&gt;
&lt;p&gt;However, the attempt is such a limited one, and so replete with shortcomings that the need for a ‘proper’ data protection law still stands. Given the proposed initiation of the UID scheme, in particular, there is a compelling need for a robust and intelligent law in this regard. Most other countries’ regimes clearly do at least the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;define and classify types of data (for example, in most European countries, ‘personal data’ is any data that identifies an individual, ‘sensitive personal data’ is data that reveals details of ethnicity, religion, health, sexuality, political opinion, etc.),&lt;/li&gt;&lt;li&gt;fine-tune the nature of protection to the categories of data (i.e., greater standards of care around sensitive personal data),&amp;nbsp;&lt;/li&gt;&lt;li&gt;apply equally to data stored offline and manually as to data stored on computer systems,&amp;nbsp;&lt;/li&gt;&lt;li&gt;distinguish between a data controller (i.e., one who takes decisions as to data) and a data processor (i.e., one who processes data on the instructions of the data controller),&amp;nbsp;&lt;/li&gt;&lt;li&gt;impose clear restrictions on the manner of data collection (for example, must be obtained fairly and lawfully),&lt;/li&gt;&lt;li&gt;give clear guidelines on the purposes for which that data can be put to and by whom (often involving a consent requirement that gives the individual a great degree of control over their data),&lt;/li&gt;&lt;li&gt;require certain standards and technical measures around the collection, storage, access to, protection, retention and destruction of data,&amp;nbsp;&lt;/li&gt;&lt;li&gt;ensure that the use of data is adequate, relevant and not excessive given the purpose for which it was gathered,&lt;/li&gt;&lt;li&gt;cater for opt-in and opt-out type regimes, again to provide individuals with a measure of control over the use of their data even after the stage of initial collection (which has a huge impact on invasive telemarketing or unsolicited written communication)&lt;/li&gt;&lt;li&gt;impose a knowledge requirement and procedures for allowing individuals to seek information on what data is held on them, and&lt;/li&gt;&lt;li&gt;create safeguards and penalties that are well tailored to breaches of any of the above.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Unfortunately, and perhaps understandably, the ITA barely begins to scratch the surface of what a good data protection regime entails. The provisions that it does introduce (sections 43-A and 72-A) have glaring inadequacies. Briefly:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;the term ‘sensitive personal data or information’ is used indiscriminately without any definition,&lt;/li&gt;&lt;li&gt;the provisions only cover electronic data and records, not data stored in non-electronic systems or media,&lt;/li&gt;&lt;li&gt;they offer no guidance on most of the principles set out above such as in relation to accuracy, adequacy, consent, purpose, etc.,&lt;/li&gt;&lt;li&gt;in the absence of the controller-processor distinction, liability is imposed on persons, who are not necessarily in a position to control data, even if it is in their possession,&lt;/li&gt;&lt;li&gt;civil liability for data breaches only arises where ‘negligence’ is involved (i.e., failure to have security procedures or failure to implement them correctly will not automatically result in damages unless negligence is proven),&lt;/li&gt;&lt;li&gt;similarly, criminal liability only applies to cases of information obtained in the context of a service contract, and requires an element of ‘wilfulness’, or a disclosure without consent or in breach of a lawful contract – this is a very limited remit aimed largely at preventing disgruntled or unscrupulous employees from dealing in company/customer data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;For these broad reasons, we can see that even the amended ITA disappoints those who expected a greatly improved regime in relation to data. It is widely anticipated that the UID scheme, which poses so many potential data protection issues, will serve as a catalyst for a standalone law that is on par with the more sophisticated regimes that function very well in other countries. One great feature common to most of those regimes is that they are consumer/individual focused. The freedom and privacy of the individual is the central concern of protection. Our ITA seems far more concerned with providing corporates with a stick to beat errant employees with, and with catering to the needs of the outsourcing and IT industries.&amp;nbsp; It remains to be seen whether the UID scheme will merely galvanise some targeted legal action covering UIDs rather than generating a broad based piece of legislation.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to the criticisms levelled at the data protection provisions, the other large subset of concerns has been in relation to the civil liberties implications of the ITA. There has been some horror expressed in various forums and media about the ITA contributing to the growth of a police state, to severe curtailment of the freedom of speech and expression, to the invasion of privacy, and to the disproportionate severity of penalisation for offences that are placed on crimes committed in cyberspace compared to crimes committed in the hear and now. Sadly, this is true to a large extent given the clunky treatment of ‘cyber terrorism’, the intolerable pre-censorship that is enabled by the blocking of websites, the broad approach to the monitoring and collection of data, and the demanding obligations of intermediaries to cooperate with interception, monitoring and decryption of data for poorly defined reasons.&lt;/p&gt;
&lt;p&gt;While our Constitution’s fundamental rights chapter, which enshrines certain basic, democratic, and profound rights, might not have the same vocabulary of due process as we see in the US, it nevertheless requires restrictions to be reasonable. Precedents and the wider jurisprudence in the field have further developed the concepts of checks and balances, procedural safeguards and legitimacy of restraints that a functioning democracy like India must accord to its people. It can be argued that several provisions of the ITA cause significant tension with the right to freedom of speech and expression, the right against self-incrimination, the right to equality before the law, and&amp;nbsp; the right to practice a trade or profession. To briefly deal with the worst offenders in the IT Act, I have divided them into some broader topics:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pre-censorship&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Some of the most excessive provisions relate to the free hand with which public access to websites can be blocked. Previously, there was some hope that the rules yet to be formulated in connection with section 69-A would offer some procedural safeguards. The recently notified rules do contain details – in the bureaucratese that we have come to expect – of the process to be followed by the designated functionaries. They also permit the concerned person or intermediary to submit a reply and clarifications to the committee before the decision to block access is taken.&lt;/p&gt;
&lt;p&gt;These rules are to a large extent undermined by rule 9 (“Blocking of information in cases of emergency”), which provides that, “…&lt;em&gt;in any case of an emergency nature, for which no delay is acceptable&lt;/em&gt;…”, the process will turn into an internal escalation within the department of IT and interim directions relating to blocking access may be issued &lt;em&gt;without giving (him) an opportunity of hearing&lt;/em&gt;. There are those who think that, given the events of 26/11, this is wholly justified but the prospect of abuse fills others with dread. The rules may offer detailed time-frames within which orders are made and approved, require reasons to be recorded in writing, provide that emergency orders may be revoked and information unblocked, etc. Regardless, the nature of the process (executive rather than judicial), the ease with which it can be abused, and the fact that the review committee will only meet once in two months to check for compliance, set aside incorrect orders and unblock information, does not offer much comfort. If a site is incorrectly blocked, it could take up to two months for this to be rectified, which could cause a great damage to the owner of the site, and indeed to the wider public that has an interest in uncensored, free speech.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Given that any person can submit a request, it is not unreasonable to anticipate a certain level of frivolous and malicious requests for blocking sites, especially given that the grounds for blocking are very wide (the often repeated set that we are familiar with, namely, in the interest of sovereignty and integrity of India; relating to defence of India/ security of State/ friendly relations with foreign states/ public order and for preventing incitement to commission of any cognizable offences). Without a review committee constantly monitoring and policing the unbridled use of the provisions, the backlog of blocking decisions that may need to be reversed can become a mountain very quickly. The dangers of pre-censorship and the curtailment of dialogue, debate and free speech are even greater in a country with an increasingly thin-skinned populace. Faced with a volatile backdrop of great diversity of religion, political opinions, views on sexuality, morality, obscenity and other highly subjective values and beliefs, there is immense extra-legal pressure on free speech. Thus, there is now a need for greater vigilance so that the thought police do not wield the stick of harsh penalties under the ITA without reason and due process.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Privacy and surveillance&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This topic pulls together concerns around the blanket monitoring and collecting of traffic data or information,&amp;nbsp; the interception and decryption (under duress) by intermediaries (now a large superset of ISPs, search engines, cyber cafes, online auction sites, online market places, etc.) and the wide definition of ‘cyber terrorism’ (which ludicrously even casts defamation as a terrorist activity).&lt;/p&gt;
&lt;p&gt;Some of the broad concerns in relation to interception, monitoring and decryption in (section 69) are that:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;there is no provision for a clear nexus between an intermediary and the information or resource sought to be monitored or intercepted,&lt;/li&gt;&lt;li&gt;the usual internationally recognised exception to liability where an intermediary operates purely as a conduit and has no control over data flowing through its network is not clearly spelt out,&lt;/li&gt;&lt;li&gt;the penalties for non-cooperation are extremely harsh, especially given the absence of a) and b) above,&lt;/li&gt;&lt;li&gt;these onerous penalties can be said to be in violation of Article 14 as they seem entirely disproportionate. Similar offences and remedies in the Code of Criminal Procedure or the Indian Penal Code prescribe less severe penalties, by an order of magnitude in fact. When the only difference between the offences is the medium in which information is contained, it seems arbitrary to impose a much harsher punishment on an online intermediary than on a member of the public who, for example, furnishes false information to the police in connection with a trial or enquiry.&lt;/li&gt;&lt;li&gt;the rules made in relation to monitoring, interception and decryption, offer some procedural safeguards, in that they impose a time limit on how long a directive for interception or monitoring can remain in force, a ceiling on how long data can be kept before it is required to be destroyed, etc. However, the effect of these is greatly diluted by exceptions “for functional requirements”, etc. The astonishing irony is that rule 20 requires the intermediary to maintain “…&lt;em&gt;extreme secrecy&lt;/em&gt;…” and “…&lt;em&gt;utmost care and precaution&lt;/em&gt;…” in the matter of interception, monitoring or decryption of information “…&lt;em&gt;as it affects the privacy of citizens&lt;/em&gt;…”!!!!&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;In a similar vein, there are concerns around the monitoring and collection of traffic data (section 69B) as the section contains an unreasonably long list of grounds for monitoring. These include such extreme excesses as “forecasting of imminent cyber incidents”, “monitoring network application with traffic data or information on computer resource”, “identification and determination of viruses/computer contaminant”, and the catch-all “any other matter relating to cyber security”.&lt;/p&gt;
&lt;p&gt;Finally, the main criticism of the ITA approach to ‘cyber terrorism’ is the very wide net that it seeks to cast, looking for a game that has little or nothing to do with the named offence. Amongst the cast of creatures unwittingly caught during this fishing expedition, we find some unlikely victims. In addition to the usual grounds of offence against sovereignty, national security, defence of India, etc., which we have seen in relation to other sections, the ITA considers the following as acts of cyber terrorism – broadly speaking, unauthorised access to information that is likely to cause:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;injury to decency,&lt;/li&gt;&lt;li&gt;injury to morality,&lt;/li&gt;&lt;li&gt;injury in relation to contempt of court, and&lt;/li&gt;&lt;li&gt;injury in relation to defamation.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;This would almost be laughable if these grounds were not enacted unto law, posing a threat to civil liberties by their very existence. Other countries have some notion of political ideology, religious case, etc. in their view of terrorism. That (a) to (d) above have been shoehorned into a clause that imposes the stiffest penalty within the entire ITA (life imprisonment) gives even more cause for concern.&lt;/p&gt;
&lt;p&gt;In closing, I should reiterate that the ITA includes other deficiencies and worthwhile improvements alike, but an article focusing largely on the data protection and civil liberties aspects cannot reference them all.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/information-technology-act'&gt;https://cis-india.org/internet-governance/blog/information-technology-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Malavika Jayaram</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:13:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill">
    <title>Feedback to the NIA Bill</title>
    <link>https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill</link>
    <description>
        &lt;b&gt;Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.&lt;/b&gt;
        
&lt;p&gt;The UID draft bill is a proposed legislation that authorizes the creation of a centralized database of unique identification numbers that will be issued to every resident of India.&amp;nbsp; The purpose of such a database is characterized as ensuring that every resident is provided services and benefits. The UID project was first set up and introduced to the public in February 2009 by the planning committee.&amp;nbsp;&amp;nbsp;&amp;nbsp; In June 2010, a draft bill was proposed which attracted public debates and opinions for over two weeks. Currently the bill is being considered by Parliament in the winter session (July-August 2010). If the Parliament of India approves the bill, it may be enacted during Winter 2010.&lt;/p&gt;
&lt;p&gt;CIS has closely followed the UID project and reviewed the bill right from the time when it was first issued. and has worked to initiate and contribute to a public debate including attending of workshops in Delhi on 6 May, 2010 and in Bangalore on 16 May, 2010.&lt;/p&gt;
&lt;p&gt;We respect the fact that civil society has many voices. That said, in our criticisms, suggestions, and analysis of the UID draft bill, we are asking for a simple, well-defined document, the language and structure of which expressly precludes abuse of a centralized identification database. The document should provide solely for its stated purpose of enabling the provision of benefits to the poor. Along with this mandate we believe the document should give clear rights of choice, control, and privacy to the &lt;em&gt;Aadhaar&lt;/em&gt; number holder. Below is a summary of our general comments with citations to specific sections of the draft bill. A &lt;a href="https://cis-india.org/internet-governance/letter-to-uid-authority" class="internal-link" title="Feedback on the NIA Bill 2010"&gt;detailed&lt;/a&gt; section by section critique is attached along with our &lt;a href="https://cis-india.org/internet-governance/high-level-summary" class="internal-link" title="High Level Summary"&gt;high level summary&lt;/a&gt; of concerns. The compilation and synthesis of detailed critiques was done by Malavika Jayaram.&lt;/p&gt;
&lt;h2&gt;Summary of High Concerns&amp;nbsp;&lt;/h2&gt;
&lt;h3&gt;Clarity of Definition and Purpose&lt;/h3&gt;
&lt;p&gt;Most importantly we find that in order to adhere to the stated purpose of the bill there is a need to limit and better define language in the relevant sections of the bill. This includes the powers and purpose of the Authority and the overarching scheme of the bill. We are concerned that the over-breadth and generality of the language will open up the opportunity for more information to be collected than originally stated. Further, definition will act to prevent uncontrolled or unwanted change in the project’s scope, and will clearly limit the usage of the &lt;em&gt;Aadhaar&lt;/em&gt; numbers to the facilitation of the delivery of social welfare programs.&lt;br /&gt;&lt;br /&gt;For the bill to be in line with its original purpose of reaching out to the poor, we also believe the issue of fees must be addressed. We find that there is an inadequate definition in the bill of what fees shall be applied for authentication of &lt;em&gt;Aadhaar&lt;/em&gt; numbers.&amp;nbsp; Also we find that it is incompatible with the bill’s stated purpose to require an individual to pay to be authenticated. The bill should provide that no charges will be levied for authentication by registrars and other service providers for certain categories of &lt;em&gt;Aadhaar&lt;/em&gt; number holders (BPL, disabled, etc.), and that charges will be limited/capped in other cases. This will bring the bill in line with the statement in Chapter II 3 (1) “Every resident shall be entitled to obtain an &lt;em&gt;Aadhaar&lt;/em&gt; number on providing his demographic information and biometric information to the Authority in such a manner as may be specified by regulations”&amp;nbsp; and Chapter 3 (10 ) “The Authority shall take special measures to issue &lt;em&gt;Aadhaar&lt;/em&gt; numbers to women, children, senior citizens, persons with disability, migrant unskilled and unorganized workers, nomadic tribes or such other persons who do not have any permanent dwelling house and such other categories of individuals as may be specified by regulations. If a fee must be permitted, a cap/safeguard should be put in place to ensure that the fee does not become a mechanism of abuse.&lt;/p&gt;
&lt;h3&gt;Protection of the Citizen&lt;/h3&gt;
&lt;p&gt;The bill should ensure the protection of&amp;nbsp; citizens’ rights to privacy and freedom of choice. To do this it is important that the bill is voluntary, allows for the protection of anonymity, and is clear on how data will be collected, stored and deleted. Measures should be taken towards ensuring that the &lt;em&gt;Aadhaar&lt;/em&gt; number is truly voluntary. Accordingly, a prohibition against the denial of goods, services, entitlements and benefits (private or public) for lack of a UID number – provided that an individual furnishes equivalent ID is necessary.&amp;nbsp; The bill should also spell out the situations in which anonymity will be preserved and/or an &lt;em&gt;Aadhaar&lt;/em&gt; number should not be requested such as a person’s sexuality/sexual orientation and marital status/history. Furthermore, the bill should require the Authority, registrars, enrolling agencies and service providers to delete/anonymize/obfuscate transaction data according to defined principles after appropriate periods of time in order to protect the privacy of citizens.&lt;/p&gt;
&lt;h3&gt;Motivations of the UID Bill&lt;/h3&gt;
&lt;p&gt;Since the submission of the high level summary, we note that a list of 221 agencies empanelled by the UIDAI has been uploaded onto the website (by a memo dated 15 July, 2010). A swift reading reveals that most of the agencies who are going to help enroll people into the UIDAI system are not NGOs, CSOs or other welfare oriented not-for-profit entities; rather, they are largely IT companies and commercial enterprises. This begs the question as to whether the UID scheme/&lt;em&gt;Aadhaar&lt;/em&gt; is truly geared towards delivery of benefits and inclusivity of the poor and marginalized. Already concerns have been voiced that the “ecosystem” of registrars and enrolling agencies contemplated by the scheme, to the extent that it envisages a public-private partnership, could firstly, be “hijacked” or “captured” by commercial motives and result in sharing of data, security breaches, compromised identities, loss of privacy, data mining and customer profiling, and secondly, end up neglecting the very sections of society that the scheme allegedly most wants to help. The list of empanelled companies makes this even more likely and imminent a concern. Without casting aspersions on any of those entities, we would like to highlight that this sort of delegated structure raises several concerns.&lt;/p&gt;
&lt;p&gt;Additionally, we find the speed and efficiency with which the UIDAI juggernaut is signing MoUs with states, banks and government agencies on the one hand, and issuing tenders, RFPs, RFQs and otherwise seeking proposals and awarding contracts to private entities – in the absence of any Parliament-sanctioned law (the bill is still a draft, and yet to even be placed before the Parliament) to be alarming. Along with news of the increasing costs of the project and doubts about how foolproof the technology will be, it is staggering to imagine that something that raises so many concerns is being pushed through without a more serious debate. The lack of formal procedures and open debates makes one wonder how democratic the actual process is.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;To conclude, CIS believes that the UID bill threatens the rights of citizens in India, and appeals to the citizen to think critically of its implications and consequences.&lt;/p&gt;
&lt;p&gt;1. &lt;a href="https://cis-india.org/internet-governance/letter-to-uid-authority" class="internal-link" title="Feedback on the NIA Bill 2010"&gt;Detailed Summary pdf (159kb)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-summary" class="internal-link" title="High Level Summary"&gt;2. High Level Summary (77kb)&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill'&gt;https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Submissions</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:14:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/debate-on-uid">
    <title>More Debate on UID Project Needed</title>
    <link>https://cis-india.org/news/debate-on-uid</link>
    <description>
        &lt;b&gt;A press conference on UID was held at the Press Club in Bangalore on 26 July, 2010. It was co-organised by Citizen's Action Forum, Alternate Law Forum and the Centre for Internet and Society. Mathew Thomas and Vinay Baindur spoke about the UID. Proceedings from the conference was covered in the Hindu on 27 July, 2010.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/publications/uid-coverage-hindu" class="internal-link" title="More Debate on UID"&gt;More Debate on UID&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/debate-on-uid'&gt;https://cis-india.org/news/debate-on-uid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T11:13:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/uid-udayavani-news">
    <title>UID coverage in Udayavani</title>
    <link>https://cis-india.org/news/uid-udayavani-news</link>
    <description>
        &lt;b&gt;A press conference was held at the Press Club in Bangalore on 26 July, 2010. It was co-organised by Citizen's Action Forum, Alternate Law Forum and the Centre for Internet and Society. Mathew Thomas and Vinay Baindur were the speakers. Leading Kannada newspaper Udayavani covered this event.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/publications/cis/uid-udayavani" class="internal-link" title="UID coverage in Udayavani"&gt;UID coverage in Udayavani&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For reading the original &lt;a class="external-link" href="http://207.218.202.244/epaper/PDFList.aspx?Pg=H&amp;amp;Edn=BN&amp;amp;DispDate=7/27/2010"&gt;click here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/uid-udayavani-news'&gt;https://cis-india.org/news/uid-udayavani-news&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T11:13:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/june-2010-bulletin">
    <title>June 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/june-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet &amp; Society. We bring you updates of our research, news and media coverage, information on events for the month of June 2010.&lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;News Updates &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Dont hang up on this one&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;Is 3G the next twist in the mobile phone growth story?&lt;br /&gt; &lt;a href="http://bit.ly/9NkaVP" target="_blank"&gt;http://bit.ly/9NkaVP&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Peeping Toms In Your Inbox &lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;Nothing’s safe any more—not your mobile number, nor your e-mail—as they’re put on offer for the benefit of telemarketers, writes Namrata Joshi and Neha Bhatt in an article published in the Outlook.&lt;br /&gt; &lt;a href="http://bit.ly/ckmRRH" target="_blank"&gt;http://bit.ly/ckmRRH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I don't want my fingerprints taken&lt;/b&gt;&lt;br /&gt; Through this article published in Down to Earth, Nishant Shah looks at the role of the state as arbiter of our privacy.&lt;span&gt;&lt;br /&gt; &lt;/span&gt;&lt;a href="http://bit.ly/aYdMia" target="_blank"&gt;http://bit.ly/aYdMia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;An artist's hunt for lost stepwells&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;As part of the Maps for Making Change project, Kakoli Sen has brought to light some facts which she stumbled upon while mapping the stepwells in Vadodara. She mapped these and also discovered 14 such architectural heritage structures. The news was covered in the Times of India.&lt;br /&gt; &lt;a href="http://bit.ly/dxtwJU" target="_blank"&gt;http://bit.ly/dxtwJU&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Facebook, privacy and India &lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;Does Facebook's decision to open out user information and data to third party websites amount to an invasion of privacy and should users' seriously consider getting out of the site? Sunil Abraham doesn't think so.&lt;br /&gt; &lt;a href="http://bit.ly/a2HzhT" target="_blank"&gt;http://bit.ly/a2HzhT&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;APC starts research into spectrum regulation in Brazil, India, Kenya, Morocco, Nigeria and South Africa&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;Communication infrastructure is the foundation of the knowledge-based economy and while there has been a boom in the construction of undersea cables bringing potentially terabits of capacity to the African continent, the ability to deliver broadband to consumers is hampered by inefficient telecommunications markets and policies. Wireless connectivity offers tremendous potential to deliver affordable broadband to developing countries but inefficient spectrum policy and regulation means the opportunity to seize the advantages brought about by improvements in wireless broadband technologies are extremely limited.&lt;br /&gt; &lt;a href="http://bit.ly/a67ut8" target="_blank"&gt;http://bit.ly/a67ut8&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WIPO Proposals Would Open Cross-Border Access To Materials For Print Disabled&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;The print disabled feel that the possible UN recommendations being negotiated upon may come up short, reports Kaitlin Mara in this article.&lt;br /&gt; &lt;a href="http://bit.ly/99kbS0" target="_blank"&gt;http://bit.ly/99kbS0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Potential of Open Development for Canada and Abroad &lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;IDRC held a panel discussion on 'The Potential of Open Development for Canada and Abroad' on May 5, 2010 in Ottawa.&lt;br /&gt; &lt;a href="http://bit.ly/aSp8J3" target="_blank"&gt;http://bit.ly/aSp8J3&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A letter to CGIAR in support of Open Access &lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;Professor Subbiah Arunachalam wrote a letter to CGIAR apprising them of the need for, and advantages of making their research output Open Access. &lt;br /&gt; &lt;a href="http://bit.ly/doJmAe" target="_blank"&gt;http://bit.ly/doJmAe&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Internet, Culture, and Society - Looking at Past, Present, and Future Worldwide&lt;/b&gt;&lt;br /&gt; It is now well known that with 4.5 billion mobile phone owners in the world and increased Internet penetration, global cultures and communities have experienced shifts in their economic, political, and social well-being due to the digital revolution. As a scholar and consultant who works worldwide, Prof Ramesh Srinivasan will illustrate how new media technologies have been used creatively to enable political movements in Kyrgyzstan, literacy and educational reform in India, and economic development across the developing world. In addition to this, he will discuss some of digital culture's biggest challenges, including considering how the Web can start to empower different types of cultural perspectives and knowledges.&lt;br /&gt; &lt;a href="http://bit.ly/c9cIvc" target="_blank"&gt;http://bit.ly/c9cIvc&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Survey: Digital Natives with a cause?&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;This survey seeks to consolidate information about how young people who have grown up with networked technologies use and experience online platforms and tools. It is also one of the first steps we have taken to interact with Digital Natives from around the world — especially in emerging information societies — to learn, understand and explore the possibilities of change via technology that lie before the Digital Natives. The findings from the survey will be presented at a multi-stakeholder conference later this year in The Netherlands.&lt;br /&gt; &lt;a href="http://bit.ly/cUtKhV" target="_blank"&gt;http://bit.ly/cUtKhV&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Queer Histories of the Internet: An Introduction&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;Nitya Vasudevan and Nithin Manayath introduce the Queer Histories of the Internet through this blog post discussing broadly the relationship between queer identity and technology.&lt;br /&gt; &lt;a href="http://bit.ly/9xdYRv" target="_blank"&gt;http://bit.ly/9xdYRv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Separating the 'Symbiotic Twins'&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;This post tries to undo the comfortable linking that has come to exist in the ‘radical’ figure of the cyber-queer. And this is so not because of a nostalgic sense of the older ways of performing queerness, or the world of the Internet is fake or unreal in comparison to bodily experience, and ‘real’ politics lies elsewhere. This is so as it is a necessary step towards studying the relationship between technology and sexuality.&lt;br /&gt; &lt;a href="http://bit.ly/9PV9YW" target="_blank"&gt;http://bit.ly/9PV9YW&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The power of the next click...&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;P2P cameras and microphones hooked up to form a network of people who don't know each other, and probably don't care; a series of people in different states of undress, peering at the each other, hands poised on the 'Next' button to search for something more. Chatroulette, the next big fad on the Internet, is here in a grand way, making vouyers out of us all. This post examines the aesthetics, politics and potentials of this wonderful platform beyond the surface hype of penises and pornography that surrounds this platform.&lt;br /&gt; &lt;a href="http://bit.ly/95twmz" target="_blank"&gt;http://bit.ly/95twmz&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;India's sorry spectrum story &lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;In this article published in the Business Standard on June 3, 2010, Shyam Ponappa analyses the spectrum story in India. He says that the approach to spectrum management is an object lesson in how not to use information and communications technology for development. &lt;br /&gt; &lt;a href="http://bit.ly/cojFFT" target="_blank"&gt;http://bit.ly/cojFFT&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/june-2010-bulletin'&gt;https://cis-india.org/about/newsletters/june-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-10T09:38:46Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/networking-not-working">
    <title>Networking? Not working</title>
    <link>https://cis-india.org/news/networking-not-working</link>
    <description>
        &lt;b&gt;Concerns about privacy, wastage of time and trivialized communication are some reasons ‘refuseniks’ are going off sites such as Facebook and MySpace, writes Shreya Ray in Livemint.&lt;/b&gt;
        
&lt;p&gt;Pune-based law student Arjun Khera, 24, broke many a Facebook stalker’s heart in April when he announced his decision to quit the network one fine afternoon on his status message. “Guys, I’m deleting my Facebook account. Please send me all your email and phone details,” he said. Almost immediately, there was an explosion of concern in his notification window. Why was the effervescent and popular part-time actor and full-time Facebook enthusiast committing Facebook suicide? “What happenedddddd?” (sic) &lt;br /&gt;“Everything ok, dude?”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“It was eating into my life,” Khera says. “I was always logged on, always leaving or commenting on status messages, waiting a few minutes to see if there had been any responses to my comments, and comment some more. I didn’t go out for a walk any more, didn’t get photographs developed because I was only too busy seeing them on Facebook.” Khera signed up for his account in July 2007.&lt;/p&gt;
&lt;p&gt;Then, it was the one platform through which he could locate and reconnect with all his long-lost friends. He loved the fact that he could have a pictorial chronicle of his life; that he could “compare friends”, find out if indeed he was a glass of wine (and not a pint of beer) and fit a Shakespearean insult to his current mood. “With time, I got tired of those lame quizzes. I got sick of what it was doing to my time. I hated how it trivialized communication,” he says.&lt;/p&gt;
&lt;p&gt;Khera is part of a growing cult of social networking “refuseniks”. Although figures for sites such as MySpace, Orkut, Facebook and Twitter show an overall increase, some recent statistics suggest that not everyone wants to socialize this way. According to a study by TechCrunch Europe, the number of visitors to MySpace, UK, halved in just six months, from “just under 10 million at the start of the year to around 5 million as of the end of June 2010”, leading to a round of layoffs at its London office. “It would appear to show a pretty staggering decline,” says the report, released on 6 July.&lt;/p&gt;
&lt;h3&gt;The privacy factor&lt;/h3&gt;
&lt;p&gt;Environmental researcher Maddipatla Rajshekhar, 33, alumnus of the University of Sussex, UK, used Facebook to keep in touch with former classmates. On 31 May, however, along with the 30,000-odd people who had had enough of Facebook changing its privacy policies, he quit. “It was getting increasingly intrusive. Its latest feature let me see what some of my friends said on the walls of their friends—(who were) complete strangers to me,” he said.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Although the Quit Facebook group wasn’t a success in numerical terms (30,000 isn’t even close to a drop in the 450-million ocean), it successfully sent a message to Facebook CEO Mark Zuckerberg, who held a press conference in the last week of May on new privacy policies and changes.&lt;/p&gt;
&lt;p&gt;A May report brought out by the Pew Centre for Internet and American Life Project (of the Pew Research Centre, Washington, DC) finds that social media plays a “central role” in building one’s online identity. Quite naturally, privacy becomes a big issue. “Many users are learning and refining their approach as they go—changing privacy settings on profiles, customizing who can see certain updates and deleting unwanted information about them that appears online,” says the report. Interestingly, it also finds that young adults are more likely than older users to restrict what information is available and to whom, contrary to popular perception.&lt;/p&gt;
&lt;h3&gt;The next level&lt;/h3&gt;
&lt;p&gt;Privacy is not the refuseniks’ only issue, however. What social networking does to actual relationships is another, as Khera notes. Mumbai-based social worker Maya Ganesh, 35, too got tired of the constant blurring between friends and acquaintances, and having to constantly update her “limited” lists. “I regularly ignored friend requests but there were some requests not easy to ignore, especially some work connections. I also wanted a break from all the hectic ‘social activity’ that Facebook is about,” she says of her three-year-old account, which she abandoned in May.&lt;/p&gt;
&lt;p&gt;Ganesh had reached what Sunil Abraham, executive director, Center for Internet and Society, Bangalore, refers to as the end of the “hype cycle”. All technology goes through a standard process, says Abraham: People get hooked to it, then get tired of it, and it disappears. “Some tend to be sticky and last longer; the particular advantage of social networking sites like Facebook, Orkut and MySpace is that they bring a critical mass of community to individual users. It’s now difficult for people to get off a network simply because all their friends are on it,” he says.&lt;/p&gt;
&lt;p&gt;Conversely, though, he cites Harvard-based social networking researcher Danah Boyd, who says the reducing exclusivity quotient has also put many people off. “Parents getting online also... acts as a self-censorship mechanism,” Abraham adds.&lt;/p&gt;
&lt;p&gt;Most of the people who have deleted their accounts are happy with the way their non-virtual life now takes centre stage. Khera enjoys sitting at home and doing nothing; Ganesh says she doesn’t miss being out of the loop. It may take a bit more effort to share holiday photographs or write an email every time you feel the need to connect; but as Rajshekhar says, “Anything for not losing touch, anything for richer conversations.”&lt;/p&gt;
&lt;p&gt;Varuni Khosla contributed to this story.&lt;/p&gt;
&lt;p&gt;See the original article in &lt;a class="external-link" href="http://www.livemint.com/2010/07/13204938/Networking-Not-working.html?h=B"&gt;livemint&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/networking-not-working'&gt;https://cis-india.org/news/networking-not-working&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T11:12:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
