<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 396 to 410.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/future-tech-and-future-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2018-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-november-30-2018-are-chinese-video-apps-violating-the-indian-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/internet-freedom-at-crossroads-common-paths-towards-strengthening-human-rights-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work">
    <title>A Gendered Future of Work</title>
    <link>https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work</link>
    <description>
        &lt;b&gt;This paper aims to contextualise the narrative around digitalisation and automation with reference to women's labour in India. 

The paper has been authored by Ambika Tandon and Aayush Rathi, edited by Elonnai Hickok and Rakhi Sehgal. Research assistance has been provided by Divya Kushwaha.&lt;/b&gt;
        
&lt;h3&gt;Abstract&lt;/h3&gt;
&lt;p&gt;Studies around the future of work have predicted technological disruption&amp;nbsp;across industries, leading to a shift in the nature and organisation of work, as well as the substitution of&amp;nbsp;certain kinds of jobs and growth of others. This paper seeks to contextualise this disruption for women workers in India.&amp;nbsp;The paper argues that two aspects of the structuring of the labour market will be pertinent in shaping the&amp;nbsp;future of work: the gendered nature of skilling and skill classification, and occupational segregation along&amp;nbsp;the lines of gender and caste. We will take the case study of the electronics manufacturing sector to flesh&amp;nbsp;out these arguments further. Finally, we bring in a discussion on the platform economy, a key area of&amp;nbsp;discussion under the future of work. We characterise it as both generating employment opportunities,&amp;nbsp;particularly for women, due to the flexible nature of work, and retrenching traditional inequalities built&amp;nbsp;into non-standard employment.&lt;/p&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;The question on the future of work across the global North - and parts of the global South - has recently been raised with regards to technological disruption, as a result of digitisation, and more recently, automation (Leurent et al., 2018). While the former has been successively replacing routine cognitive tasks, the latter, defined as the deployment of cyber-physical systems, will enable the replacement of manual tasks previously being performed using human labour (Leurent et al., 2018). In combination, these are expected to have a twofold effect on: the “structure of employment”, which includes occupational roles and nature of tasks, and “forms of work”, including interpersonal relationships and organization of work (Piasna and Drahokoupil, 2017). Building from historical evidence, the diffusion of digitising or automative technologies can be anticipated to take place differently across economic contexts, with different factors causing varied kinds of technological upgradation across the global North and South. Moreover, occupational analysis projects occupations in the latter to be at a significantly higher risk of being disrupted than the former (WTO, 2017).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, these concerns are somewhat offset by the barriers to technological adoption that exist in lower income countries such as lower wages, and a relatively higher share of non-routine manual jobs (WTO, 2017). 1 With the global North typically being early and quicker adopters of automation technologies, the differential technology levels in countries have been in fact been utilised to understand global inequality (Foster and Rosenzweig, 2010). Consequently, the labour-cost advantage that economies in the global South enjoy may be eroded, leading to what may be understood as re-shoring/back shoring - a reversal of offshoring (ILO, 2017). This may especially be the case in sectors where there has been a failure to capitalise on the labour-cost advantage by evolving supplier networks to complement assembly activities (such as in manufacturing) (Milington, 2017), or production of high-value services (such as in the services sector).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Extensive work over the past three decades has been conducted on the effects of liberalisation and globalisation on employment for women in the global South. This has explored conditional empowerment and exploitation as women are increasingly employed in factories and offices, with different ways of reproducing and challenging patriarchal relations. However, the effects of reshoring and technological disruption have yet to be explored to any degree of granularity for this population, which arguably will be one of the first to face its effects. This can be seen as a consequence of industries that rely on low cost labour being impacted first by re-shoring, such as textile and apparel and electronics manufacturing (Kucera and Tejani, 2014).&lt;/p&gt;
&lt;p&gt;Download the full paper &lt;a href="https://cis-india.org/internet-governance/pdf-gendered-future-of-work" class="internal-link" title="PDF Gendered Future of Work"&gt;here&lt;/a&gt;.&lt;a href="https://cis-india.org/internet-governance/pdf-gendered-future-of-work" class="internal-link" title="PDF Gendered Future of Work"&gt;&amp;nbsp;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work'&gt;https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ambika Tandon and Aayush Rathi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-07-21T06:29:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi">
    <title>Podcast on 'Abortion rights and privacy' with PI</title>
    <link>https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi</link>
    <description>
        &lt;b&gt;Ambika Tandon recorded a podcast with Privacy International on abortion rights, bodily autonomy, and privacy in the Indian and Argentinian context, which was released on December 6, 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The participants in the podcast are Eva Blum-Dumontet from Privacy International, Eduardo Ferreyra from Asociacion pos los Derechos Civiles, and Ambika herself. Listen to the &lt;a class="external-link" href="https://soundcloud.com/privacyinternational/gender-and-privacy-series-abortion"&gt;podcast here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi'&gt;https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T01:09:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu">
    <title>A Critical Look at the Visual Representation of Cybersecurity</title>
    <link>https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and design collective Design Beku came together on the 15th of November for a workshop on Illustrations and Visual Representations of Cybersecurity. Images in the public sphere such as visuals in the media, Wikipedia commons, and stock images - play a vital role in the public’s perception of cybercrime and cybersecurity. &lt;/b&gt;
        
&lt;ul&gt;
&lt;li&gt;Edited by Karan Saini / Illustrations by - Paul Anthony George, and Roshan Shakeel&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Download the &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/critical-look-at-visual-representation-of-cybersecurity/"&gt;file here&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The existing imagery comprises of largely stereotypical images of silhouettes of men in hoodies, binary codes, locks, shields; all in dark tones of blue and green. The workshop aimed at identifying the concerns with these existing images and ideating on creating visuals that capture the nuanced concepts within cybersecurity as well as to contextualise them for the Global South. It began with a discussion on the various concepts within cybersecurity including disinformation, surveillance in the name of security, security researchers, regulation of big technology companies, gender and cybersecurity, etc. This was followed by a mapping of different visual elements in the existing cybersecurity imagery to infer the biases in them. Further, an ideation session was conducted to create alternate visualisations that counter these biases. A detailed report of the workshop can be read &lt;a href="https://cis-india.org/internet-governance/workshop-on-cyber-security-illustrations"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants began by discussing the concerning impacts of present visualisations – there is a lack of representation and context of the global south. Misrepresentation of cybersecurity leads people to be susceptible to disinformation, treats cybercrime as an abstract concept that does not have a direct impact, and oversimplifies the problem and its solutions. The ecosystem in which this imagery exists also presented a larger issue. A majority of the images are created as clickbait alongside media articles. Media houses thus benefit from the oversimplification and mystification of cybersecurity in such images.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Through the mapping of existing images present online, several concerns were identified. The vague elements and unclear representation add to the mystification of cybersecurity as a concept. In present depictions, the use of technological devices and objects, leads to the lack of a human element, distancing the threat from any real impact to people using these devices. The metaphor of a physical threat is often used to depict cybersecurity using elements such as a lock and key. Recurring use of these elements gives a false idea of what is being secured or breached and how. Representations rely on tropes regarding the identity of hackers, and fail to capture the vulnerability of the system. The imagery gives the impression that systems which are breached are immensely secure to begin with and are compromised&amp;nbsp; only as a result of sophisticated attacks carried out by malicious actors. The identity of hackers is commonly associated with cyber attacks and breaches, and the existing imagery reinforces this. Visuals showing a masked man or a silhouette of a man in dark background are the usual markers of a malicious hacker in conventional cybersecurity imagery. While there is a lack of representation of women in stock cybersecurity images, another trope found was that of a cheerful woman coder. There were also images of faceless women with laptops&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The reductive nature of these images point to deeper concerns around gender representation in cybersecurity.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants examined what the implications of such visual representation would be, and why there is a need to change the imagery. How can visual depictions be more representative? Can they avoid subscribing to a homogenised idea of an Indian context – specific without being reductive? Can better depiction broaden understanding of cybercrime and emphasize the proximity of those threats? With technology, concepts are often understood through metaphors – how data is explained impacts how people perceive it. Visual imagery can play a critical role in demystifying concepts when done well; illustrations can change the discourse. They must begin to incorporate intersecting aspects of gender, privacy, susceptibility of vulnerable populations, generational and cultural gaps, as well as&amp;nbsp; manifestations of the described crimes to make technological laypersons more aware of the threat.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Potential new imagery would need to address aspects such as disinformation, the importance of privacy and who has a right to it, change representation of hackers, depict the cybersecurity community, explain specific concepts to both – the general user and to the people part of cybersecurity efforts in the country, the implications of cybercrime on vulnerable populations, and more in an attempt to deconstruct and disseminate what cybersecurity looks like today.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The ideation session involved rethinking specific concepts such as disinformation, and ethical hacking to create alternate imagery. For instance, disinformation was visually imagined as a distortion of an already distorted message being perceived by the viewer. In order to bring attention to the impact of devices, a phone was thought of as a central object to which different concepts of cybersecurity can be connected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/FakeNewsCascade.jpg" alt="null" class="image-inline" title="Fake News Cascade" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Fake News Cascade’ by Paul Anthony George&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/FakeNews.jpg" alt="null" class="image-inline" title="Fake News" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Fake News’ by Paul Anthony George&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Disinformation1.jpg" alt="null" class="image-inline" title="Disinformation 1" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Disinformation2.jpg" alt="null" class="image-inline" title="Disinformation 2" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Disinformation/ Fake News’&amp;nbsp; by Roshan Shakeel; The sketch is about questioning the validity of what we see online, and that every message we see is constructed in some form or the other by someone else.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;img src="https://cis-india.org/home-images/Disinformation3.jpg" alt="null" class="image-inline" title="Disinformation 3" /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Disinformation/ Fake News’&amp;nbsp; by Roshan Shakeel; &lt;/em&gt;The sketch visualizes how the source of information ('the original') gets distorted after a certain point.&lt;/p&gt;
&lt;p&gt;For ethical hacking, a visualisation depicting a day in the life of an ethical hacker was thought of to normalize hacking and to focus on their contribution in security research.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/ADayinLife.jpg" alt="null" class="image-inline" title="A Day in Life" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘A Day in the Life of an Indian Hacker’ by Paul Anthony George&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;img src="https://cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg" alt="null" class="image-inline" title="Surveillance in the name of Security" /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;'Surveillance in the Name of Security' by&lt;/em&gt; &lt;em&gt;Roshan Shakeel&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Resources on ethical hacking (HackerOne)&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; and hacker culture (2600.com)&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; were also consulted as part of the exercise to gather references on the work done by hackers. This allowed a deeper understanding of how the hacker community depicts itself.&amp;nbsp; Check Point Research&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt; and Kerala Police Cyberdome&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; were also examined for further insight into cybersecurity.&amp;nbsp; With regard to gender representation, sources that use visual techniques to communicate concerns and advocacy campaigns were also referred to. The Gendering Surveillance&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt; initiative by the Internet Democracy project&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt;, which looks at how surveillance harms and restricts women, also offered insights on the use of illustrations supporting the case studies. Another reference was the "Visualising Women's Rights in the Arab World"&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/a&gt; project by the Tactical Technology Collective&lt;a name="_ftnref9" href="#_ftn10"&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/a&gt;. The project aims to “strengthen the use of visual techniques by women's rights advocates in the Arab world, and to build a network of women with these skills”.&lt;a name="_ftnref10" href="#_ftn10"&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;More visual explainers and animations&lt;a name="_ftnref11" href="#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; from the Tactical Technology Collective were noted for their broader engagement with digital security and privacy. A video by the Internet Democracy Project that explains the Internet through &lt;em&gt;rangoli&lt;/em&gt;&lt;a name="_ftnref12" href="#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, was observed specifically for setting the concept in Indian context through the use of aesthetics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The workshop concluded with a discussion of potential visual iterations – imagery of cybersecurity that is not technology-oriented but focussed on the behavioural implications of access to such technology, illustrated public service announcements enhancing the profile of cybersecurity researchers or the everyday hacker. The impact of the discussion itself can indicate the relevance of such an effort. Artists and designers can be encouraged to create a body of imagery that shifts discourse and perception, to begin visualising for advocacy, demystify and stop the abstraction of cybercrime that can lead to a false sense of security, incorporate unique aspects of the debate within the Indian context, and generate new dialogue and understanding of cybersecurity. A potential step forward from this workshop would be to engage with the design community at large along with the domain experts to create more effective imagery for cybersecurity.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.hackerone.com/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://2600.com/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://research.checkpoint.com/about-us/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.cyberdome.kerala.gov.in/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://genderingsurveillance.internetdemocracy.in/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://internetdemocracy.in/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://visualrights.tacticaltech.org/index.html&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://tacticaltech.org/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://visualrights.tacticaltech.org/content/about-website.html&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://tacticaltech.org/projects/survival-in-the-digital-age-ono-robot-2012/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://internetdemocracy.in/2018/08/dots-and-connections/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.independent.co.uk/life-style/gadgets-and-tech/features/women-in-tech-its-time-to-drop-the-old-stereotypes-7608794.html&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu'&gt;https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Paromita Bathija, Padmini Ray Murray, and Saumyaa Naidu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-08-21T08:00:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude">
    <title>Teaching at Shristi Interlude</title>
    <link>https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude</link>
    <description>
        &lt;b&gt;Shweta Mohandas is participating as a mentor for Srishti Interlude (a set of workshops that help the design students to produce outputs on a given theme) the theme of this year is Privacy. The course would end on December 7, 2018.&lt;/b&gt;
        &lt;p&gt;1. Aravani Art Project&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Is LGBTQ desire only public at a             queer pride parade?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How private is my bedroom?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How does an insult unfold in ‘public view’ ? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt; 2. Padmini Ray Murray&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Is LGBTQ desire only public at a             queer pride parade?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How private is my bedroom?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; “Move fast and break things.” Do you trust Facebook with             your privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; 3. Joshua Muyiwa&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Is LGBTQ desire only public at a             queer pride parade?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How private is my bedroom?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Profits should be private, risks should be public and art             should be beautiful?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; 4. Roshan Sahi&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Profits should be private, risks             should be public and art should be beautiful?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; “Move fast and break things.” Do you trust Facebook with             your privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How does an insult unfold in ‘public view’ ? &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; 5. Shweta Mohandas&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; “Move fast and break things.” Do             you trust Facebook with your privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Is caste “Sensitive Personal Data”?           How does an insult unfold in             ‘public view’? &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; 6. Suresh Kumar&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Is caste “Sensitive Personal             Data”?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Profits should be private, risks should be public and art             should be beautiful?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How does an insult unfold in ‘public view’? &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude'&gt;https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-05T02:53:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy">
    <title>Report: From Oppression to Liberation: Reclaiming the Right to Privacy</title>
    <link>https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy</link>
    <description>
        &lt;b&gt;Eva Blum-Dumontet, Research Officer at Privacy International, published her report on gender and privacy on November 28, 2018. The report, titled 'From Oppression to Liberation: Reclaiming the Right to Privacy', traces the history of privacy as a tool of oppressing women across different spheres, eventually calling for a feminist reclamation of privacy. Ambika Tandon was quoted. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Whose  privacy are we fighting for when we say we defend the right to privacy?  In this report we take a hard look at the right to privacy and its  reality for women, trans and gender diverse people. We highlight how  historically privacy has been appropriated by patriarchal rule and  systems of oppression to keep women, trans and gender diverse people in  the private sphere. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;For  us, this report is also an opportunity to show how surveillance and  data exploitation are also uniquely affecting women, trans and gender  diverse people. We demonstrate how patriarchy and systems of oppression  rely on surveillance to perpetuate themselves and how surveillance and  data exploitation need the rigid and gender-normative categories of  patriarchy to function. We conclude by presenting how protecting the  right to privacy can address some of these challenges.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We hope this report will be read as a call for action: privacy needs to be reclaimed by women, trans and gender diverse people.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/from-opression-to-liberation"&gt;Download the report&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy'&gt;https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-05T02:48:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/future-tech-and-future-law">
    <title>Future Tech and Future Law</title>
    <link>https://cis-india.org/internet-governance/news/future-tech-and-future-law</link>
    <description>
        &lt;b&gt;The Dept. of IT &amp; BT, Government of Karnataka organised the 21st edition of Bengaluru Tech Summit from November 29, 2018 to December 1, 2018 at Palace Grounds, Bengaluru. Arindrajit Basu was a speaker at the panel on 'Future Tech and Future Law'.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;The discussion was moderated by Tanvi Ratna. Aayush's co-panelists were Apar Gupta,Jaideep Reddy and Nilesh Trivedi. During his remarks, he attempted to focus  on our AI research thus far and our suggestions for AI regulation.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;For more details &lt;a class="external-link" href="https://www.bengalurutechsummit.com/"&gt;see this page&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/future-tech-and-future-law'&gt;https://cis-india.org/internet-governance/news/future-tech-and-future-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-01-03T01:17:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018">
    <title>International Network on Feminist Approaches to Bioethics 2018</title>
    <link>https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018</link>
    <description>
        &lt;b&gt;The event was co-organized by Feminist Approaches to Bioethics and Sama - A Resource Centre for Women and Health and was held at St. John's Medical College in Bangalore between December 3 and 5, 2018. &lt;/b&gt;
        &lt;p&gt;Aayush Rathi and Ambika Tandon participated in the event as speakers. Aayush presented a paper 'Sexual Surveillance and Data Regimes: Development in the Data Economy' co-authored by himself and Ambika.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/fab-congress/"&gt;Download the agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018'&gt;https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-04T15:46:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2018-newsletter">
    <title>November 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/november-2018-newsletter</link>
    <description>
        &lt;b&gt;Our newsletter for the month of November.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS has &lt;a class="external-link" href="https://cis-india.org/about/statement-on-serious-allegations-on-social-media-24112018"&gt;published                     a statement&lt;/a&gt; on its website in response to the                   serious allegations against CIS members and the CIS                   workplace on social media. CIS has taken note of the                   concern raised on a social platform, and its Internal                   Committee (IC), constituted as per the Sexual                   Harassment of Women at Workplace (Prevention,                   Prohibition and Redressal) Act, 2013, has taken some                   critical steps. CIS has engaged &lt;a class="external-link" href="https://www.poshatwork.com/"&gt;POSH at Work&lt;/a&gt; to review the case and make recommendations to the                   Executive Director of CIS.&lt;/li&gt;
&lt;li&gt;Anubha Sinha                   attended the 37th meeting of WIPO SCCR held in Geneva                   in the month of November 2018. During the week she                   made two statements on behalf of CIS and participated                   in a panel discussion and a closed door meeting to                   brief government delegates from the Asia pacific                   region on the WIPO limitations and exceptions agenda.                   CIS made statements on &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/37th-sccr-cis-statement-on-the-agenda-on-limitations-and-exceptions"&gt;limitations                     and exceptions&lt;/a&gt; and the &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-views-on-on-the-proposed-wipo-treaty-for-the-protection-of-broadcasting-organizations-at-side-event-organised-by-knowledge-ecology-international"&gt;proposed                     treaty for the protection of broadcasting                     organizations&lt;/a&gt;. Transcript of her talk can be &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-views-on-on-the-proposed-wipo-treaty-for-the-protection-of-broadcasting-organizations-at-side-event-organised-by-knowledge-ecology-international"&gt;accessed                     here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs"&gt;memorandum                     outlining India's strategy to global cyber norms                     formulation processes&lt;/a&gt; authored by Elonnai Hickok                   and Arindrajit Basu and edited by Aayush Rathi and                   Shruti Trikanad. The memorandum seeks to summarise the                   state of the global debate in cyberspace; outline how                   India can craft it’s global strategic vision and                   finally, provides a set of recommendations for the                   Ministry of External Affairs as they craft their cyber                   diplomacy strategy. &lt;/li&gt;
&lt;li&gt;The institution of                   open standards is as a formidable regulatory regime                   governing the Internet while facilitating its growth                   as a network of networks. As a nation digitising                   rapidly and facing concerns in cybersecurity and                   Internet governance, there is a need for the                   Government of India to meaningfully participate at                   standards development organisations to represent the                   interests of the Indian populace and become a voice                   for the global South. Authors Aayush Rathi, Gurshabad                   Grover and Sunil Abraham &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf"&gt;examine                     this in a policy brief&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The Convention on                   Cybercrime adopted in Budapest (“Convention”) is the                   first and one of the most important multilateral                   treaties addressing the issue of internet and computer                   crimes. Vipul Kharbanda has analyzed this in his                   research paper titled &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act"&gt;Budapest                     Convention and the Information Technology Act&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Amber Sinha was                   one of the stakeholders who provided inputs to the                   Danish Expert Group on Data Ethics in June 2018 during                   their visit to New Delhi. The Expert Group has                   prepared and &lt;a class="external-link" href="https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics"&gt;submitted                     its final report&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;For the fourth                   edition of the Internet Researchers’ Conference                   (IRC19), CIS invited  sessions that engage critically                   with the form, imagination, and politics of the                   *list*. The list of proposed sessions are finalized                   and &lt;a class="external-link" href="https://cis-india.org/raw/irc19-proposed-sessions"&gt;posted                     on this page&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Articles&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks"&gt;Lessons                     from US response to cyber attacks&lt;/a&gt; (Arindrajit                   Basu; edited by Elonnai Hickok; Hindu Businessline;                   October 30, 2018). &lt;i&gt;Mirrored on CIS website on                     November 1&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/nishant-shah-indian-express-november-11-2018-digital-native-one-selfie-does-a-tragedy-make"&gt;Digital                     Native: One Selfie Does a Tragedy Make&lt;/a&gt; (Nishant                   Shah; Indian Express; November 11, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;CIS                 in the Media&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts"&gt;Open                     Street Maps help tackle disasters: Experts&lt;/a&gt; (Deccan Chronicle; November 21, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-november-22-2018-abhijit-ahaskar-are-connected-tech-toys-too-smart-for-their-own-good"&gt;Are                     connected tech toys too smart for their own good?&lt;/a&gt; (Abhijit Ahaskar; Livemint; November 22, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me"&gt;Girls'                     schools, women's PGs: The shocking results when you                     Google 'bitches near me'&lt;/a&gt; (News Minute; November                   26, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space"&gt;Amazon                     launches Machine Learning-based platform for                     healthcare space&lt;/a&gt; (Kul Bhushan; Hindustan Times;                   November 28, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy"&gt;Report:                     From Oppression to Liberation: Reclaiming the Right                     to Privacy&lt;/a&gt; (Privacy International; November 28,                   2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-november-30-2018-are-chinese-video-apps-violating-the-indian-law"&gt;Are                     Chinese video apps violating the Indian law?&lt;/a&gt; (Nilesh Christopher; Economic Times; November 30,                   2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt; &lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; Our Access to Knowledge programme currently consists of                 two projects. The Pervasive Technologies project,                 conducted under a grant from the International                 Development Research Centre (IDRC), aims to conduct                 research on the complex interplay between low-cost                 pervasive technologies and intellectual property, in                 order to encourage the proliferation and development of                 such technologies as a social good. The Wikipedia                 project, which is under a grant from the Wikimedia                 Foundation, is for the growth of Indic language                 communities and projects by designing community                 collaborations and partnerships that recruit and                 cultivate new editors and explore innovative approaches                 to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Copyright and                 Patent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/37th-sccr-cis-statement-on-cis-statement-on-the-proposed-treaty-for-the-protection-of-broadcasting-organizations"&gt;37th                     SCCR: CIS Statement on the Proposed Treaty for the                     Protection of Broadcasting Organizations&lt;/a&gt; (Anubha                   Sinha; November 29, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/37th-sccr-cis-statement-on-the-agenda-on-limitations-and-exceptions"&gt;37th                     SCCR: CIS Statement on the Agenda on Limitations and                     Exceptions&lt;/a&gt; (Anubha Sinha; November 29, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-views-on-on-the-proposed-wipo-treaty-for-the-protection-of-broadcasting-organizations-at-side-event-organised-by-knowledge-ecology-international"&gt;Views                     on on the proposed WIPO Treaty for the Protection of                     Broadcasting Organizations at side-event organised                     by Knowledge Ecology International&lt;/a&gt; (Anubha                   Sinha; November 29, 2018).&lt;br /&gt; &lt;br /&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project                   grant from the Wikimedia Foundation&lt;/a&gt; we have                 reached out to more than 3500 people across India by                 organizing more than 100 outreach events and catalysed                 the release of encyclopaedic and other content under the                 Creative Commons (CC-BY-3.0) license in four Indian                 languages (21 books in Telugu, 13 in Odia, 4 volumes of                 encyclopaedia in Konkani and 6 volumes in Kannada, and 1                 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/aditya-365"&gt;Aditya                     365&lt;/a&gt; (Pavan Santhosh; November 7, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our work in the                 Openness programme focuses on open data, especially open                 government data, open access, open education resources,                 open knowledge in Indic languages, open media, and open                 technologies and standards - hardware and software. We                 approach openness as a cross-cutting principle for                 knowledge production and distribution, and not as a                 thing-in-itself.             &lt;b&gt;&lt;br /&gt; Teaching&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/openness/news/lecture-on-open-access-and-open-content-licensing-at-icar-short-course"&gt;Lecture                       on Open Access and Open Content Licensing at ICAR&lt;/a&gt; (short course) (ICAR-Indian Institute of                     Horticultural Research; Bangalore; November 13 - 22,                     2018). Anubha Sinha delivered a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet                     Governance&lt;/a&gt; &lt;br /&gt; &lt;b&gt; -----------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its                   research on privacy and free speech, CIS is engaged                   with two different projects. The first one (under a                   grant from Privacy International and IDRC) is on                   surveillance and freedom of expression (SAFEGUARDS).                   The second one (under a grant from MacArthur                   Foundation) is on restrictions that the Indian                   government has placed on freedom of expression online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Cyber                   Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research                     Papers&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act"&gt;Budapest                       Convention and the Information Technology Act&lt;/a&gt; (Vipul Kharbanda; November 20, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs"&gt;Cyberspace                       and External Affairs:A Memorandum for India                       Summary &lt;/a&gt;(Arindrajit Basu and Elonnai Hickok;                     edited by Aayush Rathi and Shruti Trikanad; November                     30, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf"&gt;Regulating                       the Internet: The Government of India &amp;amp;                       Standards Development at the IETF&lt;/a&gt; (Aayush                     Rathi, Gurshabad Grover and Sunil Abraham; November                     30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event                     Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/workshop-on-cybersecurity-illustrations"&gt;Workshop                         on Cybersecurity Illustrations&lt;/a&gt; (CIS,                       Bangalore; November 15, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;br /&gt; 
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/connections-2018"&gt;Connections 2018&lt;/a&gt; (Organized by Internet Engineering Task Force; Bangalore; October 31 - November 1, 2018). Gurshabad Grover attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/ietf-103"&gt;IETF103&lt;/a&gt; (Organized by Internet Engineering Task Force; Bangkok; November 3 - 9, 2018). Gurshabad Grover attended the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;►Free Speech and                   Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research                     Paper&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/icann-work-stream-2-recommendations-on-accountability"&gt;ICANN                       Workstream 2 Recommendations on Accountability&lt;/a&gt; (Akriti Bopanna; November 23, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/didp-31-on-icanns-fellowship-program"&gt;DIDP                       #32 On ICANN's Fellowship Program&lt;/a&gt; (Akriti                     Bopanna; November 12, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation                   in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/internet-freedom-at-crossroads-common-paths-towards-strengthening-human-rights-online"&gt;Internet                         Freedom at Crossroads - Common Paths towards                         Strengthening Human Rights Online&lt;/a&gt; (Organized                       by Freedom Online; Berlin; November 28 - 30,                       2018). Elonnai Hickok was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog                     Entry&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/clarification-on-the-information-security-practices-of-aadhaar-report"&gt;Clarification                       on the Information Security Practices of Aadhaar                       Report&lt;/a&gt; (Amber Sinha and Srinivas Kodali;                     November 5, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation                     in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners"&gt;Building a Community of Practice:                       Reflections from 2nd All Partners&lt;/a&gt; (Organized by                       Partnership on AI; San Francisco, California;                       November 14 - 15, 2018). Elonnai Hickok spoke on                       the panel on the PAI working groups and co-lead                       the AI Labor and Economy working group meeting as                       co-chair of the group.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads"&gt;Briefing                         on BBC News pan-India research on how 'fake                         news' / digital misinformation spreads&lt;/a&gt; (Organized by BBC; New Delhi; November 16, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/dsci-bangalore-chapter-meet"&gt;DSCI                         Bangalore Chapter meet&lt;/a&gt; (Organized by Data                       Security Council of India; 10K NASSCOM Startup                       Warehouse; Bangalore; November 22, 2018).                       Gurshabad Grover and Karan Saini attended the DSCI                       Bangalore Chapter meet.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse"&gt;Informational                         Privacy in India: An Emerging Discourse&lt;/a&gt; (Organized by Centre for Policy Research and                       supported by Omidyar Network; New Delhi; November                       29, 2018). Amber Sinha was a speaker on the first                       panel on privacy and its tradeoffs.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint"&gt;Facebook                         Privacy Design Sprint&lt;/a&gt; (Organized by Facebook                       and Quicksand; WeWork, Bangalore; November 30,                       2018). Pranav Bidare and Saumyaa Naidu                       participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Miscellaneous               &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event                     Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/sotm-asia-2018"&gt;&lt;span class="external-link"&gt;SOTM                         Asia 2018&lt;/span&gt;&lt;/a&gt; (Co-organized by CIS and Indian                       Institute of Management, Bangalore; November                       17-18, 2018). Saumyaa Naidu, Aayush Rathi and                       Ambika Tandon participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation                     in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/speculative-futures-lab-on-artificial-intelligence-in-media-entertainment-and-gaming"&gt;Speculative                           Futures Lab on Artificial Intelligence in                           Media, Entertainment, and Gaming&lt;/a&gt; (Organized by Quicksand; Bangalore; November 16                         - 18, 2018). Pranav Bidare was a panelist.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/future-tech-and-future-law"&gt;Future                           Tech and Future Law&lt;/a&gt; (Organized by Dept. of                         IT &amp;amp; BT, Government of Karnataka as part of                         Bengaluru Tech Summit; November 29 - December 1,                         2018). Aayush Rathi was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Gender                 &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Statement&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/about/statement-on-serious-allegations-on-social-media-24112018"&gt;Statement                           on Serious Allegations against CIS Members and                           the CIS Workplace on Social Media&lt;/a&gt; (Sunil                         Abraham; November 24, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation                       in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/roundtable-on-intermediary-liability-and-gender-based-violence-at-the-digital-citizen-summit-2018"&gt;Roundtable                           on Intermediary Liability and Gender Based                           Violence at the Digital Citizen Summit, 2018&lt;/a&gt; (Organized by Digital Empowerment Foundation;                         India International Centre, New Delhi; November                         1, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018"&gt;International                           Network on Feminist Approaches to Bioethics                           2018&lt;/a&gt; (Co-organized by Feminist Approaches                         to Bioethics and Sama - A Resource Centre for                         Women and Health; St. John's Medical College;                         Bangalore; December 3 - 5, 2018). Aayush Rathi                         and Ambika Tandon participated in the event as                         speakers. Aayush presented a paper 'Sexual                         Surveillance and Data Regimes: Development in                         the Data Economy' co-authored by himself and                         Ambika.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------                   &lt;br /&gt; &lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt; ----------------------------------- &lt;b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/b&gt;CIS is involved in promoting access and                   accessibility to telecommunications services and                   resources, and has provided inputs to ongoing policy                   discussions and consultation papers published by TRAI.                   It has prepared reports on unlicensed spectrum and                   accessibility of mobile phones for persons with                   disabilities and also works with the USOF to include                   funding projects for persons with disabilities in its                   mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Article&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-november-1-2018-shyam-ponappa-a-great-start-on-wifi-reforms"&gt;A                       great start on Wi-Fi reform&lt;/a&gt;s (Shyam Ponappa;                     Business Standard; November 1, 2018 and Organizing                     India Blogspot; November 1, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt; &lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an                   interdisciplinary research initiative driven by an                   emerging need to understand the reconfigurations of                   social practices and structures through the Internet                   and digital media technologies, and vice versa. It                   aims to produce local and contextual accounts of                   interactions, negotiations, and resolutions between                   the Internet, and socio-material and geo-political                   processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IRC19&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;List                   of proposed sessions:&lt;br /&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-ayushmanbhavah" target="_blank"&gt;#AyushmanBhavah&lt;/a&gt; - Arya Lakshmi                     and Adrij Chakraborty&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-butitisnotfunny" target="_blank"&gt;#ButItIsNotFunny&lt;/a&gt; - Madhavi                     Shivaprasad and Sonali Sahoo&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-callingoutandin" target="_blank"&gt;#CallingOutAndIn&lt;/a&gt; - Usha Raman,                     Radhika Gajjala, Riddhima Sharma, Tarishi Varma,                     Pallavi Guha, Sai Amulya Komarraju, and Sugandha                     Sehgal&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-digitalplatformattributes" target="_blank"&gt;#DigitalPlatformAttributes&lt;/a&gt; -                     Nandakishore K N and Dr. V. Sridhar&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-enlistingprivacy" target="_blank"&gt;#EnlistingPrivacy&lt;/a&gt; - Pawan                     Singh and Pranjal Jain&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-fomo" target="_blank"&gt;#FOMO&lt;/a&gt; - Pritha Chakrabarti and                     Dr. Baidurya Chakrabarti&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-legitlists" target="_blank"&gt;#LegitLists - Form follows                       function: List by design&lt;/a&gt; - Akriti Rastogi,                     Ishani Dey, and Sagorika Singha&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-listinterface" target="_blank"&gt;#ListInterface&lt;/a&gt; - Bharath                     Sivakumar, Rakshita Siva, and Deepak Prince&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-listsasdatabase" target="_blank"&gt;#ListsAsDatabase&lt;/a&gt; - Ria De and                     Samata Biswas&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-loshaandwhatfollowed" target="_blank"&gt;#LoSHAandWhatFollowed&lt;/a&gt; -                     Anannya Chatterjee, Arunima Singh, Bhanu Priya                     Gupta, Renu Singh, and Rhea Bose&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-powerlisting" target="_blank"&gt;#PowerListing&lt;/a&gt; - Dr. Shubhda                     Arora, Dr. Smitana Saikia, Prof. Nidhi Kalra, and                     Prof. Ravikant Kisana&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-socialmediationasgenderedjustice" target="_blank"&gt;#SocialMediationAsGenderedJustice&lt;/a&gt; - Esther Anne Victoria Moraes and Manasa Priya                     Vasudevan&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-proposed-session-storiesrecordslegendsrituals" target="_blank"&gt;#StoriesRecordsLegendsRituals&lt;/a&gt; - Priyanka, Aditya, Bhanu Prakash GS, Aishwarya, and                     Dinesh&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt; &lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a                   non-profit organisation that undertakes                   interdisciplinary research on internet and digital                   technologies from policy and academic perspectives.                   The areas of focus include digital accessibility for                   persons with disabilities, access to knowledge,                   intellectual property rights, openness (including open                   data, free and open source software, open standards,                   open access, open educational resources, and open                   video), internet governance, telecommunication reform,                   digital privacy, and cyber-security. The academic                   research at CIS seeks to understand the                   reconfigurations of social and cultural processes and                   structures as mediated through the internet and                   digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us                   elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: a2k@cis-india.org &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: raw@cis-india.org &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us                     defend consumer and citizen rights on the Internet!                     Write a cheque in favour of 'The Centre for Internet                     and Society' and mail it to us at No. 194, 2nd 'C'                     Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for                   Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite                     researchers, practitioners, artists, and                     theoreticians, both organisationally and as                     individuals, to engage with us on topics related                     internet and society, and improve our collective                     understanding of this field. To discuss such                     possibilities, please write to Sunil Abraham,                     Executive Director, at &lt;a class="moz-txt-link-abbreviated" href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; (for                     policy research), or Sumandro Chattapadhyay,                     Research Director, at &lt;a class="moz-txt-link-abbreviated" href="mailto:sumandro@cis-india.org"&gt;sumandro@cis-india.org&lt;/a&gt; (for                     academic research), with an indication of the form                     and the content of the collaboration you might be                     interested in. To discuss collaborations on Indic                     language Wikipedia projects, write to Tanveer Hasan,                     Programme Officer, at tanveer@cis-india.org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is                       grateful to its primary donor the Kusuma Trust                       founded by Anurag Dikshit and Soma Pujari,                       philanthropists of Indian origin for its core                       funding and support for most of its projects. CIS                       is also grateful to its other donors, Wikimedia                       Foundation, Ford Foundation, Privacy                       International, UK, Hans Foundation, MacArthur                       Foundation, and IDRC for funding its various                       projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2018-newsletter'&gt;https://cis-india.org/about/newsletters/november-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2018-12-19T02:41:01Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint">
    <title>Facebook Privacy Design Sprint</title>
    <link>https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint</link>
    <description>
        &lt;b&gt;Pranav Bidare and Saumyaa Naidu participated in the Facebook Privacy Design Sprint on Friday, November 30, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/FacebookPrivacyDesignSprintInvitation30thNovember.png/@@images/a737a9d8-6924-405e-a31b-45310d2d2a9b.png" alt="Facebook Privacy Design " class="image-inline" title="Facebook Privacy Design " /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint'&gt;https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-04T16:28:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics">
    <title>Danish Expert Group on Data Ethics</title>
    <link>https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics</link>
    <description>
        &lt;b&gt;Amber Sinha was one of the stakeholders who provided inputs to the Danish Expert Group on Data Ethics in June 2018 during their visit to New Delhi. The Expert Group has prepared and submitted its final report.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;In April the Danish             Expert Group on Data Ethics commenced work on developing             recommendations on Data Ethics for the Danish Government.             The expert group have now handed over their recommendations             to the Danish Minister of Industry, Business and Financial             Affairs. &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-for-the-benefit-of-people"&gt;Read the report&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics'&gt;https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:42:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs">
    <title>Cyberspace and External Affairs:A Memorandum for India Summary</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs</link>
    <description>
        &lt;b&gt;This memorandum seeks to summarise the state of the global debate in cyberspace; outline how India can craft it’s global strategic vision and finally, provides   a set of recommendations for the MEA as they craft their cyber diplomacy strategy.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;It limits itself to advocating certain procedural steps that the Ministry of External Affairs should take towards propelling  India forward as a leading voice in  the global cyber norms space and explains why occupying this leadership position should be a vital foreign policy priority. It does not delve into content-based recommendations at this stage.   Further, this memorandum is not meant to serve as exhaustive academic research on the subject but builds on previous research by the Centre for Internet &amp;amp; Society in this area to highlight key policy windows that can be driven by India.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;This memorandum provides  a background to global norms formation focussing on key global developments over the past month; traces the opportunities s for India  to play a lead role in the global norms formulation debate and then charts out process related recommendations on next steps towards India taking this forward.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyberspace-and-external-affairs"&gt;Click here&lt;/a&gt; to read more&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:10:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-november-30-2018-are-chinese-video-apps-violating-the-indian-law">
    <title>Are Chinese video apps violating the Indian law?</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-november-30-2018-are-chinese-video-apps-violating-the-indian-law</link>
    <description>
        &lt;b&gt;The apps have benefited mightily from the short-video craze that’s taken hold among preteens and adolescents but this is putting them in danger from predators, experts said. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nilesh Christopher was published in &lt;a class="external-link" href="https://tech.economictimes.indiatimes.com/amp/news/mobile/are-chinese-video-apps-violating-the-indian-law/66870797?__twitter_impression=true"&gt;Economic Times&lt;/a&gt; on November 30, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Chinese &lt;a href="https://tech.economictimes.indiatimes.com/tag/video+apps"&gt;video apps&lt;/a&gt; have cracked the Bharat code, but that may not be such a good thing. &lt;a href="https://tech.economictimes.indiatimes.com/tag/tiktok"&gt;TikTok&lt;/a&gt;, Kwai and LIKE have been downloaded by millions of smartphone users in small-town India who are using them to share personal videos, away from the glare of scrutiny that falls on more mainstream social media platforms.&lt;br /&gt; &lt;br /&gt; The &lt;a href="https://tech.economictimes.indiatimes.com/tag/apps"&gt;apps&lt;/a&gt; have benefited mightily from the short-video craze that’s taken hold among preteens and adolescents but this is putting them in danger from predators, experts said. Given the mature nature of much of the content and the age of users, the content on these apps could be in violation of the law, they said.&lt;br /&gt; &lt;br /&gt; ET reviewed more than 20 Chinese video apps that dominate the &lt;a href="https://tech.economictimes.indiatimes.com/news/mobile"&gt;mobile&lt;/a&gt; entertainment network of tier-2 and tier-3 cities mostly thanks to titillating videos, suggestive notifications, risqué humour and raunchy content.&lt;br /&gt; &lt;br /&gt; TikTok, the popular lip-sync app, is filled with 15-second clips of meme-friendly content featuring its youthful users miming to their favorite songs. The videos range from the harmless to the explicit, depending upon the users followed. The app has gone viral, having racked up close to 100 million downloads and with 20 million monthly active users in India.&lt;br /&gt; &lt;br /&gt; The Chinese video apps have their own regional stars such as TikTok’s Awez Darbar, who has 4.2 million fans on the platform. TikTok pays creators anywhere between Rs 5,000 and Rs 50,000 per video, depending upon the kind of content and the sphere of influence, said people with knowledge of the matter.&lt;br /&gt; &lt;br /&gt; While all the platforms carry a disclaimer stating that they are not directed at children, their target audience encompasses preteens and adolescents in tier-2 and tier-3 cities, experts said.&lt;br /&gt; &lt;br /&gt; “If (these apps) are operating in a manner that under-18 children use it, then one needs to check what are the other safeguards they have built for parental consent--this is definitely something that has to be looked into,” said Supratim Chakraborty, associate partner at law firm Khaitan &amp;amp; Co. “From a national security standpoint, children fall under the sensitive category. Today, there is a lack of law to put forward strict compliance.”&lt;br /&gt; &lt;br /&gt; Another expert said the user profile violates the stated policy of the apps and IT law.&lt;br /&gt; &lt;br /&gt; “Be it TikTok, LIKE, Kwai or any of these video apps, (they) have a significant number of young girls, boys and preteens using the application,” the person said.&lt;br /&gt; &lt;br /&gt; Live-streaming applications such as Bigo Live and UpLive focus more on personal interaction but these appear to skirt dangerously close to breaking the law, exposing children to nudity and possibly those who seek to coerce or groom underage users into committing explicit acts.&lt;br /&gt; &lt;br /&gt; Users are encouraged to explore further through the notifications. “Press here! Surprising gift waiting for you,” is one sent by Uplive when a user logs on. “Sweet is waiting for you in MeMe live &amp;lt;3, Watch magical girl’s LIVE, Come see me now! Sonam who you’re following posted a new video,” are a few other notifications from the app. These notifications are accompanied by a thumbnail of scantily clad women and an ‘invitation’ to open the app. Users get three to five of these every time they clear the screen.&lt;br /&gt; &lt;br /&gt; The apps are available in Indian languages, making them easier to use than &lt;a href="https://tech.economictimes.indiatimes.com/tag/facebook"&gt;Facebook&lt;/a&gt; or &lt;a href="https://tech.economictimes.indiatimes.com/tag/instagram"&gt;Instagram&lt;/a&gt;. However, the privacy policies are in English, making them that much more difficult to understand if users in such locations want to take the trouble of checking the terms and conditions.&lt;br /&gt; &lt;br /&gt; Despite the rapidly growing user base, apps like TikTok don’t have a grievance redressal officer in India. The government is insisting on this for all major social media platforms.&lt;br /&gt; &lt;br /&gt; A government official said users should flag concerns over such apps so that the state can take action.&lt;br /&gt; &lt;br /&gt; “Even if people upload obscene content with their consent, it still does not absolve (you) of the crime,” said a senior bureaucrat with the ministry of electronics and information technology. “One is ignorance, then there is a burgeoning of technology leading to all these. Somebody must start reporting these cases, be it a victim or a well-wisher of the society for the government to take note.”&lt;br /&gt; &lt;br /&gt; As with Indian apps, apart from generic privacy policies that aren’t available in local languages, the Chinese ones don’t have layered consent—allowing users to opt out of certain obligations if they wish to do so. &lt;a href="https://tech.economictimes.indiatimes.com/tag/sharechat"&gt;ShareChat&lt;/a&gt; is the only Indian regional social media app that has its privacy policy in 10 regional languages.&lt;br /&gt; &lt;br /&gt; A reading of the privacy policies of the Chinese apps also suggests that they hoover up a vast quantity of data with a one-click, opt-in button. This includes sharing location, contacts, allowing audio and video recording and full network access.&lt;br /&gt; &lt;br /&gt; Apps such as Nonolive do not mention any India-specific clauses in their privacy policy. A few like video chat app Tango comply with the General Data Protection Regulation (GDPR), the European privacy law that has stipulated 13+ as the age of use.&lt;br /&gt; &lt;br /&gt; TikTok, which has faced temporary bans in other countries in the past, is an exception with a specific India clause offering limited rights to users. It has an exhaustive 5,000-word privacy policy outlining the data collection, processing and sharing practices it follows. TikTok previously sparked outrage in Hong Kong for not protecting the privacy of children under 10, exposing their identities and uploading inappropriate content.&lt;br /&gt; &lt;br /&gt; The Chinese apps pose several potential risks, said Swetha Mohandas, policy officer at the Center for Internet and Society, an advocacy group.&lt;br /&gt; &lt;br /&gt; “The draft DP (data protection) Bill in the current stage provides greater responsibility on data fiduciaries to maintain the privacy of the individual and the security of the data,” she said. “There are a lot of questions that these apps pose with respect to the Bill, some of them being the security, the data storage provision, the personal data of children, and most importantly that these apps might have recordings that might be sensitive personal data.”&lt;br /&gt; &lt;br /&gt; Most of these apps including TikTok explicitly state that though they have appropriate technical and organisational measures in place, “they cannot guarantee the security of your information transmitted through the platform”. Dubsmash said that it complies with local laws and allows users only above 14 to use its app. The other apps ET reached out to did not respond to queries.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-november-30-2018-are-chinese-video-apps-violating-the-indian-law'&gt;https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-november-30-2018-are-chinese-video-apps-violating-the-indian-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-04T15:11:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/internet-freedom-at-crossroads-common-paths-towards-strengthening-human-rights-online">
    <title>Internet Freedom at Crossroads - Common Paths towards Strengthening Human Rights Online</title>
    <link>https://cis-india.org/internet-governance/news/internet-freedom-at-crossroads-common-paths-towards-strengthening-human-rights-online</link>
    <description>
        &lt;b&gt;The 2018 Freedom Online Conference took place from 28 to 30 November 2018 in Berlin. Elonnai Hickok participated as a speaker.&lt;/b&gt;
        &lt;p&gt;Elonnai attended the Freedom Online Coalition Advisory Network meeting and larger Freedom Online Coalition conference. The agenda can be found &lt;a class="external-link" href="https://freedomonline.de/"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/internet-freedom-at-crossroads-common-paths-towards-strengthening-human-rights-online'&gt;https://cis-india.org/internet-governance/news/internet-freedom-at-crossroads-common-paths-towards-strengthening-human-rights-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-04T16:11:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse">
    <title>Informational Privacy in India: An Emerging Discourse</title>
    <link>https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse</link>
    <description>
        &lt;b&gt;Centre for Policy Research supported by Omidyar Network organized this event in New Delhi on November 29, 2018. Amber Sinha was a speaker on the first panel on privacy and its tradeoffs.&lt;/b&gt;
        &lt;h3&gt;Concept Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The last few years have seen a formalisation of the right to informational privacy within India’s constitutional framework. While the context to this – the challenge to the validity of the Aadhaar project – has entailed broader issues on delivery of public goods and services, the response to whether an individual can assert control over key informational aspects of her life has become a critical part of our rights jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court verdict in Justice Puttaswamy’s case (2017) unequivocally affirmed this right despite leaving open several important aspects including the permissibility of restrictions on this right, and the level of scrutiny which the judiciary could exercise to safeguard them. What was particularly striking was the judicial reliance on considerable scholarship emerging from India and Indian scholars on important themes pertaining to this right: the differing conceptions of privacy and the role for each of them within India’s constitutional framework; the impact of privacy erosion on citizen-State relationship and private transactions in the commercial realm; surveillance tools and technologies in India; the need for an indigenous data protection law, and much more. The court has picked up on this thread in the second Puttaswamy verdict upholding the constitutional validity of Aadhaar with some important caveats and exceptions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, the Expert Committee headed by retired Justice Srikrishna also convened to come out with a draft personal data protection bill. The centrality of data to both commercial activity and governance purposes has found recognition in this bill. While the present legal regime to regulate data in India can be considered chequered at best with divergent regulations across finance, healthcare, telecom, mobility etc., the new bill aims to create a “big data-ready” framework. It impacts any private enterprise handling personal data by stipulating new internal procedures and strong penalties. The major themes in the bill are new user rights for data principals (individuals) who share their data with data fiduciaries (technology companies); data localisation and crossborder data flows; data protection authority (DPA) and its powers; data fiduciaries and new compliance requirements; and exceptions including law enforcement. Each of these carries major implications for data-driven solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the deliberations of the Committee too, substantial Indian scholarship on the themes listed above have been referenced and relied upon. This is truly a breakout moment for privacy and data protection in India. It is changing the terrain of institutional responses to personal data, technology architectures, and digital trade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Discussion Objectives and Format&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the above background, the Centre for Policy Research conducted a closed-door, invite only discussion on November 29, 2018 on the theme Informational Privacy in India: An Emerging Discourse. This discussion sought to engage with representatives from embassies, chambers of commerce and research funding organisations located in India. It took place from 10.00 to 13.00 hours at the Taj Vivanta Ambassador, Sujan Singh Park off Subramaniam Bharti Marg, New Delhi 110003.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The core objectives driving this workshop were to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Highlight informational privacy debates in India;&lt;/li&gt;
&lt;li&gt;Locate informational privacy within India’s constitutional setting, closely re-examining the Supreme Court verdicts in this regard;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Explore themes such as the notice-and-consent framework, regulatory interventions and structural changes, and other key themes on privacy and data protection in India;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Demystify concepts introduced to strengthen personal data protection, including actor and data categories, and new user rights, and their potential impact on technology design;&lt;/li&gt;
&lt;li&gt;Highlight the ramifications of data localization and cross-border data transfer restrictions, on digital trade and e-commerce;&lt;/li&gt;
&lt;li&gt;Decode the new structural mechanisms proposed to mitigate risks in collection, storage, and processing of personal data;&lt;/li&gt;
&lt;li&gt;Identify the impact of these mechanisms on the functioning of data-driven businesses and the future of data innovation in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/informational-privacy-in-india"&gt;view the agenda&lt;/a&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse'&gt;https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T05:40:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf">
    <title>Regulating the Internet: The Government of India &amp; Standards Development at the IETF</title>
    <link>https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf</link>
    <description>
        &lt;b&gt;The institution of open standards has been described as a formidable regulatory regime governing the Internet. Given the regulatory and domestic policy implications that technical standards can have, there is a need for Indian governmental agencies to focus adequate resources geared towards achieving favourable outcomes at standards development fora.&lt;/b&gt;
        
&lt;p&gt;This brief was authored by Aayush Rathi, Gurshabad Grover and Sunil Abraham. Click &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/regulating-the-internet"&gt;here&lt;/a&gt; to download the policy brief.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;The institution of open standards has been described as a formidable regulatory regime governing the Internet. As the Internet has moved to facilitate commerce and communication, governments and corporations find greater incentives to participate and influence the decisions of independent standards development organisations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While most such bodies have attempted to systematise fair and transparent processes, this brief highlights how they may still be susceptible to compromise. Documented instances of large private companies like Microsoft, and governmental instrumentalities like the US National Security Agency (NSA) exerting disproportionate influence over certain technical standards further the case for increased Indian participation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The debate around Transport Layer Security (TLS) 1.3 at the Internet Engineering Task Force (IETF) forms an important case for studying how a standards body responded to political developments, and how the Government of India participated in the ensuing discussions. Lasting four years, the debate ended in favour of greater communications security. One of the security improvements in TLS 1.3 over its predecessor is that is makes less information available to networking middleboxes. Considering that Indian intelligence agencies and government departments have expressed fears of foreign-manufactured networking equipment being used by foreign intelligence to eavesdrop on Indian networks, the development is potentially favourable for the security of Indian communication in general, and the security of military and intelligence systems in particular.&amp;nbsp; India has historically procured most networking equipment from foreign manufacturers. While there have been calls for indigenised production of such equipment, achieving these objectives will necessarily be a gradual process. Participating in technical standards can, then, be an effective interim method for intelligence agencies, defence wings and law enforcement for establishing trust in critical networking infrastructure sourced from foreign enterprises.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Outlining some of the existing measures the Indian government has put in place to build capacity for and participate in standard setting, this brief highlights that while these are useful starting points, they need to be harmonised and strengthened to be more fruitful. Given the regulatory and domestic policy implications that technical standards can have, there is a need for Indian governmental agencies to focus adequate resources geared towards achieving favourable outcomes at standards development fora.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/regulating-the-internet"&gt;here&lt;/a&gt; to download the policy brief.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Note: The recommendations in the brief were updated on 17 December 2018 to reflect the relevance of technical standard-setting in the recent discussions around Indian intelligence concerns about foreign-manufactured networking equipment.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf'&gt;https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, Gurshabad Grover and Sunil Abraham</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Cryptography</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>IETF</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2019-01-22T07:29:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
