<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 656 to 670.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sense-and-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/sense-and-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/seminar-artist-talks-outresourcing-with-the-transmediale-collective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/nalsar-seminar-hate-speech-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/self-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2014-bulletin">
    <title>September 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2014-bulletin</link>
    <description>
        &lt;b&gt;Welcome you to the ninth issue of the newsletter (September 2014).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet &amp;amp; Society (CIS) welcome you to the ninth issue of the newsletter (September 2014). Archives of our newsletters can be 	accessed at: &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Nishant Shah was part of a working group writing a white paper on big data and social change, over the last six months. This	&lt;a href="http://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"&gt;white paper&lt;/a&gt; produced by a group of 	activists, researchers and data experts was published by Oxford.&lt;/li&gt;
&lt;li&gt;As part of the Pervasive Technologies project Maggie Huang interviewed Semiconductor Industry Professionals in Taiwan on the	&lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-1"&gt;trends and changes in technology&lt;/a&gt; and 	&lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-2"&gt; understanding mobile chip manufacturing&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS entered into a		&lt;a href="http://cis-india.org/openness/blog/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands"&gt;memorandum of understanding&lt;/a&gt; with the 		Andhra Loyola College for a period of 5 years to enhance Telugu Wikipedia through increased contributions to Wikipedia and make it available under free 		license. &lt;/li&gt;
&lt;li&gt; CIS-A2K &lt;a href="http://cis-india.org/openness/blog/nie-steps-in-to-grow-konkani-wikipedia"&gt;signed a memorandum of understanding&lt;/a&gt; with Nirmala 		Institute of Education, Goa to enhance digital literacy in Konkani in the education sector across Goa.&lt;/li&gt;
&lt;li&gt;Tejaswini Niranjana and Tanveer Hasan wrote a report on the workshop 	&lt;a href="http://cis-india.org/openness/blog/report-on-developing-digital-open-knowledge-resources-in-indian-languages"&gt; Developing Digital Open Knowledge Resources in Indian Languages &lt;/a&gt; for which CIS-A2K was one of the organizers. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS 		&lt;a href="http://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility"&gt; joined the Dynamic Coalition for Platform Responsibility &lt;/a&gt; towards creating due diligence recommendations for online platforms. &lt;/li&gt;
&lt;li&gt; CIS organized a 		&lt;a href="https://cis-india.org/internet-governance/report-on-cis-workshop-at-igf"&gt; workshop on an evidence-based framework for intermediary liability &lt;/a&gt; at the IGF held in Istanbul on September 3, 2014. Jyoti Panday coordinated the workshop in collaboration with Stanford Centre for Internet &amp;amp; 		Society. &lt;/li&gt;
&lt;li&gt; Elonnai Hickok contributed a thematic chapter on 		&lt;a href="http://www.giswatch.org/en/communications-surveillance/intermediary-liability-and-state-surveillance"&gt; Intermediary Liability and Surveillance &lt;/a&gt; in the GISWatch Report.&lt;/li&gt;
&lt;li&gt;The Supreme Court of India revised the law on electronic evidence in the case of &lt;i&gt;Anvar v. P. K. Basheer&lt;/i&gt;. Bhairav Acharya has	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt;done an analysis on this&lt;/a&gt;. It was published 	by Law and Policy in India and subsequently mirrored on our website.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The updated draft is being reviewed by the Office of the Chief Commissioner for Persons with Disabilities. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/september-2014-nvda-report.pdf"&gt;Work Report for September&lt;/a&gt; (Suman Dogra; August 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/study-on-budget-allocation-and-expenditure-by-states-on-schemes-for-persons-with-disabilities"&gt; Study on Budget Allocation and Expenditure by States on Schemes for Persons with Disabilities &lt;/a&gt; (Anandhi Viswanathan; September 29, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pervasive Technologies&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-1"&gt; Interviews with Semiconductor Industry Professionals in Taiwan: Trends and Changes in Technology &lt;/a&gt; (Maggie Huang; September 26, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-2"&gt; Interviews with Semiconductor Industry Professionals in Taiwan: Understanding Mobile Chip Manufacturing &lt;/a&gt; (Maggie Huang; September 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/report-on-developing-digital-open-knowledge-resources-in-indian-languages"&gt; Developing Digital Open Knowledge Resources in Indian Languages &lt;/a&gt; (Tejaswini Niranjana and Tanveer Hasan; September 30, 2014). The workshop was organized by Krantijyoti Savitribai Phule Women's Studies Centre, 		University of Pune (KSPWSC), Centre for Indian Languages in Higher Education (CILHE), Tata Institute of Social Sciences, Mumbai and CIS-A2K. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/nie-steps-in-to-grow-konkani-wikipedia"&gt;NIE Steps in to Grow Konkani Wikipedia&lt;/a&gt; (T. Vishnu Vardhan; September 6, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands"&gt; Expanding the World of Telugu Wikipedia - CIS-A2K and ALC join hands &lt;/a&gt; (T. Vishnu Vardhan and Rahmanuddin Shaik; September 17, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The following were published in August and mirrored on our website in September:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/open-glam-august-27-2014-subhashish-panigrahi-open-glam-at-wikimania-2014"&gt; OpenGLAM at Wikimania 2014 &lt;/a&gt; (Subhashish Panigrahi; OpenGLAM; August 27, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/we-are-wikipedia"&gt;We are Wikipedia&lt;/a&gt; (By Subhashish Panigrahi; Wikimedia Deutschland; August 25, 2014). Wikimedia Deutchland has included a paragraph about WeAreWikipedia on their blog. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://commons.wikimedia.org/wiki/Category:Kannada_Wikipedia_Workshop_at_Tumkur_%28Sep_27_2014%29"&gt;Kannada Wikipedia Workshop for Students&lt;/a&gt; (Tumkur University; Tumkur; September 27, 2014). Dr. U.B.Pavanaja conducted the workshop. Fifty people participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://commons.wikimedia.org/wiki/Category:Kannada_Wikipedia_Workshop_at_Bagalkot"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (Organized by Basaveshwara Science College and CIS-A2K; September 20, 2014). Dr. U.B.Pavanaja conducted the workshop. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/kannada-wikipedia-workshop-bagalkot"&gt;Implementation of IT in Kannada&lt;/a&gt; (Prajavani; September 21, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/bangalore-mirror-shyam-prasad-105-kannada-books-released-under-creative-commons"&gt; 105 Kannada books released under Creative Commons &lt;/a&gt; (Shyam Prasad S; Bangalore Mirror; September 29, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/odia-alphabet-and-order-teaching-in-primary-education"&gt; State Level Seminar on "Odia alphabet and order teaching in primary education" &lt;/a&gt; (Co-organized by Institute of Odia Studies and Research and Odia Bhasa Pratisthan, Bhubaneswar; September 14, 2014). Subhashish Panigrahi participated 		in the event and discussed about the applied aspects of Odia language in the context of primary education and need for reforms in the total number and 		order in the character-set citing problems with computer and internet. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/publishing-next"&gt;Publishing Next&lt;/a&gt; (Organized by CinnamonTeal Publishing; Goa; September 19 - 20, 2014). T. Vishnu Vardhan was a panelist at the 5th edition of Publishing Next the annual 		conference on the future of publishing. He spoke on Open Access, Copyright and Copyleft. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in 	enhancing respect for the right to privacy in developing countries. We have produced the following outputs during the month:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Note: The White Paper below is not a part of the SAFEGUARD project&lt;/i&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;White Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"&gt; Big Data and Positive Social Change in the Developing World: A White Paper for Practitioners and Researchers &lt;/a&gt; (Nishant Shah; Oxford: Oxford Internet Institute; September 30, 2014). Nishant Shah was part of a group of activists, researchers and data experts in 		producing this white paper. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Analysis&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; Anvar v. Basheer and the New (Old) Law of Electronic Evidence &lt;/a&gt; (Bhairav Acharya; September 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility"&gt; CIS joins the Dynamic Coalition for Platform Responsibility &lt;/a&gt; (Jyoti Panday; September 23, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/the-aadhaar-case"&gt;The Aadhaar Case&lt;/a&gt; (Vipul Kharbanda; September 5, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale"&gt;UID: A Data Subject's Registration Tale&lt;/a&gt; (Mukta Batra; September 11, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation"&gt;Biometrics: An 'Angootha Chaap' nation?&lt;/a&gt; (Mukta Batra; September 19, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground"&gt;UID and NPR: Towards Common Ground&lt;/a&gt; (September 19, 2014): &lt;i&gt;This is an anonymous post&lt;/i&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;CIS @ IGF&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ninth Internet Governance Forum ("IGF2014") was hosted by Turkey in Istanbul from September 2 to 5, 2014. A BestBits pre-event, which saw robust 	discussions on renewal of the IGF mandate, the NETmundial Initiative and other live Internet governance processes, flagged off a week of many meetings and 	sessions. CIS participated in multiple workshops and panels:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=Nu3GycFBLoo"&gt;WS112: Implications of post-Snowden Internet localization proposals&lt;/a&gt; (Organized by Center for Democracy and Technology, Istanbul, September 2, 2014). Sunil Abraham was a speaker at this IGF workshop. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/preserving-a-universal-internet"&gt; WS63: Preserving a universal Internet: Costs of fragmentation &lt;/a&gt; (Organized by OECD and Centre for International Governance Innovation; September 3, 2014). Sunil Abraham was a speaker at this IGF workshop. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=uwtQ18KzeiY"&gt;WS2 Mobile, Trust and Privacy&lt;/a&gt; (Organized by GSM Association; September 4, 2014). Sunil Abraham was a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=Us4BW1Sw4Vo"&gt;Transparency reporting as a tool for Internet governance&lt;/a&gt; (Organized by Global Network Initiative; September 3, 2014). Pranesh Prakash was a panelist. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=v5tx-TBMm8E&amp;amp;list=PLediVl9G3xdMoSTKB3sFw0aszfwLgsqoV&amp;amp;index=105"&gt; WS149: Aligning ICANN policy with the privacy rights of users &lt;/a&gt; (Organized by Yale ISP; September 5, 2014). Pranesh Prakash was a moderator. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Participation&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/cis-at-igf-2014"&gt;Launch of the GISWatch Report&lt;/a&gt; (Association for Progressive Communications and the Humanist Institute for Cooperation with Developing Countries (Hivos). Elonnai Hickok contributed a 		thematic chapter on Intermediary Liability and Surveillance to this report. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age"&gt; Re-Wiring Women's Rights Debates in the Digital Age &lt;/a&gt; (Organized by IT for Change in partnership with Kutch Mahila Vikas Sangathan and ANANDI; September 13 - 14, 2014). Rohini Lakshane was a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/workshop-on-enabling-information-systems-for-local-governance"&gt; Workshop on Enabling Information Systems for Local Governance &lt;/a&gt; (Organized by Jamia Milla Islamia, Tagore Hall; New Delhi; September 18, 2014). Sunil Abraham was a participant. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/national-consultation-on-media-law"&gt;National Consultation on Media Law&lt;/a&gt; (Organized by Law Commission of India and the National University, Delhi; India Habitat Centre, New Delhi; September 27 - 28, 2014). Nehaa Chaudhari, 		Jyoti Panday and Anubha Sinha participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/cpdp-2015"&gt;CPDP 2015&lt;/a&gt; : The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. CIS is a moral 		supporter of CPDP. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online"&gt; Fighting battles online &lt;/a&gt; (Nikhil Varma; The Hindu; September 2, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance"&gt; Colonial yoke or bureaucratic insouciance? &lt;/a&gt; (Vidya Venkat with additional reporting by K.T. Sangameswaran in Chennai; The Hindu; September 7, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue"&gt; Social Media Aids Rescue Efforts in Flood-Hit Kashmir &lt;/a&gt; (Anjana Pasricha, September 10, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-economic-times-varun-aggarwal-september-11-2014-google-aims-to-win-india-with-android-one"&gt; Google aims to win 40% of India with Android One &lt;/a&gt; (Varun Aggarwal; Economic Times; September 11, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social 	sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new 	conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/raw/events/consultation-on-new-figures-of-learning-in-digital-context"&gt; Consultation on New Figures of Learning in the Digital Context &lt;/a&gt; (CIS, Bangalore, September 22, 2014). P.P. Sneha		&lt;a href="https://cis-india.org/raw/digital-humanities/consultation-new-figures-of-learning-in-digital-context"&gt;wrote a report&lt;/a&gt; on the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director - Research, at	&lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, 	Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2014-bulletin'&gt;https://cis-india.org/about/newsletters/september-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2015-01-02T01:26:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2013-bulletin">
    <title>September 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of September 2013 can be accessed below. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) welcomes you to the ninth issue of its newsletter for the year 2013. During this month we signed an MoU with the Goa University to enhance digital literacy in Konkani language, submitted a report on Inclusive Disaster and Emergency Management for persons with disabilities to the National Disaster Management Authority, published an updated version of the Privacy Protection Bill, 2013 based on feedback collected from the Privacy Round Table held on August 24, and published an analysis of the Crucifixion Protests in Paraguay. Further, updates on our upcoming events and media coverage are brought in this newsletter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our policies on Ethical Research Guidelines, Non-Discrimination and Equal Opportunities, Privacy, Terms of Website Use, and Travel can be &lt;a class="external-link" href="http://bit.ly/19dQSOV"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Accessibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our project on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India with the Hans Foundation, we bring you a new draft chapter on the union territory of Andaman and Nicobar. With this we have completed compilation of draft chapters for 21 states and 4 union territories. Feedback and comments are invited from readers for this chapter:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit Chapter&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;a class="external-link" href="http://bit.ly/18knnIq"&gt;Andaman and Nicobar Chapter&lt;/a&gt; (by CLPR, September 30, 2013)&lt;a href="http://bit.ly/18knnIq"&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Reports&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1ccMz7R"&gt;Inclusive Disaster and Emergency Management for Persons with Disabilities&lt;/a&gt; (by Deepti Samant Raja and Nirmita Narasimhan, September 17, 2013). It was submitted to the National Disaster Management Authority of India (NDMA) on September 17 for their action. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18E7Tjc"&gt;The ICT Opportunity for a Disability-Inclusive Development Framework&lt;/a&gt; (by leading international organisations such as G3ict, ITU, Microsoft, UNESCO, et.al.) was released on September 24. CIS gave its inputs to this report.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Access to Knowledge and Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge team at CIS is working on &lt;a class="external-link" href="http://bit.ly/SPqFOl"&gt;expanding the Indic language Wikipedia in partnership with the Wikimedia Foundation&lt;/a&gt;&lt;a href="http://bit.ly/SPqFOl"&gt;&lt;/a&gt;. As &lt;a class="external-link" href="http://bit.ly/X80ELd"&gt;part this project&lt;/a&gt;, we held seven Wikipedia workshops. Our project on Pervasive Technologies examines the relationship between production of pervasive technologies and intellectual property and we have produced a column in EuroScientist as part of our efforts of promoting openness including open government data, open standards, open access, and free/libre/open source software:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Open Access &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bdPdup"&gt;Open Access: An Opportunity for Scientists around the Globe&lt;/a&gt; (by Subbiah Arunachalam, Euro Scientist, September 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1f5xdBG"&gt;e - DIRAP Google+ Hangout: Open Government&lt;/a&gt; (by Christine Apikul, September 18, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1fWE6Wr"&gt;The Indian Council of Agricultural Research Adopts an Open Access Policy&lt;/a&gt; (by Nehaa Chaudhari, September 30, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Wikipedians from various communities can request for outreach programmes, technical bugs, logistics-merchandize and media, public relations and communications &lt;a class="external-link" href="http://bit.ly/TOcXId"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcements&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS Signs MoU with Goa University: The A2K team at CIS has signed an MoU with the Goa University to digitize the “Konkani Vishwakosh” under the Creative Commons license and build a digital knowledge partnership to enhance digital literacy in Konkani language. See &lt;a class="external-link" href="http://bit.ly/1fBZXlR"&gt;here for more details&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15Idlh7"&gt;Konkani Vishwakosh Digitization Project&lt;/a&gt;: The Centre for Internet and Society in collaboration with the University of Goa invites you to a two-month project on digitization of Konkani Vishwakosh. Please send in your applications by October 5, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Wikipedians Speak: Piotr Konieczny: This episode brings you a &lt;a class="external-link" href="http://bit.ly/16jYsBF"&gt;conversation with Piotr Konieczny&lt;/a&gt;, a veteran Wikipedian from Poland. He has contributed to over 514 DYK articles on Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Columns and Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19KtIwo"&gt;Recap on Konkani Wikipedia Workshop&lt;/a&gt; (by Subhashish Panigrahi, Startup Goa Blog, September 9, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/14QQkIo"&gt;ଅବସର ପରର ଦ୍ବିତୀୟ ଜୀବନ, ଅବସର ପରେ ସକ୍ରିୟ ଭାବେ ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆରେ ଲେଖାଲେଖି ଜାରୀ ରଖିଥିବା ଜଣେ ଡାକ୍ତରଙ୍କ ସ‌ହ ଭାବାଲୋଚନା&lt;/a&gt; (by Subhashish Panigrahi, Odiapua, September 10, 2013)&lt;a href="http://bit.ly/14QQkIo"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1fU7Ikl"&gt;Selection of Programme Officer — Pilot Projects, CIS-A2K&lt;/a&gt; (by Nitika Tandon, September 10, 2013)&lt;a href="http://bit.ly/1fU7Ikl"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18f9n1o"&gt;Wikipedia reaches Classrooms in Hyderabad&lt;/a&gt; (by Syed Muzammiluddin, September 20, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15LPoKZ"&gt;A Kannada Wikipedia Workshop in Mysore&lt;/a&gt; (University of Mysore, August 6, 2013): This is a report of the workshop conducted last month. Dr. Pavanaja conducted the workshop&lt;a href="http://bit.ly/15LPoKZ"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Introductory Workshop (Department of Computer Science and Technology, University of Goa, September 28, 2013). Nitika Tandon conducted this workshop. &lt;i&gt;The details will be posted soon&lt;/i&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1f1KOvm"&gt;Train the Trainer — Four-day long Residential Training Workshop in Bangalore&lt;/a&gt; (organised by CIS-A2K, Bangalore, October 3 – 6, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/174pugy"&gt;Digital Resources in Telugu: A Workshop for Research Scholars&lt;/a&gt; (co-organised by CIS-A2K and the English and Foreign Languages University, Hyderabad, September 13, 2013).  T. Vishnu Vardhan participated in this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18SsChu"&gt;Re-releasing Konkani Vishwakosh &amp;amp; Building Konkani Wikipedia&lt;/a&gt; (organised by CIS-A2K and the University of Goa, Conference Hall, Goa University, Taleigao, September 26, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Introductory Workshop (co-organised by CIS-A2K and wikipedians John Noronha and Supriya Kankumbikar, September 27, 2013). Nitika Tandon participated in this workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15NsTjM"&gt;Odisha: Wikipedia workshop at IIMC, Dhenkanal&lt;/a&gt; (co-organised by CIS-A2K and Odia Wikimedia community, September 30, 2013). Subhashish Panigrahi coordinated the entire event along with members of Odia Wikipedia, Dr Subas Chandra Rout, Mrutyunjaya Kar and Sasanka Sekhar Das. This was covered by Odisha Diary (&lt;a href="http://bit.ly/1bna9zd"&gt;http://bit.ly/1bna9zd&lt;/a&gt;), and eOdisha Samachar (&lt;a href="http://bit.ly/1aNJvv4"&gt;http://bit.ly/1aNJvv4&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16HNZpy"&gt;Workshop on e-Content Development&lt;/a&gt; (organised by Centre for Staff Training and Development, Dr. B.R. Ambedkar Open University, Hyderabad, September 4 – 6, 2013). Vishnu Vardhan gave a guest lecture on Open Source to Open Knowledge, Building Knowledge Bases and Platforms via Mass Collaboration on the Internet, e-Content in Indian languages – History, Challenges and Opportunities, Wikipedia Users to Wikipedia Authors – Exploring Wikipedia as an OER Tool, and e-Content, e-Student, e-Faculty – Reimagining classroom in the digital Age. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/183Atq0"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (organised by Department of Journalism and Mass Communication, SDM College, Ujire, September 15, 2013). Dr. U.B.Pavanaja participated in this workshop&lt;a href="http://bit.ly/183Atq0"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1eGviTY"&gt;Konkani Wikipedia Workshop&lt;/a&gt; (organised by St. Aloysius College, AIMIT, St Aloysius College (Autonomous), Beeri, Mangalore, September 13, 2013). Dr. U.B. Pavanaja participated in this&lt;a href="http://bit.ly/1eGviTY"&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;'&lt;a class="external-link" href="http://bit.ly/152vA0g"&gt;Help Konkani Wikipedia come out of incubation&lt;/a&gt;' (Deccan Herald, September 13, 2013): The article talks about the relative lack of content in Konkani Wikipedia. “To get it out of incubation, many should write Konkani articles for Wikipedia,” Dr. Pavanaja was quoted as having said. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18VgnEN"&gt;Konkani Vishwakosh relaunch tomorrow&lt;/a&gt; (The Hindu, September 26, 2013). A coverage of the re-release of the Konkani encyclopaedia under Creative Commons license. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18VgnV8"&gt;Goa university re-releasing Konkani encyclopaedia on Sept 26&lt;/a&gt; (The Times of India, September 24, 2013): Goa University and CIS-A2K re-released the four volume 3632 page Konkani Vishwakosh (encyclopaedia) in Goa. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/174rmpA"&gt;Goa University announces plan to upload Konkani encyclopedia on Wikipedia&lt;/a&gt; (Navhind Times, September 27, 2013)&lt;a href="http://bit.ly/174rmpA"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19EYl5T"&gt;Konkani Wikipedia from Goa University in 6 months&lt;/a&gt; (The Times of India, September 27, 2013): Goa University becomes the first varsity in India to allow data produced and copyrighted by an Indian university to be used by internet users. Professors, students and anyone with expertise or love for Konkani can come forward to help with the project for which training will be provided, says Vishnu Vardhan. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18jiG1B"&gt;Konkani Wikipedia in the making&lt;/a&gt; (by Prakash Kamat, The Hindu, September 29, 2013): Goa University re-launched a four-volume Konkani encyclopaedia and will upload it on Wikipedia. The process will be completed in six months times, says Vishnu Vardhan&lt;a href="http://bit.ly/18jiG1B"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bV5XWH"&gt;For the love of Konkani: Preserving Goa's official language&lt;/a&gt; (by Joanna Lobo, DNA, September 29, 2013): Konkani has 24 lakh speakers as per the Census Department of India 2001 but online documentation is limited. CIS-A2K wants to strengthen the Konkani Wikipedia, says Nitika Tandon&lt;a href="http://bit.ly/1bV5XWH"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18ROmfb"&gt;Goa University to make available online Konkani Wikipedia, within 6 months&lt;/a&gt; (by Jagran Josh, September 30, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bsZW4u"&gt;Goa University Partners CIS India to Build Konkani Wikipedia&lt;/a&gt; (by Apurva Chaudhary, Medianama, September 30, 2013)&lt;a href="http://bit.ly/1bsZW4u"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Access to Knowledge (Copyright and Pervasive Technologies)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/17J3g55"&gt;The Law and Economics of Copyright Users Rights&lt;/a&gt; (organised by the American University Washington College of Law, Massachusetts Ave., NW, Washington DC, September 26, 2013). Sunil Abraham presented the Pervasive Technologies project. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Internet Governance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are doing a project on conducting research on surveillance and freedom of expression (SAFEGUARDS) with Privacy International and IDRC. So far we have organised six privacy round tables and drafted the Privacy (Protection) Bill. This month we bring you the latest version of the Privacy (Protection) Bill and an analysis of the six privacy round tables. We are also doing a project on mapping cyber security actors in South Asia and South East Asia with the Citizen Lab, Munk School of Global Affairs, University of Toronto and IDRC. We did an interview with Lawrence Liang on privacy and free speech:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;SAFEGUARDS Project&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Bill&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/14WAgI7"&gt;Privacy (Protection) Bill, 2013&lt;/a&gt;: Updated Third Draft (by Bhairav Acharya, September 30, 2013): CIS has been researching privacy in India since 2010 with the objective of raising public awareness around privacy, completing in depth research, and driving a privacy legislation in India. As part of this work, we drafted the Privacy (Protection) Bill, 2013.  This is the latest version with changes based on feedback from the Privacy Round Table held on August 24. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15Fj6vY"&gt;A Privacy Meeting with the Federal Trade Commission&lt;/a&gt; (co-organised by CIS and the Federal Trade Commission, Imperial Hotel, Janpath, New Delhi, September 20, 2013). Elonnai Hickok participated in this meeting. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/158ayNW"&gt;The National Privacy Roundtable Meetings&lt;/a&gt; (by Bhairav Acharya, September 19, 2013). Bhairav provides an analysis of the six round table meetings held in the cities of New Delhi, Bangalore, Chennai, Mumbai, and Kolkata.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/15AutoE"&gt;An Interview with Suresh Ramasubramanian&lt;/a&gt; (by Elonnai Hickok, September 6, 2013): Suresh Ramasubramanian from IBM speaks about cyber security and issues in the cloud. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Articles and Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1g5QbZj"&gt;India: Privacy in Peril&lt;/a&gt; (by Bhairav Acharya, Frontline, July 12, 2013). &lt;i&gt;The article was published in Frontline in July but was mirrored only recently on our website&lt;/i&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19DNYjs"&gt;Privacy Law Must Fit the Bill&lt;/a&gt; (by Sunil Abraham, Deccan Chronicle, September 9, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19NYTal"&gt;Transparency Reports — A Glance on What Google and Facebook Tell about Government Data Requests&lt;/a&gt; (by Prachi Arya, September 12, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16yLYFq"&gt;The National Cyber Security Policy: Not a Real Policy&lt;/a&gt; (by Bhairav Acharya, Observer Research Foundation's Cyber Security Monitor Vol. I, Issue.1, August 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1fln2vu"&gt;The Central Monitoring System: Some Questions to be Raised in Parliament&lt;/a&gt; (by Bhairav Acharya, September 19, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18oOTDk"&gt;CIS and International Coalition Calls upon Governments to Protect Privacy&lt;/a&gt; (by Elonnai Hickok, September 25, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16dKyoo"&gt;An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000 for Adjudication in the State of Maharashtra&lt;/a&gt; (by Bhairav Acharya, September 30, 2013): This is a brief review of some of the cases related to privacy filed under section 46 of the Information Technology Act, 2000 seeking adjudication for alleged contraventions of the Act in the State of Maharashtra.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bys2I1"&gt;Gmail ban looms for Indian gov't workers&lt;/a&gt; (by Beatrice Thomas, Arabian Business.com, September 1, 2013): The article says that government would ban Gmail for official communication in light of cyber spying by the US. Sunil Abraham agrees with the ban. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dJiSvF"&gt;Indien: Regierung will Nutzung von US-Mailprovidern in Verwaltungen verbieten&lt;/a&gt; (Netzpolitik, September 3, 2013). Sunil Abraham was quoted in this German newspaper. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19KvQV7"&gt;A dangerous trend: social media adds fire to Muzaffarnagar clashes&lt;/a&gt; (by Zia Haq, The Hindustan Times, September 9, 2013). The article speaks about censorship in wake of publication of malicious content. In such cases the government has a legitimate reason to censor speech, says Sunil Abraham&lt;a href="http://bit.ly/19KvQV7"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18VgnVe"&gt;Three Years Later, IPaidABribe.com Pays Off&lt;/a&gt; (by Jessica McKenzie, TechPresident, September 23, 2013): The article talks about IPaidABribe.com, an online portal focusing on civic engagement and improving governance. But the real problem in India is “high ticket bribes...at the top of the pyramid,” Sunil Abraham was quoted as having said. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/174yjHr"&gt;Indian biometric ID plan faces court hurdle&lt;/a&gt; (by John Ribeiro, Computer World, September 25, 2013): The article talks about Aadhar (India’s biometric system). The Aadhaar number now allows different agencies including private organizations to collect and exchange data between them, says Pranesh Prakash. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/GAsStr"&gt;Privacy Round Table, New Delhi&lt;/a&gt; (co-organised by FICCI, DSCI and CIS, FICCI Federation House, Tansen Marg, New Delhi, October 19, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/GAGLXL"&gt;Public Law and Jurisprudential Issues of Privacy&lt;/a&gt; (CIS, Bangalore, September 27, 2013): Abhayraj Naik, a graduate from the National Law School of India University, Bangalore, and the Yale Law School gave a talk on public law and jurisprudential issues related to privacy.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1byqRZg"&gt;Young Scholar Tutorials&lt;/a&gt; (organised by Communication Policy Research South, September 3-4, 2013). Nehaa Chaudhari participated in this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1eqxUb1"&gt;Privacy and Surveillance in India&lt;/a&gt; (organised by the Centre for Culture, Media and Governance, Jamia Millia Islamia, New Delhi, September 18, 2013). Sunil Abraham gave a talk. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dJT43q"&gt;Syllabus: “Policy and regulation conducive to rapid ICT sector growth in Myanmar: An introductory course”&lt;/a&gt; (organised by LIRNEasia in collaboration with Myanmar ICT Development Organization, and with support from the Open Society Foundation and the International Development Research Centre of Canada, September 28 – October 5, 2013). Sunil Abraham is supporting Prof. Samarajiva on the last optional day of this course in Yangon.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Congress on Privacy and Surveillance (organised by Swiss Federal Institute of Technology, Lausanne, September 30, 2013). Maria Xynou participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;Cyber Security Project&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;Video Interview&lt;/b&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Part 10: &lt;a class="external-link" href="http://bit.ly/17TMNsT"&gt;Interview with Lawrence Liang&lt;/a&gt; (September 10, 2013): In the ecology of online communication it is crucial for us to look at right to privacy and right to free speech as inseparable.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Forthcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16KOTvA"&gt;11th India Knowledge Summit 2013&lt;/a&gt; (organised by ASSOCHAM India, Hotel Shangri-La, New Delhi, October 14-15, 2013). CIS is one of the organisations supporting this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19HyyIZ"&gt;CYFY 2013: India Conference on Cyber Security and Cyber Governance&lt;/a&gt; (organised by Observer Research Foundation and the Federation of Indian Chambers of Commerce and Industry, Oberoi Hotel, New Delhi, October 14-15, 2013). Sunil Abraham will participate in this event as a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Knowledge Repository on Internet Access&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;CIS in partnership with the Ford Foundation is executing a project to create a knowledge repository on Internet and society. This repository will comprise content targeted primarily at civil society with a view to enabling their informed participation in the Indian Internet and ICT policy space. The repository is available at &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Modules&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/193RPYr"&gt;International Telecommunication Union&lt;/a&gt; (by Snehashish Ghosh and Anirudh Sridhar, September 30, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16MiB9u"&gt;Internet Corporation for Assigned Names and Numbers&lt;/a&gt; (ICANN) (by Snehashish Ghosh and Anirudh Sridhar, September 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Telecom&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa, a Distinguished Fellow at CIS is a regular columnist with the Business Standard. The articles published on his blog Organizing India Blogspot is mirrored on our website:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Newspaper Column&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/18RcDCm"&gt;Regrouping for Growth - Interest Rates – III&lt;/a&gt; (originally published in the Business Standard on September 4, 2013 and mirrored in Organizing India Blogspot on September 6, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;br /&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/188MWfr"&gt;Bangalore + Sustainability Summit&lt;/a&gt; (organized by Ashoka India, Green Lungi and IDEX, September 21, 2013, CIS, Bangalore): Denisse Albornoz has summarised the happenings in this report.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dIA9Cv"&gt;Youths brainstorm at social summit&lt;/a&gt; (The Times of India, September 21, 2013): A coverage of the Bangalore + Sustainability Summit hosted at CIS.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry + Video&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16tulHY"&gt;Revealing Protesters on the Fringe: Crucifixion Protest in Paraguay&lt;/a&gt; (by Denisse Albornoz, September 20, 2013): Denisse provides an analysis of the crucifix protest in Paraguay in the light of Nishant Shah’s piece: Whose Change is it Anyway?.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Digital Humanities&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1e5hDai"&gt;Thinking Digital Beyond Tools: Interview with Dr. Nishant Shah&lt;/a&gt; (by Noopur Raval, HASTAC, September 10, 2013): Nishant speaks about his interest in digital studies, the future of humanities, and his HASTAC experience. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dIA6GV"&gt;Reclaim Open Learning Symposium&lt;/a&gt; (organized by the Digital Media and Learning Research Hub, University of California Humanities Research Institute, UC Irvine, September 26-27, 2013): Nishant Shah participated in this event as a panelist. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;About CIS&lt;/b&gt;&lt;br /&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;:&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org or Nishant Shah, Director – Research, at nishant@cis-india.org. To discuss collaborations on Indic language wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at vishnu@cis-india.org&lt;/p&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects&lt;/i&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p class="normal"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2013-bulletin'&gt;https://cis-india.org/about/newsletters/september-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-10-24T06:48:33Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2012-bulletin">
    <title>September 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2012-bulletin</link>
    <description>
        &lt;b&gt;Welcome to the newsletter of September 2012 from the Centre for Internet &amp; Society (CIS). The present issue features a second analysis by Snehashish Ghosh on the latest list of sites blocked by the Indian government from August 18, 2012 to August 21, 2012, a research on the issues of internet governance by Smarika Kumar, publication of a report on Accessibility of Government websites in India by Nirmita Narasimhan, Mukesh Sharma and Dinesh Kaushal, the Access to Knowledge programme plan and updates from the Wikipedia community in India on Indic languages,  updates from the Habits of Living workshop organised in Bengaluru, the events connected to the visits of international DNA experts, Helen Wallace and Jeremy Gruber in India, and introduce you to our Access to Knowledge team members. &lt;/b&gt;
        &lt;hr /&gt;
&lt;h3&gt;Announcements&lt;/h3&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;&lt;b&gt;Office in Delhi&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;CIS now has an office with a five-member team for the Access to Knowledge programme in Delhi at G 15, top floor, behind Hauz Khas G Block Market, Hauz Khas, New Delhi 110016, Ph: + 91 11 26536425.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span class="visualHighlight"&gt;&lt;b&gt;New Team Members&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/staff/cis-staff"&gt;Nitika Tandon&lt;/a&gt;: Nitika Tandon is a Program      Officer with CIS. She has an MBA from Rotterdam School of Management,      Netherlands and is a recipient of Dean's Fund Scholarship Program, Erasmus      University.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/staff/cis-staff"&gt;Shiju Alex&lt;/a&gt;: Shiju Alex is a Consultant. His      background is technical writing and he is interested in Indic language      computing and community building for Indic language Wiki projects.      Presently he works out of CIS office in Bengaluru.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/staff/cis-staff"&gt;Subhashish Panigrahi&lt;/a&gt;: Subhashish Panigrahi      is a Programme Officer to CIS's Access to Knowledge programme and works      out of CIS's Delhi office. His background is Business Development in      Corporate Communications. He works on designing and implementing programs      to provide on-wiki and off-wiki support for new editors.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/staff/cis-staff"&gt;Noopur Raval&lt;/a&gt;: Noopur Raval is working as      Consultant - Communications for the Access to Knowledge team at CIS.      Having previously worked in the media, she is currently pursuing her      M.Phil in Cinema Studies from JNU, New Delhi.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt;CIS is seeking applications from interested candidates for the posts of &lt;a href="https://cis-india.org/jobs/research-manager"&gt;Research Manager&lt;/a&gt;, &lt;a href="https://cis-india.org/jobs/vacancy-for-researcher-accessibility"&gt;Researcher/Editor&lt;/a&gt;, and &lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer – Internet Governance&lt;/a&gt;. To apply for these posts send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;) with three references. Archives of our bulletins can be &lt;a href="http://cis-india.org/about/newsletters/"&gt;found here&lt;/a&gt;. Click to read the newsletter on our website.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;br /&gt;&lt;b&gt;Featured Research&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/accessibility-of-government-websites-in-india"&gt;Accessibility of Government Websites in India: A      Report&lt;/a&gt; (by Nirmita Narasimhan, Mukesh Sharma and Dinesh Kaushal,      September 26, 2012): This is a report on the accessibility of government      websites in India. It was published in cooperation with the Hans      Foundation. The report consists of an executive summary, introduction,      methodology, findings and recommendations and interpretation and recommendations.      Examples of errors are given as appendices. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Project&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/creating-a-national-resource-kit-for-persons-with-disabilities"&gt;Creating a National Resource Kit for Persons with      Disabilities: An Introduction&lt;/a&gt; (by Anandhi Viswanathan,      September 28, 2012): CIS is engaged in a two-and-a-half year project      starting from August 2012 to create a national resource kit of state-wise      laws, policies and programmes on issues relating to persons with      disabilities in India. This project is supported by the Hans Foundation.      The Resource Kit will be brought out in both English and Hindi and      disseminated to policy makers from panchayat to ministry levels throughout      India. Anandhi gives an introduction to the project in this blog entry.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/wipo-treaty-for-the-visually-impaired"&gt;WIPO Treaty for the Visually Impaired — Moving from a      Treaty on Paper to a Treaty that is Workable on the Ground&lt;/a&gt; (by      Rahul Cherian, September 28, 2012): After many years of hard lobbying by      the World Blind Union, it appears that the WIPO Treaty on limitations and      exceptions for visually impaired persons/persons with print disabilities      (TVI) could become a reality next year. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/breaking-news-on-electronic-accessibility"&gt;Breaking News on Electronic Accessibility&lt;/a&gt; (by Rahul Cherian, September 28, 2012): The Parliamentary Standing      Committee constituted to study the Electronic Delivery of Services Bill      has in its report explicitly recognized the concept of electronic      accessibility and reasonable accommodation. This is the first time in the      country that these two concepts have been reflected at the level of a      Parliamentary Standing Committee in relation to a non-disability specific      law.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/feedback-to-draft-copyright-rules-2012"&gt;Feedback to Draft Copyright Rules, 2012&lt;/a&gt; (by      Pranesh Prakash, September 29, 2012): submitted its written comments on      the Draft Copyright Rules, 2012 to Mr. G.R. Raghavender, Registrar of      Copyrights &amp;amp; Director (BP&amp;amp;CR), Ministry of Human Resource      Development. Pranesh does a detailed analysis and provides recommendations      on Rules 8,9,10, 29(6), 34(2), 37, 71(3), 72, 74(1), 74(6), 75, and 79 (3)      and (4).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Projects&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;Access To Knowledge/Programme Plan&lt;/a&gt;:      Pursuant to the announcement made on July 30, 2012 of a 22 months ‘grant’      (beginning from September 1, 2012 to July 31, 2014) of upto INR 26,000,000      and as reflected in the FAQ accompanying the announcement, the Wikimedia      Foundation’s India Program will become a project of the Access to      Knowledge (A2K) program of CIS. The prime objective is to support the      growth of Indic language communities and projects by designing community      collaborations and partnerships that recruit and cultivate new editors and      explore innovative approaches to building projects and supporting India-focused      efforts to improve the quality of India-relevant content on Indic      languages and English Wikimedia projects.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/pervasive-technologies-access-to-knowledge-in-the-market-place"&gt;Pervasive Technologies: Access to Knowledge in the      Marketplace&lt;/a&gt; (by Jadine Lannon, September 25, 2012): Jadine      Lannon gives an introduction to the new A2K research initiative. Pervasive      technologies have flooded the Indian market and are changing the ways in      which the average Indian accesses knowledge but very little is understood      about these technologies, particularly when it comes to their legality.      CIS hopes to do a research that aims to understand how pervasive      technologies interact with Intellectual Property laws and what can be done      to protect these technologies from being labelled “illegal” and eradicated      from the Asian market.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/info-justice-public-events-flexibility-network"&gt;Meeting of the Global Network on Flexible Limitations      and Exceptions&lt;/a&gt; (organised by American University Washington      College of Law, Washington D.C., September 12 to 15, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes:&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Featured Research&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/issues-in-internet-governance"&gt;An Introduction to the Issues in Internet Governance&lt;/a&gt; (by Smarika Kumar, September 23, 2012): Smarika provides a detailed      analysis to the issues that we face in Internet Governance today. She tries      to canvass the controversies in the areas of internet governance that      broadly focus around the institutional structures to govern the internet,      discusses the evolution of these models against the historical background      of internet governance and then proceeds to present the criticisms of each      of these models with an emphasis on the interests of the regular internet      user.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii"&gt;Analyzing the Latest List of Blocked Sites      (Communalism and Rioting Edition) Part II&lt;/a&gt; (by Snehashish Ghosh,      September 25, 2012): Snehashish Ghosh does a further analysis of the      leaked list of the websites blocked by the Indian Government from August      18, 2012 till August 21, 2012 (“leaked list”). This analysis      was &lt;a href="http://www.medianama.com/2012/09/223-analyzing-the-latest-list-of-blocked-sites-communalism-rioting-edition-part-ii/"&gt;re-posted&lt;/a&gt; by      Medianama on September 26, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Columns&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water"&gt;The Five Monkeys &amp;amp; Ice-cold Water&lt;/a&gt; (by      Sunil Abraham, Deccan Chronicle, September 16, 2012): “The Indian      government provides leadership, both domestically and internationally,      when it comes to access to knowledge.”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech"&gt;SMS Block as Threat to Free Speech&lt;/a&gt; (by      Chinmayi Arun, Hindu Business Line, September 1, 2012): If you could text      just one or two people in a day, who would you choose? Many of us have had      to make this choice thanks to the order limiting us to five texts a day.      Short Message Service (SMS) is not used primarily to send staccato      messages like the telegraph was.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;p class="callout"&gt;&lt;a href="https://cis-india.org/news/dna-india-sep-27-2012-dilnaz-boga-censorship-makes-india-fall-two-places-on-global-internet-freedom-chart"&gt;Censorship makes India fall two places on global      internet freedom chart&lt;/a&gt; (by Dilnaz Boga, Daily News &amp;amp;      Analysis, September 27, 2012). Pranesh Prakash’s analysis on blocked      websites is quoted.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain"&gt;Pitroda seeks to put govt information in public domain&lt;/a&gt; (by Surabhi Agarwal, LiveMint, September 25, 2012): “One government      bureaucrat available on Twitter for a fixed period doesn’t make up for the      non-existence of the government on social media…they (government) should be available all the time.” — Sunil Abraham.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-livemint-com-sep-19-2012-surabhi-agarwal-govt-plans-inter-ministerial-panel-on-internet-policy"&gt;Govt plans inter-ministerial panel on Internet policy&lt;/a&gt; (by Surabhi Agarwal, LiveMint, September 19, 2012): ““The thumb rule with      governance, be it international or national, is that coordination policy      formulation bodies is a good idea, but we can’t damn or praise them over      the process...We have to see what coordination results out of the body.” —      Sunil Abraham.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-times-of-india-sept-16-2012-atul-sethi-mind-of-the-millennium-teen"&gt;Mind of the millennium teen&lt;/a&gt; (by Atul Sethi,      The Times of India, September 16, 2012): “We live in accelerated      times...The breathlessness of our times is evident in everything — from      the kind of movies we make to the ways in which our news and information      travel. At the end of the day, our younger generations are also products      of our times.”— Nishant Shah.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index"&gt;China outranks India in world’s first ever web index&lt;/a&gt; (First Post, September 6, 2012): ““The Internet today doesn’t work      according to the idealistic principles of openness, and democracy of      information that Berners-Lee envisioned for it, and in India in      particular, although the Internet has helped us rethink what the      government can do, the attitude is that that Internet can only be used in      ways that the government sees fit.” — Nishant Shah.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-livemint-com-surabhi-agarwal-sep-4-2012-need-a-strategy-to-deal-with-web-issues"&gt;Need a standard strategy to deal with Web issues:      Chandrasekhar&lt;/a&gt; (by Surabhi Agarwal, LiveMint, September 4,      2012). Pranesh Prakash’s analysis on blocked websites is quoted.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/cis-india.org/news/www-tehelka-com-kunal-majumder-tehelka-magazine-vol-9-issue-36-sep-8-2012-political-war-on-the-web"&gt;Political war on the web&lt;/a&gt; (by Kunal      Majumder, Tehelka Magazine, Vol 9, Issue 36, September 8, 2012): “The fact      remains none of the blockings were politically motivated.” — Pranesh Prakash.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-the-hindu-com-shalini-singh-sep-4-2012-govt-to-hold-talks-with-stakeholders-on-internet-censorship"&gt;Government to hold talks with stakeholders on Internet      censorship&lt;/a&gt; (by Shalini Singh, The Hindu, September 4, 2012).      Pranesh Prakash’s analysis on blocked websites is quoted.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-tehelka-com-vol-9-issue-36-sep-8-2012-shougat-dasgupta-the-state-and-the-rage-of-the-cyber-demon"&gt;The state. And the rage of the cyber demon&lt;/a&gt; (by      Shougat Dasgupta, Tehelka, Vol 9, Issue 36, September 8, 2012): “While      some people may see Twitter as akin to friends talking in the pub, others      use the service as a bulletin board.” — Pranesh Prakash.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-business-standard-rohit-pradhan-sep-1-2012-watch-out-for-fettered-speech"&gt;Watch out for fettered speech&lt;/a&gt; (by Rohit      Pradhan, Business Standard, September 1, 2012). Pranesh Prakash is quoted.&lt;/p&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;DNA Profiling Bill&lt;/span&gt;&lt;br /&gt;International DNA experts Helen Wallace from GeneWatch UK, and Jeremy Gruber from the Council for Responsible Genetics from the United States visited Bengaluru and Delhi and shared their experience in DNA sampling and gave feedback to the DNA Profiling Bill. Meetings were conducted with lawyers and the plaintiff in the Pascal Mazurier's rape case and with VR Sudarshan and Hormis Tharakan. There was a coverage of the event in &lt;a href="https://cis-india.org/news/cadcbecb0ca4caf-ca1cbfc8eca8ccdc8e-caaccdcb0cabcb2cbfc82c97ccd-caecb8cc2ca6cc6caf-cb8cb3cc1ca8c9f"&gt;Kannada media&lt;/a&gt;. Public lectures were organised in Bengaluru and Delhi:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/uk-dna-database-and-european-court-of-human-rights-lessons-that-india-can-learn-from-mistakes"&gt;UK DNA Database and the European Court of Human      Rights: Lessons that India can Learn from Its Mistakes&lt;/a&gt; (organised by CIS and Alternative Law Forum, September 24, 2012): Helen      Wallace from GeneWatch, UK and Jeremy Gruber from the Council for      Responsible Genetics in the United States gave a public lecture.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/the-dna-profiling-bill-developing-best-practices"&gt;The DNA Profiling Bill: Developing Best Practices&lt;/a&gt; (India International Centre, New Delhi, September 27, 2012): International      experts Helen Wallace from GeneWatch UK, and Jeremy Gruber from the      Council for Responsible Genetics from the United States gave a public      lecture. Elonnai Hickok participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/public-meeting-on-dna-profiling-bill"&gt;A Public Meeting on DNA Profiling Bill in Delhi&lt;/a&gt; (by Elonnai Hickok, September 29, 2012): Elonnai has blogged about the      public lecture delivered by Dr. Helen Wallace, Jeremy Gruber and Dr. Anupuma      Raina.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming IGF Events&lt;/b&gt;&lt;br /&gt;At the seventh annual IGF meeting to be held in Baku, Azerbaijan in November 2012, CIS is organising one workshop:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/national-ig-mechanisms"&gt;National IG Mechanisms – Looking at Some Key Design      Issues&lt;/a&gt; (co-organising with Brazilian Internet Steering      Committee, Institute for System Analysis, Russian Academy of Sciences,      et.al., November 8, 2012 from 2.30 p.m. to 4.00 p.m.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Sunil Abraham will be a panelist in the following workshop:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/new-trends-in-industry-self-governance"&gt;New Trends in Industry      Self-Governance&lt;/a&gt; (organised by Oxford Internet Institute,      University of Oxford, UK and Media Change &amp;amp; Innovation Division, IPMZ,      University of Zurich, Switzerland and Nominet, UK, November 7, 2012 from      4.30 p.m. to 6.00 p.m).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CIS fellow Malavika Jayaram is a panelist for these workshops:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/intgovforum-cms-w2012-proposals"&gt;Civil rights in the digital age, about the impact the Internet has on civil rights&lt;/a&gt; (organised by ECP on behalf of the IGF-NL, November 7, 2012, 4.30 p.m. to 6.00 p.m.).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/intgovforum-cms-w2012-proposals-governing-identity-on-the-internet"&gt;Governing Identity on the Internet&lt;/a&gt; (organised by Brenden Kuerbis, Citizen Lab and Christine Runnegar, Internet Society, November 8, 2012, 11.00 a.m. to 12.30 p.m.).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/second-freedom-online-conference-in-nairobi"&gt;Second Freedom Online Conference&lt;/a&gt; (organised by the Ministry of Information and Communications, Republic of Kenya in partnership with the government of Netherlands at UN complex in Gigiri, Nairobi, September 6 and 7, 2012). Pranesh Prakash was a panelist in the session on Access to Internet: Challenges and Opportunities. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/multi-stakeholder-discussion-on-indias-position-in-the-un-for-un-cirp"&gt;Multi-stakeholder Discussion on India’s Position in UN for Internet Governance UN Committee for Internet Related Policies&lt;/a&gt; (Federation of Indian Chambers of Commerce &amp;amp; Industry, New Delhi, September 19, 2012): Sunil Abraham was a panelist.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/seventh-meeting-of-group-of-experts-sept-18-2012-under-chairmanship-of-justice-shah"&gt;Seventh Meeting of the Group of Experts on Privacy Issues under the Chairmanship of Justice AP Shah&lt;/a&gt; (Committee Room No. 228, Yojana Bhawan, Sansad Marg, New Delhi): Sunil Abraham participated in this meeting. This was the final meeting of the series.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Talk&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Talk      at Yale University (New Haven, September 19, 2012): Pranesh Prakash gave a      talk on censorship, intermediary liability, and the way forward. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/conference-apnic-net-aug-28-2012-internet-governance-plenary"&gt;Internet Governance Plenary&lt;/a&gt; (August 28,      Tokyo, Japan): Sunil Abraham was a panelist along with Ang Peng Hwa, Paul      Wilson, Duangthip Chomprang and Raul Echeberria at this event organised by      APNIC on August 28, 2012. Kuo Wei Wu, CEO, National Information      Infrastructure Enterprise Promotion Association (NIIEPA) was the      moderator. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;b&gt;&lt;br /&gt;Featured Research&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/indic-language-wikipedias-statistical-report-jan-june-2012"&gt;Indic Language Wikipedias – Statistical Report&lt;/a&gt; (January – June 2012) (by Shiju Alex, September 25, 2012): Shiju Alex      provides a compilation of the statistical update of the Indic language      Wikipedias from January to June 2012. He provides perspectives on the      health of various Indic language communities as well as the state of      various Indic language Wikipedias during the period.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Workshop Reports&lt;/b&gt;&lt;br /&gt;Although most of the following workshops were conducted prior to the grant period, the report for all of these was written in the month of September, and hence, we are featuring these.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/first-punjabi-wikipedia-workshop"&gt;The First Punjabi Wikipedia      Workshop&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 27,      2012): This post is about the first Punjabi Wikipedia workshop held in      Ludhiana, Punjab on July 28, 2012. Surinder Wadhawan, a Mumbai based      Wikipedian played an important role in designing this workshop and      introducing Punjabi Wikipedia to the Punjabi speakers. Long-term Punjabi      wikipedian G.S.Guglani also joined this workshop. The event was covered in      the &lt;a href="http://bit.ly/UMrDvs"&gt;Tribune&lt;/a&gt;, &lt;a href="http://bit.ly/UMrNTn"&gt;Hindustan Times&lt;/a&gt;, &lt;a href="http://bit.ly/UZhoT8"&gt;Punjab      Infoline&lt;/a&gt;, and &lt;a href="http://bit.ly/OcMANc"&gt;YesPunjab.com&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/punjabi-wikipedia-workshop-at-punjabi-university-patiala"&gt;Punjabi Wikipedia Workshop at      Punjabi University, Patiala&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi,      September 28, 2012): A Wikipedia workshop was organized at the Punjabi      University's Punjabi Department on August 16, 2012. Veteran Punjabi      wikipedian G.S. Guglani came forward to spread the message of Punjabi Wikipedia      among Punjabi speakers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/punjabi-wikipedia-workshop-at-amritsar"&gt;Punjabi Wikipedia Workshop at Amritsar&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 30, 2012): The workshop      was held at the Spring Dale Senior School, Amritsar on August 17, 2012. Nearly      50 participants including students and teachers from eight different      schools apart from the students and teachers of Spring Dale School      attended the workshop. One of the active and long-time Punjabi Wikipedian      Guglani Gurdip Singh led the workshop with the active support from Shiju      and Subhasish.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/report-of-the-wikipedia-workshop-in-british-library"&gt;Wikipedia Workshop in British      Library, Chandigarh&lt;/a&gt; (by Subhashish Panigrahi, September 27,      2012): A Wikipedia workshop was organized in Chandigarh by the British Library      over two days on August 24 and 25, 2012. Bipin Kumar, Head of British      Library and Christina, Deputy Manager had pivotal roles in designing this      workshop with support from Piyush, a wikipedian. The session on Day 1 was      conducted by Subhashish Panigrahi and the session on Day 2 was conducted      by Subhashish and Piyush.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/kannada-wiki-workshop-tumkur-university"&gt;Kannada Wiki Workshop at Tumkur University&lt;/a&gt; (Tumkur, Karnataka, September 15, 2012): This was the first Kannada      Wikipedia workshop at Tumkur. Prof. Ashwin Kumar from the Department of      English, Tumkur University and Kannada wikipedians, Om Shiva Prakash,      Hareesh, Tejus and Pavithra played vital roles in organising this      workshop. Shiju Alex participated in this workshop. About 30 participants      including students and teachers participated in this workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/editor-growth-and-contribution-on-telegu-wikipedia"&gt;Editor Growth &amp;amp; Contribution Program on Telugu      Wikipedia&lt;/a&gt; (by Nitika Tandon, September 29, 2012): Nitika Tandon      tells us about the Editor Growth &amp;amp; Contribution Program on Telegu      Wikipedia, how it will run, its necessity and the future steps.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-hyderabad-report"&gt;Wikipedia comes to Hyderabad!&lt;/a&gt; (by Noopur      Raval, September 30, 2012): A series of Wikipedia meetings were organized      in Hyderabad on September 29 and 30, 2012. These workshops were a part of      the larger effort to help Wikipedia contributors in the same city to meet      each other and strengthen the local community. There was coverage about      this event in the &lt;a href="http://www.thehindu.com/todays-paper/tp-features/tp-metroplus/drumming-session/article3943855.ece"&gt;Hindu&lt;/a&gt; on September 28, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/thinking-with-data"&gt;Thinking with Data@CIS&lt;/a&gt; (CIS, Bengaluru,      September 16 – 18, 2012): The course offered at the National Institute of      Advanced Studies was screened in CIS office.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;HasGeek&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://fifthelephant.in/2012/"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://droidcon.in/2011"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://androidcamp.hasgeek.com/"&gt;Android Camp&lt;/a&gt;,  etc. HasGeek is supported by CIS and works out from CIS office in  Bengaluru. The following event was organised by HasGeek in the month of  September:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cartonama-conference"&gt;Cartonama Conference&lt;/a&gt; (TERI Complex,      Bengaluru, September 22, 2012). The event was organised by HasGeek with      support from CIS.&lt;/li&gt;
&lt;/ul&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/www-indianexpress-com-one-zero"&gt;One. Zero.&lt;/a&gt; (Nishant Shah, Indian Express,      September 16, 2012): “The digital world is the world of twos. All our      complex interactions, emotional negotiations, business transactions,      social communication and political subscriptions online can be reduced to      a string of 1s and 0s, as machines create the networks for the human      beings to speak.”&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/digital-natives/pathways"&gt;Pathways to Higher Education&lt;/a&gt;&lt;/h3&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Pathways Project to Higher Education is a collaboration between the Higher Education Innovation and Research Applications at the Centre for the Study of Culture and Society and CIS. The project is supported by the Ford Foundation and works with disadvantaged students in nine undergraduate colleges in Maharashtra, Karnataka and Kerala, to explore relationships between Technologies, Higher Education and the new forms of social justice in India. Training workshops were organised in the month of September at Xaviers in Mumbai on September 6, 2012 and in Newman College, Thodupuzha from September 17 to 20, 2012. Each workshop had 25-30 undergraduate students from socio-economically disadvantaged backgrounds. They were trained to use digital technologies in order to think through problems of social justice.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;From 2012 to 2015, the RAW series will build research clusters in the field of Digital Humanities. The Habits of Living: Global Networks, Local Affects is a global collaborative project to renew the conceptual power of networks. It concentrates on changing the habits of living. The Department of Modern Culture and Media at Brown University is an important locus.&lt;/p&gt;
&lt;p&gt;CIS organised the Habits of Living Workshop in Bangalore from September 26 to 29, 2012. Jadine Lannon and Alok Vaid-Menon live blogged about the event:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-live-blog-introduction" class="external-link"&gt;Habits of Living Thinkathon - Day 1 Live Blog: Introduction&lt;/a&gt; (by Jadine Lannon, September 26, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-day-1-pecha-kucha" class="external-link"&gt;Habits of Living Thinkathon - Day 1 Live Blog: PechaKucha&lt;/a&gt; (by Jadine Lannon, September 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-globalising-lady-gaga" class="external-link"&gt;Habits of Living Thinkathon - Day 1 Live Blog: Globalising Lady GaGa&lt;/a&gt; (by Alok Vaid-Menon, September 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-day-2-water-in-india" class="external-link"&gt;Habits of Living Thinkathon - Day 2 Live Blog: Deepak Menon on Water in India&lt;/a&gt; (by Jadine Lannon, September 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-day-2-technology-and-feminism" class="external-link"&gt;Habits of Living Thinkathon - Day 2 Live Blog: On Technology and Affective Indian Feminism(s)&lt;/a&gt; (by Alok      Vaid-Menon, September 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-radhika-gajjala-lectures-on-e-philanthropy" class="external-link"&gt;Habits of Living Thinkathon - Day 2 Live Blog: Radhika Gajjala Lectures on e-Philanthropy&lt;/a&gt; (by Jadine Lannon, September      27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/habits-of-living-thinkathon-day-3-live-blog-joshua-neeves-on-media-archipelagos"&gt;Habits of Living Thinkathon - Day 3 Live Blog: Joshua      Neves on Media Archipelagos&lt;/a&gt; (by Jadine Lannon, September 26,      2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-day-4-finding-and-funding-the-masses" class="external-link"&gt;Habits of Living Thinkathon - Day 4 Live Blog: Finding and Funding the Masses&lt;/a&gt; (by Alok Vaid-Menon, September 26,      2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-day-3-exhibition-space" class="external-link"&gt;Habits of Living Thinkathon - Day 3 Live Blog: Akansha Rastogi's Performance on Exhibition Space&lt;/a&gt; &lt;br /&gt;(by Jadine Lannon,      September 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-day-4-wendy-chun-on-friends" class="external-link"&gt;Habits of Living Thinkathon - Day 4 Live Blog: Wendy Chun on Friends&lt;/a&gt; (by Jadine Lannon, September 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-day-4-amateur-photography" class="external-link"&gt;Habits of Living Thinkathon - Day 4 Live Blog: Namita Malhotra on Amateur Pornography&lt;/a&gt; (by Jadine Lannon, September 30,      2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/knowledge-and-capacity-around-telecom-policy"&gt;Building Knowledge and Capacity around Telecommunication Policy in India&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ford Foundation has given a grant of USD 2,00,000 to CIS to build expertise in the area of telecommunications in India. The knowledge repository deals with these modules: Introduction to Telecommunications, Telecommunications Infrastructure and Technologies, Government of India Regulatory Framework for Telecom, Telecommunication and the Market, Universal Access and Accessibility, The International Telecommunications Union and other international bodies, Broadcasting, Emerging Topics and Way Forward. Dr. Surendra Pal, Satya N Gupta, Paranjoy Guha Thakurta, Payal Malik, Dr. Rakesh Mehrotra and Dr. Nadeem Akhtar are the expert reviewers.&lt;/p&gt;
&lt;p&gt;&lt;span class="visualHighlight"&gt;The following are the new outputs:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/associations-regulating-broadcasting-in-india"&gt;Associations Regulating Broadcasting in India&lt;/a&gt; (by Srividya Vaidyanathan, September 11, 2012): Broadcast regulation in      India is currently an intricate web, with multiple agencies involved in      formulating and implementing policy, drafting and enforcing legislation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/home-1/telecom/telecom-knowledge-repository/optical-fibre"&gt;Optical Fibre&lt;/a&gt; (by Srividya Vaidyanathan,      September 11, 2012): This unit tells us what is optical fibre, the types      of optical fibres, how does an optical fibre work, fibre-optic relay      system, and why are optical fibres uses in telecommunication systems.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/home-1/telecom/telecom-knowledge-repository/direct-to-home"&gt;Direct to Home&lt;/a&gt; (by Srividya Vaidyanathan,      September 18, 2012): This unit tells us about Direct to home television,      its history, how it works, the programming, its advantages and      disadvantages are discussed in this module.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/home-1/telecom/telecom-knowledge-repository/cable-tv"&gt;Cable Television&lt;/a&gt; (by Srividya Vaidyanathan,      September 18, 2012): This unit brings you the history and evolution of      cable television in India, talks about other cable based services, cable      television digitization rule and the end consumer in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/home-1/telecom/telecom-knowledge-repository/private-fm"&gt;Private FMs&lt;/a&gt; (Commercial, Campus and      Community Radios) (by Srividya Vaidyanathan, September 24, 2012): This      unit introduces us to AM and FM, tells us the role of private FMs      including what is a community radio and what is a campus radio.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/types-of-radio-broadcasting-in-india"&gt;Types of Radio Broadcasting in India&lt;/a&gt; (by      Srividya Vaidyanathan, September 28, 2012): This unit tells us what is      radio broadcasting, takes us through the history of radio broadcasting in      India, explains what is AM and FM in the Indian context.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/home-1/telecom/telecom-knowledge-repository/air-and-its-operations"&gt;A History of All India Radio and Its Operations&lt;/a&gt; (by Srividya Vaidyanathan, September 29, 2012): This module gives us a      picture of the history of All India Radio and its operations. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/organizing-india-blogspot-in-shyam-ponappa-sep-5-2012-changing-our-game"&gt;Changing Our Game&lt;/a&gt; (by Shyam Ponappa,      Business Standard, September 5, 2012): “Adopting 'co-ordination models'      like the Stag Hunt could reduce contention and improve outcomes.” This was      re-posted in &lt;a href="http://organizing-india.blogspot.in/2012/09/changing-our-game.html"&gt;Organizing India blogspot&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.mach.com/en/News-Events/Events/Insights/Insights-India-2012"&gt;Insights India 2012&lt;/a&gt; (organised by MACH,      Bangalore, September 26 – 28, 2012): Snehashish Ghosh and Srividya      Vaidyanathan participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. Over the last four years our policy research programmes have resulted in outputs such as the &lt;a href="https://cis-india.org/advocacy/accessibility/blog/e-accessibility-handbook"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="https://cis-india.org/digital-natives/front-page/blog/dnbook"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="https://cis-india.org/digital-natives/front-page/blog/position-papers"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="https://cis-india.org/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos. With the Government of India we have done policy research for Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="https://cis-india.org/a2k/blog/cis-analysis-july2011-treaty-print-disabilities"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/front-page/blog/cis-feedback-to-nia-bill"&gt;NIA Bill&lt;/a&gt;, etc.&lt;/p&gt;
&lt;p&gt;CIS is an accredited NGO at WIPO and has given policy briefs to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="https://cis-india.org/accessibility/blog/national-award"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="https://cis-india.org/news/nirmita-nivh-award"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;*Follow us elsewhere*&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us      on Twitter&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2012-bulletin'&gt;https://cis-india.org/about/newsletters/september-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-10-09T06:48:33Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2011-bulletin">
    <title>September 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage that happened in the month of September 2011.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research base, the RAW programme has been collaborating with different organizations and individuals in order to focus on its two year thematic of Histories of the Internets in India. Five monographs were recently launched at a workshop, &lt;a href="https://cis-india.org/research/conferences/conference-blogs/workshop"&gt;Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum&lt;/a&gt; held in Ahmedabad from 19 to 22 August 2011.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/rewiring-bodies"&gt;Re:Wiring Bodies&lt;/a&gt; by Asha Achuthan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/last-cultural-mile"&gt;The Last Cultural Mile&lt;/a&gt; by Ashish Rajadhyaksha&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/porn-law-video-technology"&gt;Porn: Law, Video, Technology&lt;/a&gt; by Namita A Malhotra &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/archives-and-access"&gt;Archives and Access&lt;/a&gt; by Aparna Balachandran and Rochelle Pinto &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/internet-society-space"&gt;Internet, Society and Space in Indian Cities&lt;/a&gt; by Pratyush Shankar&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS, India and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;Featured Publication&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/blog/dnbook"&gt;Digital AlterNatives with a Cause?&lt;/a&gt; - This collaboratively produced collective, edited by Nishant Shah and Fieke Jansen, asks critical and pertinent questions about theory and practice around ‘digital revolutions’ in a post MENA (Middle East - North Africa) world. It works with multiple vocabularies and frameworks and produces dialogues and conversations between digital natives, academic and research scholars, practitioners, development agencies and corporate structures to examine the nature and practice of digital natives in emerging contexts from the Global South.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/digital-alternatives-book-review"&gt;Digital (Alter)Natives with a Cause? — Book Review by Maarten van den Berg&lt;/a&gt; - The books come in a beautifully designed cassette and are accompanied by a funky yellow package in the shape of a floppy disk containing the booklet ‘D:coding Digital Natives’, a corresponding DVD, and a pack of postcards portraying the evolution of writing - in the sentence ‘I love you’, written with a goose feather in 1734, to the character set ‘i&amp;lt;3u’ entered on a mobile device in 2011, writes Maarten van den Berg. The review was published in "&lt;a href="http://www.thebrokeronline.eu/Articles/Digital-Alter-Natives"&gt;The Broker&lt;/a&gt;" on 19 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/book-launch"&gt;Digital AlterNatives book launch&lt;/a&gt; – CIS and Hivos launched this book at the Museum for  Communication, Hague on 16 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/usof-meeting"&gt;Stakeholders Meeting of the USOF on Facilitating ICT Access to Persons with Disabilities in Rural Areas&lt;/a&gt;, on 7 September 2011. Nirmita Narasimhan made a presentation.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Access to Knowledge is a campaign to promote the fundamental principles of justice, freedom, and economic development. It deals with issues like copyrights, patents, and trademarks, which are an important part of the digital landscape. CIS believes that access to knowledge and culture is essential, and such access promotes creativity and innovation, and helps bridge the differences between the developing and developed worlds in a positive manner. Towards this end, CIS is campaigning for an international treaty on copyright exceptions for print-challenged people, advocating against laws (such as the PUPFIP Bill) that privatize public-funded knowledge, call for the WIPO Broadcast Treaty to be restricted to broadcast, question the demonization of 'pirates', and support endeavours that explore and question the current copyright regime.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/copyright-bill-parliament"&gt;Copyright Amendment Bill in Parliament&lt;/a&gt; by Nirmita Narasimhan, 30 August 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/photocopying-the-past"&gt;Photocopying the past&lt;/a&gt; by Sunil Abraham in the Indian Express, 2 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/calling-out-the-bsa-on-bs"&gt;Calling Out the BSA on Its BS&lt;/a&gt; by Pranesh Prakash, 9 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Internet technologies have fundamentally questioned the notion of governance, not only at the level of administration but also at the level of mechanisms of control, regulation and shaping of the individual. e-Governance initiatives, in combination with other regimes of surveillance, control and censorship, are redefining what it means to be a citizen, a subject, and an individual. We look at questions of governance — at the micro level of the individual and the private (family, relationships, community structures, etc.) as well as the level of governmentality — at the macro level of nation state, citizenship, market economies, and the public (spaces of consumption, work, leisure, political engagement, etc.) under the umbrella of digital governance.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/understanding-right-to-information"&gt;Understanding the Right to Information&lt;/a&gt; by Elonnai Hickok, 28 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/internet-as-a-tool-for-political-change"&gt;Using the Internet as a Tool for Political Change: Lessons Learned and Way Forward&lt;/a&gt;, IGF, Nairobi, 27 September 2011. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers.&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/blog/reviving-growth"&gt;Reviving Growth&lt;/a&gt;, published in the Business Standard on 1 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/open-spectrum-for-development-in-the-context-of-the-digital-migration"&gt;Open Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;, IGF, Nairobi, 29 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;Film Screening&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/partners-in-crime"&gt;Screening of Partners in Crime&lt;/a&gt;, Vikalp@Smriti Nandan along with CIS screened the film and followed it with a discussion with the director of the film, Paromita Vohra, Smriti Nandan Cultural Centre, 9 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/workshop-rsa-encryption"&gt;Prime Security: The Mathematics of RSA Encryption&lt;/a&gt;, a one-day workshop with Rohit Gupta, a leading Mathematician.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-masks-forgotten-protests"&gt;India's social media "spring" masks forgotten protests&lt;/a&gt; [Alistair Scrutton in Reuters, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-key-to-hazare-success"&gt;Social media holds the key to Hazare's campaign success&lt;/a&gt; [Alistair Scrutton in NEWS.scotsman.com, 26 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/digital-divide"&gt;Digital divide: Why Irom Sharmila can’t do an Anna&lt;/a&gt; [FirstPost.Ideas, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/revolutions-viral?searchterm=When+revolutions+go+viral+"&gt;When revolutions go viral&lt;/a&gt; [Times of India (Crescent Edition), 27 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ibsa-seminar"&gt;IBSA Seminar on Global Internet Governance&lt;/a&gt;, organised by the Brazilian Ministry of External Relations, with support from the Brazilian Internet Steering Committee (CGI.br) and the Center for Technology &amp;amp; Society (CTS/FGV) and governmental and non- governmental actors from India, Brazil and South Africa, 1 to 2 September 2011, Fundacao Getulio Vargas (FGV) - Rio de Janeiro, Brazil. Pranesh Prakash participated in this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/copyright-amendment-bill-in-indian-parliament"&gt;Copyrights Amendment Bill to Be Tabled in Indian Parliament – Parallel Import provisions have Been Removed&lt;/a&gt; [Mike Palmedo in infojustice.org, 5 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/power-of-information"&gt;The Power of Information: New Technologies for Philanthropy and Development&lt;/a&gt; [Indigo Trust, 15 September 2011]. Sunil Abraham participated in this event. A video of his speech is now available on &lt;a href="http://www.youtube.com/watch?v=XhpLkEhn9AY"&gt;YouTube&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/using-social-media-to-understand-peoples-pulse"&gt;Planning Commission, Census 2011 and India Post using social media to understand people's pulse better&lt;/a&gt; [Vikas Kumar in the Economic Times, 20 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/foss-instrument-for-accessible-development"&gt;The Impact of Regulation: FOSS and Enterprise&lt;/a&gt;, organised by FOSSFA and ICFOSS, IGF, Nairobi, 28 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/privacy-security-access-to-rights"&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/a&gt;, organised by Expression Technologies, IGF, Nairobi, 29 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/how-can-privacy-be-protected"&gt;Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/a&gt;, organised by GSM Association, 29 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/truman-show-in-kerala"&gt;The Truman Show, in Kerala&lt;/a&gt; [Times of India, posted on CIS website on 23 September 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/making-difference-online-offline"&gt;Making a difference, online and offline&lt;/a&gt; [LiveMint, 27 September 2011].&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Follow CIS on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=457&amp;amp;qid=46981" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=458&amp;amp;qid=46981" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2011-bulletin'&gt;https://cis-india.org/about/newsletters/september-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-07-30T06:34:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2010-bulletin">
    <title>September 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this bulletin we bring you updates of our research, news and media coverage and announcement of events organised in the month of September 2010.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Conference: Internet at Liberty 2010: This conference is being held in Budapest from 20 to 22 September 2010. It is co-sponsored by Google and Central European University. Sunil Abraham and Anja Kovacs are attending the conference. &lt;a href="http://bit.ly/afo0WY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/afo0WY&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; INDIA Fears of Privacy Loss Pursue Ambitious ID Project: Fears about loss of privacy are being voiced as India gears up to launch an ambitious scheme to biometrically identify and number each of its 1.2 billion inhabitants. &lt;a href="http://bit.ly/dnJDRu" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dnJDRu&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Innovate / Activate: The event will be held on 24 and 25 September 2010 at New York Law School. &lt;a href="http://bit.ly/cbICFq" target="_blank"&gt;http://bit.ly/cbICFq&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Webinar: Closed for Business: A Global Panel Discusses International Copyright Laws and Their Impact on the Open Internet &lt;a href="http://bit.ly/a3ZFBw" target="_blank"&gt;&lt;br /&gt;http://bit.ly/a3ZFBw&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The madness of software patents &lt;br /&gt;India’s patent law excludes software per se, yet over a thousand patents have been granted, writes Lata Jishnu in an article published in Down to Earth. &lt;a href="http://bit.ly/cpHd7R" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cpHd7R&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Why piracy is tough to rein in &lt;br /&gt;“Video market is being treated as a poor cousin of the film industry” &lt;a href="http://bit.ly/aDUpiY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aDUpiY&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency and MDGs: the Role of the Media and Technology &lt;br /&gt;Key quotes from sixth panel &lt;a href="http://bit.ly/b3a0YC" target="_blank"&gt;&lt;br /&gt;http://bit.ly/b3a0YC&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Copyright bill restricts Net access &lt;br /&gt;Law to curb piracy may fetter creativity &lt;a href="http://bit.ly/cFj3rD" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cFj3rD&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;科技改變社會 數位原生代計畫 &lt;br /&gt;The Chinese language press covered the Digital Natives workshop in Taipei. &lt;a href="http://bit.ly/bPhEO4" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bPhEO4&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;科技改變社會數位原生代掀波 &lt;br /&gt;The Chinese press published an article on Digital Natives. &lt;a href="http://bit.ly/bHaQor" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bHaQor&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Information is Beautiful hacks in India with David Cameron &lt;br /&gt;The Prime Minister took some of the UK's top hackers and data experts with him to India this week. David McCandless was with them. &lt;a href="http://bit.ly/dr3AJ2" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dr3AJ2&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Events&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;International Conference on Enabling Access to Education through ICT: ICT workshop in New Delhi from 27th to 29th October, 2010...Registrations open!&lt;a href="http://bit.ly/9flyEK" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9flyEK&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;A Talk by Philipp Schmidt: Philip Schmidt of Peer 2 Peer University will be giving a lecture at the Centre for Internet and Society, Bangalore on 6 October, 2010. &lt;a href="http://bit.ly/aVyzMq" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aVyzMq&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;On Talking Back: A Report on the Taiwan Workshop: What does it mean to Talk Back? Who do we Talk Back against? Are we alone in our attempts or a part of a larger community? How do we use digital technologies to find other peers and stake-​holders? What is the language and vocabulary we use to successfully articulate our problems? How do we negotiate with structures of power to fight for our rights? These were the kind of questions that the Talking Back workshop held in the Institute of Ethnology, Academia Sinica in Taiwan from 16 to 18 August 2010 posed. &lt;a href="http://bit.ly/daE4dM" target="_blank"&gt;&lt;br /&gt;http://bit.ly/daE4dM&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Binary: City and Nature: A continuation of the last post wherein I am looking at various other representation of the city in both classical and popular medium, today I am writing my views on the analysis of certain Miniature paintings. &lt;a href="http://bit.ly/b5FP5D" target="_blank"&gt;&lt;br /&gt;http://bit.ly/b5FP5D&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Of the State and the Governments - The Abstract, the Concrete and the Responsive: This post examines the concepts of state and government to lay the ground for understanding responsiveness enforced through transparency discourses and the deployment of ICTs, the Internet and e-governance programmes. It also lays the context for understanding why and how ICTs. Internet and e-governance have been deployed in India for improving government-citizen interfaces, eliminating middlemen, delivering services electronically and for introducing a range of similar reforms to institute transparency and a responsive state. &lt;a href="http://bit.ly/cNLKcY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cNLKcY&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Responsive State --- Introduction to the Series: This post is an introduction to a series of posts on the concept of the 'responsive state'. In this series, I try to explain the various meanings that the term responsiveness has come to acquire when it is used in relation with the discourses surrounding transparency and the deployment of ICTs and the Internet to enforce transparency and thereby create a responsive state. Understanding the notion of responsiveness requires us to revisit and analyze certain concepts and the relations that have been drawn between concepts such as state, government, politics, administration, transparency, effectiveness, government-citizen interface, ICTs and effectiveness, among others. &lt;a href="http://bit.ly/agBOiq" target="_blank"&gt;&lt;br /&gt;http://bit.ly/agBOiq&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Attentional Capital in Online Gaming: The Currency of Survival &lt;br /&gt;This blog post by Arun Menon discusses the concepts of production, labour and race in virtual worlds and their influence on the production of attention as a currency. An attempt is made to locate attentional capital, attentional repositories and attention currencies within gaming to examine 'attention currencies and its trade and transactions in virtual worlds. A minimal collection of attention currencies are placed as central and as a pre-requisite for survival in MMOs in much the same way that real currency become a necessity for survival. The approach is to locate attentional capital through different perspectives as well as examine a few concepts around virtual worlds. &lt;a href="http://bit.ly/aaGZj8" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aaGZj8&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;What's in a Name? Or Why Clicktivism May Not Be Ruining Left Activism in India, At Least for Now: In a recent piece in the Guardian titled “Clicktivism Is Ruining Leftist Activism”, Micah White expressed severe concern that, in drawing on tactics of advertising and marketing research, digital activism is undermining “the passionate, ideological and total critique of consumer society”. His concerns are certainly shared by some in India: White's piece has been circulating on activist email lists where people noted with concern that e-activism may be replacing “the real thing” even in this country. But is the situation in India really this dire? &lt;a href="http://bit.ly/9a3I0G" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9a3I0G&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sexuality, Queerness and Internet technologies in Indian context: This blog post lays out the discursive construction of sexuality and queerness as intelligible domains in the Indian context while engaging with ideas of visibility, representation, exclusion, publicness, criminality, difference, tradition, experience, and community that have come into use with the critical responses to queer identities and practices in India. &lt;a href="http://bit.ly/byfPye" target="_blank"&gt;&lt;br /&gt;http://bit.ly/byfPye&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Enabling Access to Education through ICT - A Conference in Delhi: The Centre for Internet and Society (CIS), Bangalore in cooperation with the Global Initiative for Inclusive ICT (G3ICT), a flagship advocacy organization of the UN Global Alliance on ICT and Development (UN-GAID), the International Telecommunications Union (ITU), UNESCO, Digital Empowerment Foundation, Society for Promotion of Alternative Computing and Employment and the Deafway Foundation is organizing an international conference, Enabling Access to Education through ICT in New Delhi from 27 to 29 October 2010. The event is sponsored by Hans Foundation. Registration for the conference has begun. &lt;a href="http://bit.ly/bmrkf7" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bmrkf7&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Access to Knowledge&lt;br /&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Pre-grant Opposition Filed for a Software Patent Application by Blackberry Manufacturers: A pre-grant opposition was filed against a software patent application filed in the patent office by Certicom, a wholly owned subsidiary of Research in Motion (RIM), manufacturers of Blackberry. The opposition was filed on August 31, 2010 by the Software Freedom Law Centre which has recently expanded its operations to India. This exciting development was announced by Mishi Choudhary from SFLC on the lines of the seminar on “Software Patents and the Commons” organised on 1 September 2010 in Delhi jointly by SFLC, the Centre for Internet and Society, the Society for Knowledge Commons and Red Hat. Filing more such oppositions to software patents in India was in the pipeline and this is just the beginning of a movement to take on monopolisation of knowledge and ideas through patenting software, the organisers said. &lt;a href="http://bit.ly/9wE1Xs" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9wE1Xs&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;First Post-Bilski Decision - Software Patent Rejected: In the first decision post-Bilski, the Board of Patents Appeals and Interferences (BPAI) rejected a software patent claimed by Hewlett-Packard. The ruling in this case has buttressed the fact that the Bilski decision furthered the cause of narrowing the patentability of software even though the Supreme Court of the United States totally avoided mentioning software patents or the applicability of the machine or transformation test for software patents in its decision. &lt;a href="http://bit.ly/cnPw7E" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cnPw7E&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Bilski Case - Impact on Software Patents: The Supreme Court of the United States gave its decision in Bilski v Kappos on 28 June, 2010. In this case the petitioners’ patent application sought protection for a claimed invention that explains how commodities buyers and sellers in the energy market can protect, or hedge, against the risk of price changes. The Court in affirming the rejection by the Court of Appeals for the Federal Circuit also held that the machine- or-transformation test is not necessarily the sole test of patentability. The Court’s ruling of abstract ideas as unpatentable and its admission that patents do not necessarily promote innovation and may sometimes limit competition and stifle innovation have provided a ray of hope. In the light of the developments, the Bilski decision as far as patentability of software is concerned may not be totally insignificant, says Krithika Dutta Narayana.&lt;a href="http://bit.ly/bjrPGh" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bjrPGh&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt; Free Access to Law—Is it here to Stay? An Environmental Scan Report: The following is a preliminary project report collaboratively collated by the researchers of the "Free Access to Law" research study. This report aims to highlight the trends, as well as the risks and opportunities, for the sustainability of Free Access to Law initiatives in each of the country examined. &lt;a href="http://bit.ly/9VVzkk" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9VVzkk&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Open Access to Science and Scholarship - Why and What Should We Do?: The National Institute of Advanced Studies held the eighth NIAS-DST  training programme on “Multidisciplinary Perspectives on Science,  Technology and Society” from 26 July to 7 August, 2010. The theme of the  project was ‘Knowledge Management’. Dr. MG Narasimhan and Dr. Sharada  Srinivasan were the coordinators for the event. Professor Subbiah  Arunachalam made a presentation on Open Access to Science and  Scholarship. &lt;a href="http://bit.ly/ciohYy" target="_blank"&gt;&lt;br /&gt;http://bit.ly/ciohYy&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Moldova Online: An Interview with Victor Diaconu: In this interview for Russian Cyberspace, set up with the help of Sunil Abraham (Executive Director at the Centre for Internet and Society in Bangalore, India), computer software professional Victor Diaconu explains the nature of Internet use, state control and the development of blogging and social media platforms in Moldova. Victor works at Computaris in Chisinau. He is Moldova educated, and has travelled to several western countries (including lengthy stays to US, UK) to learn about and understand what there is to be done in Moldova. Sudha Rajagopalan interviewed Victor Diaconu. &lt;a href="http://bit.ly/cgIvXT" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cgIvXT&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Presentation of the UID project by Ashok Dalwai – A Report: On Tuesday, 7 September 2010, Ashok Dalwai, the Deputy Director General of the Unique Identification of India (UIDAI), gave a lecture at the Indian Institute for Science in Bangalore. Representing the UID Authority, his presentation explained the vision of the project and focused on the challenges involved in demographic and biometric identification, the technology adopted, and the enrolment process. Elonnai Hickok gives a report of his presentation in this blog post. &lt;a href="http://bit.ly/aAy5DG" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aAy5DG&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Beyond Access as Inclusion: On 13 September, the day before the fifth Internet Governance Forum opens, CIS is co-organised in Vilnius a meeting on Internet governance and human rights. One of the main aims of this meeting was to call attention to the crucial, yet in Internet governance often neglected, indivisibility of rights. In this blog post, Anja Kovacs uses this lens to illustrate how it can broaden as well reinvigorate our understanding of what remains one of the most pressing issues in Internet governance in developing countries to this day: that of access to the Internet. &lt;a href="http://bit.ly/cgS9py" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cgS9py&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Summary of UID Public Meeting, August 25 2010: A summary of the "No UID" public meeting that took place on Aug. 25th at the Constitution Club, New Dehli. &lt;a href="http://bit.ly/9epHTz" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9epHTz&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;No UID Campaign in New Delhi - A Report: The Unique Identification (UID) Bill is not pro-citizen. The scheme is deeply undemocratic, expensive and fraught with unforseen consequences. A public meeting on UID was held at the Constitution Club, Rafi Marg in New Delhi on 25 August, 2010. The said Bill came under scrutiny at the meeting which was organised by civil society groups from Mumbai, Bangalore and Delhi campaigning under the banner of "No UID". The speakers brought to light many concerns, unanswered questions and problems of the UID scheme. &lt;a href="http://bit.ly/97HwbS" target="_blank"&gt;&lt;br /&gt;http://bit.ly/97HwbS&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wherever you are, whatever you do: Facebook recently launched a location-based service called Places. Privacy advocates are resenting to this new development. Sunil Abraham identifies the three prime reasons for this outcry against Facebook. The article was published in the Indian Express on 23 August, 2010. &lt;a href="http://bit.ly/adXVjB" target="_blank"&gt;&lt;br /&gt;http://bit.ly/adXVjB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;What a highway can do: Despite signs of transformational change, we need more - SOPs and quality &lt;a href="http://bit.ly/deUbmU" target="_blank"&gt;http://bit.ly/deUbmU&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2010-bulletin'&gt;https://cis-india.org/about/newsletters/september-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-10T07:22:30Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sense-and-censorship">
    <title>Sense and censorship</title>
    <link>https://cis-india.org/internet-governance/blog/sense-and-censorship</link>
    <description>
        &lt;b&gt;Sunil Abraham examines Google's crusade against censorship in China in wake of the attacks on its servers in this article published in the Indian Express.&lt;/b&gt;
        
&lt;p&gt;Some believe that Google’s co-founder Sergey Brin’s memories as a six-year-old in the former Soviet Union has inspired Google’s crusade against censorship in China. However, as Siva Vaidhyanathan, author of upcoming book The Googlisation of Everything, notes in a recent blog post — this “isn’t a case of Google standing up for free speech....but about Google standing up against the attacks.”&lt;/p&gt;
&lt;p&gt;He was referring to the attacks on Google’s servers that originated from China mid-December last year. Anyone running a multi-billion dollar enterprise online would be well attuned to the security threats posed by anarchists, crackers, spammers and phishers on a daily basis. So what made the recent Google attacks so special? According to Google, intellectual property was stolen and two human-right activists accounts were compromised during the attack. So which was the straw that broke the camel’s back — intellectual property or human rights? Google could have spoken out against censorship years ago — after all it still censors search results in more than 20 countries, including India. Although there is no official channel or protocol guiding censorship practices in India, Google is regularly contacted by government officials and continues to delete web content deemed sensitive according to various ethnic, political and religious groups. Human rights activists note that Google offers some token resistance and then usually complies with the state’s demands. Google’s deputy general counsel, Nicole Wong, justifies her cooperation with the authorities citing the Indian way of torching buses during riots. Therefore it is odd that the US government endorses Google’s selective idealism in China. One week after the attacks, Hillary Clinton decided to lecture the world on Internet freedom. Then, Google and the National Security Agency announced a collaboration to deal with future cyber-attacks. This was followed by Google honouring female bloggers in Iran, forcing cyber-ethnographer, Maximilian Forte to wonder on Twitter, “Is it just me, or is Google consistently joining the causes of the US State Department?” How is Google’s move, and recent White House support for a “free web”, to be understood? How is Google’s move consistent with the Obama administration’s goal of protecting US business interests across the globe? Such questions may tell us why Google is picking a fight with China rather than Saudi Arabia or Burma. The recent privacy disaster incited by the release of Google’s new social networking application Buzz became yet another occasion when many began to doubt Google’s high rhetoric about freedom of expression. When Buzz first made the social connections of Gmail users public without their consent, blogger Evgeny Morozov questioned the company’s logic in protecting the email accounts of Chinese human rights activists (ie, when they are happy to tell the rest of the world who those activists are talking to). According to Morozov, Google has only managed to capture 30 per cent of the Chinese search market, and he believes that Google was willing to sacrifice this market for some much need needed positive PR given after a storm of bad press after projects like Buzz and Wave.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is clear that Google will have to fight such pressures towards greater control of the internet across the globe, China being no great exception. This week, Google and Yahoo have come out strongly in opposition to Australia’s plan to implement a mandatory ISP filter. Sometimes, a particular form of censorship serves a useful and necessary purpose — for example, Google and Microsoft were forced by the Indian Supreme Court in September 2008 to stop serving advertisements for do-it-yourself foetus sex determination kits. Given our daughter deficit, I would not have it any other way. However, in Thailand, such filtering takes the form of overly expansive lèse majesté laws which force ISPs to reveal details of individuals posting content deemed insulting to the monarch, Bhumibol Adulyadej — this practice leading to self-censorship and over-moderation on forums and mailing lists in Thailand.&lt;/p&gt;
&lt;p&gt;Also, soon as traffic was redirected from Google.cn to Google.com.hk, Google advised its enterprise customers in China to use VPN (virtual private networking), SSH (secure shell) tunneling, or a proxy server to access Google Apps. These are circumvention technologies of choice for many Chinese cyber-activists, says Rebecca McKinnion, founder of Global Voices Online. In her recent congressional submission, she also points out that in China, online defiance has a very different history, perhaps best illustrated by the Mud Grass Horse Internet meme which was an obscene pun on a government media campaign aimed at national unity and harmony. In China, aesthetics rather than technology is the primary tool for subversive political speech. Also like in Burma and Saudi Arabia, offline piracy and pirated satellite television ensures that most citizens are able to access censored content. And the average Chinese netizen cannot tell the difference between Google censoring its own results and the Great Firewall censoring Google. Google’s recent actions has very little real impact on the state of censorship in China.&lt;/p&gt;
&lt;p&gt;For original article in the &lt;a class="external-link" href="http://www.indianexpress.com/news/senseandcensorship/596260/"&gt;Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sense-and-censorship'&gt;https://cis-india.org/internet-governance/blog/sense-and-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:15:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/sense-and-censorship">
    <title>Sense and Censorship</title>
    <link>https://cis-india.org/internet-governance/sense-and-censorship</link>
    <description>
        &lt;b&gt;The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) bills, at the US House of Representatives and Senate, respectively, appear to enforce property rights, but are, in fact, trade bills. This article by Sunil Abraham was published in the Indian Express on 20 January 2012.&lt;/b&gt;
        
&lt;p&gt;In developed countries like the US, intellectual property (IP) plays a
 dominant role in the economy, unlike in economies like India. Countries
 that have significant IP are keen to increase global and national 
enforcement activities, while countries with little domestic IP are keen
 to reduce outgoing royalties in the balance of payments and therefore, 
keen to expand alternatives, limitations and exceptions like copyleft 
licensing, compulsory/statutory licensing and fair dealing.&lt;/p&gt;
&lt;p&gt;The loss of generic medicines, hardware based on open standards, 
public domain content, free and open source software, open access 
journal articles, etc will equally impoverish consumers in the US and in
 India. SOPA and PIPA, therefore, do not represent the will of the 
average American but rather the interests of the IP sector, which has 
tremendous influence in the Hill. There is one more layer of 
complication for policy-makers to consider as they work towards a 
compromise of interests in Internet governance — the tension between the
 old and the new. The incumbents — corporations with business models 
that have been rendered obsolete by technological developments — versus 
emerging actors who provide competing products and services, often with 
greater technological sophistication, higher quality, at a lower cost.&lt;/p&gt;
&lt;p&gt;The US, in terms of policy and infrastructure, still controls the 
global Domain Name System (DNS) and consequently, post-SOPA/PIPA, can 
take unilateral trade action without worrying about national variations 
enabled by international law. These bills directly undermine the 
business models of many Indian companies — generic drug manufacturers 
like Ranbaxy, software service providers like Infosys, electronics 
manufacturers like Spice and players in many other sectors dominated by 
IP rights. So it is baffling that they have not added their voices to 
the global outcry.&lt;/p&gt;
&lt;p&gt;SOPA and PIPA, if passed, will enable the US administration to take 
three-pronged action against IP infringers — seizure of domain names and
 DNS filtering, blocking of transactions by financial intermediaries and
 revocation of hosting by ISPs. While circumvention may still be 
possible, it will get increasingly laborious — something like the Great 
Firewall of China, but worse. Unfortunately, the implementation of these
 blunt policy instruments will require more and more public-funded 
surveillance and censorship.&lt;/p&gt;
&lt;p&gt;The censorship potential of efforts like SOPA and PIPA may appeal to 
others, as autocratic and democratic regimes across the world have been 
keen to try technology-mediated social engineering — these efforts have 
been multiplied in the post-Arab Spring and Occupy Wall Street world. 
Organised religion, social conservatives and those who have been at the 
receiving end of free speech would all want to shut down platforms like 
WikiLeaks and political movements like Anonymous and the Pirate Party.&lt;/p&gt;
&lt;p&gt;These are equally dismal times for Internet governance in India. 
Google, Facebook and 20-odd other intermediaries are trying to avoid 
jail time at the hands of a Delhi court. However, ever since the IT Act 
amendments were put in place three years back, digital activists have 
been requesting intermediaries to register their protests early and 
often, regarding draconian provisions in the statute and in the 
associated rules. Their silence is going to be very expensive for all of
 us. We cannot depend on the private sector alone to defend our 
constitutional rights. As yet unpublished research from CIS demonstrates
 that private intermediaries only bother with defending freedom of 
expression when it undermines their business interests. Working with an 
independent researcher, we conducted a policy sting operation — faulty 
take-down notices were served to seven intermediaries asking for 
legitimate content to be taken down. In six of those cases, the 
intermediaries over-complied, in one case deleting all comments on a 
news article instead of just those comments identified in the notice. 
The only take-down that was resisted was one claiming that sale of 
diapers was “harmful to minors” under the Indian IT Act (because they 
caused nappy rash). It is clear that the IT Act and its associated rules
 have already had a chilling effect on online participation by Indians.&lt;/p&gt;
&lt;p&gt;Fortunately for us, during the previous parliamentary session — 
Jayant Chaudhary, Lok Sabha MP from the Rashtriya Lok Dal, asked for the
 revision of rules concerning intermediaries, cyber-cafes and reasonable
 security practices. The next Parliament session is the last opportunity
 for the House to reject these rules and intervene for a free Internet.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The writer is executive director of the Bangalore-based Centre for Internet and Society&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/sense-and-censorship/901686/1"&gt;Read&lt;em&gt; &lt;/em&gt;the original published in the Indian Express&lt;/a&gt;&lt;em&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/sense-and-censorship/901686/1"&gt; &lt;/a&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/sense-and-censorship'&gt;https://cis-india.org/internet-governance/sense-and-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-01-31T06:15:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/seminar-artist-talks-outresourcing-with-the-transmediale-collective">
    <title>Seminar/Artist Talks : "Outresourcing" with the Transmediale Collective</title>
    <link>https://cis-india.org/news/seminar-artist-talks-outresourcing-with-the-transmediale-collective</link>
    <description>
        &lt;b&gt;Sharath Chandra Ram is presenting a White Paper at this event initiated by the Berlin - Transmediale new media collective in Bangalore on December 3, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;OutResourcing is a collaboration project in 2011-2013 of transmediale, festival for art and digital culture, Berlin in cooperation with &lt;a href="http://cema.srishti.ac.in/site/"&gt;CEMA&lt;/a&gt;, Center for Experimental Media Arts at &lt;a href="http://srishti.ac.in/"&gt;Sristhi School of Art, Design and Technology&lt;/a&gt;, Bangalore. It is supported by &lt;a href="http://www.goethe.de/enindex.htm"&gt;Goethe Institute&lt;/a&gt; and the framework of &lt;a href="http://www.germany-and-india.com/"&gt;Germany and India 2011-2012: Infinite Opportunities&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OutResourcing explores the pervasive phenomenon of outsourcing from a critical constructive point of view. Outsourcing is often either simply embraced as an economical necessity of labor costs in a global economy or criticised as such on the basis of the uneven distribution of wealth, power and/or labor that it entails.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;General Welcome and Introductions&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;2.00 p.m.&lt;/td&gt;
&lt;td&gt;First session “outResourcing Phase 1: Rebugging and Insulating”&lt;br /&gt;Moderator: Kristoffer Gansing, artistic director, Transmediale&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.15 p.m.&lt;/td&gt;
&lt;td&gt;Kristoffer Gansing – 15 minutes introduction to outResourcing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.30 p.m.&lt;/td&gt;
&lt;td&gt;Prayas Abhinav (Artist talk), MAS*ING: INSULATION, ARTIST TALK&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.00 p.m.&lt;/td&gt;
&lt;td&gt;Linda Hilfling (Artist talk), THE REBUGGING MANUALS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.30 p.m.&lt;/td&gt;
&lt;td&gt;Sharath Chandra Ram (Artist talk), CLOSED CAPTION&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.00 - 4.30 p.m.&lt;/td&gt;
&lt;td&gt;Common discussion 30 minutes&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Break 30 minutes&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;5.00 p.m.&lt;/td&gt;
&lt;td&gt;Second Session “outResourcing Phase 2: “Manufacturing and Copying” Moderator: Abhiyan Humane&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.10 p.m.&lt;/td&gt;
&lt;td&gt;Galerie C&amp;amp;V "ESSAY ON PRODUCTIVE RESOURCES"&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.40 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Presentation of exhibition by Srishti School of Art, Design &amp;amp; Technology in collaboration with Galerie C&amp;amp;V&lt;/p&gt;
&lt;p&gt;Title - THE CONVENIENT TRUTH&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.15 p.m.&lt;/td&gt;
&lt;td&gt;Common discussion 25 minutes&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Break 20 minutes&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;7.00 - 8.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction: Kristoffer Gansing&lt;br /&gt;Keynote lecture: Dieter Daniels: RE-SOURCING THE READY-MADE&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;For more information  about the event, &lt;a class="external-link" href="http://info.srishti.ac.in/mailer/OutResoucing-Seminar/SEMINARoutresource-new.pdf"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/seminar-artist-talks-outresourcing-with-the-transmediale-collective'&gt;https://cis-india.org/news/seminar-artist-talks-outresourcing-with-the-transmediale-collective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-12T07:06:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017">
    <title>Seminar on Understanding Financial Technology, Cashless India, and Forced Digitalisation (Delhi, January 24)</title>
    <link>https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017</link>
    <description>
        &lt;b&gt;The Centre for Financial Accountability is organising a seminar on "Understanding Financial Technology, Cashless India, and Forced Digitalisation" on Tuesday, January 24, at YWCA, Ashoka Road, New Delhi. Sumandro Chattapadhyay will participate in the seminar and speak on the emerging architecture of FinTech in India, as being developed and deployed by UIDAI and NPCI.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Cross-posted from &lt;a href="https://letstalkfinancialaccountability.wordpress.com/2017/01/20/understanding-financial-technology-cashless-india-forced-digitalisation/"&gt;Centre for Financial Accountability&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Programme Schedule&lt;/h2&gt;
&lt;h4&gt;09.30 - Registration&lt;/h4&gt;
&lt;h4&gt;10:00 - Introduction to the Seminar &amp;amp; Setting the Context&lt;/h4&gt;
&lt;p&gt;Madhuresh Kumar, National Alliance of People’s Movements&lt;/p&gt;
&lt;h4&gt;10:15–11:30 - Session 1 - Understanding the Political Context of FinTech&lt;/h4&gt;
&lt;p&gt;B P Mathur, Former Dy CAG&lt;/p&gt;
&lt;p&gt;Prabir Purkayastha, Free Software Movement of India and Knowledge Commons&lt;/p&gt;
&lt;p&gt;C P Chandrasekhar, Centre for Economic Studies and Planning, JNU&lt;/p&gt;
&lt;h4&gt;11:30-11:45 – Tea / Coffee break&lt;/h4&gt;
&lt;h4&gt;11:45-13:15 - Session 2 - How will FinTech Impact the Poor, and Labour and Banking Sector?&lt;/h4&gt;
&lt;p&gt;Ashim Roy, New Trade Union of India&lt;/p&gt;
&lt;p&gt;Nikhil Dey, Mazdoor Kisan Shakti Sangathan&lt;/p&gt;
&lt;p&gt;Ravinder Gupta, General Secretary, State Bank of India Officers Association&lt;/p&gt;
&lt;h4&gt;13:15-14:00 – Lunch&lt;/h4&gt;
&lt;h4&gt;14:00-15:30 - Session 3 - Understanding the Economic Context of FinTech&lt;/h4&gt;
&lt;p&gt;Indira Rajaraman, Former Director, RBI&lt;/p&gt;
&lt;p&gt;Tony Joseph, Sr. Journalist&lt;/p&gt;
&lt;h4&gt;15:30-17:00 - Session 4 - Understanding the Architecture of FinTech: Linkages to Aadhaar, IndiaStack etc&lt;/h4&gt;
&lt;p&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Gopal Krishna, ToxicsWatch&lt;/p&gt;
&lt;h4&gt;17:00 – Tea&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017'&gt;https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Unified Payments Interface</dc:subject>
    
    
        <dc:subject>Financial Technology</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Financial Inclusion</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    

   <dc:date>2017-01-23T13:17:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d">
    <title>Seminar on “Evolution of communication: Social Media &amp; Beyond”</title>
    <link>https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d</link>
    <description>
        &lt;b&gt;Sunil Abraham will be a speaker at this event organized by TRAI on March 15 at Hotel Radisson Blu GRT, Near Airport, Chennai. Sunil will be speaking on How should Internet Giants- Social Media, Search engines and ad tech be Regulated.&lt;/b&gt;
        &lt;p&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/seminar-on-evolution-of-communication"&gt;view the agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d'&gt;https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-03-07T14:52:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/nalsar-seminar-hate-speech-social-media">
    <title>Seminar on "Hate Speech and Social Media"</title>
    <link>https://cis-india.org/news/nalsar-seminar-hate-speech-social-media</link>
    <description>
        &lt;b&gt;NALSAR University of Law, in collaboration with the British Deputy High Commission  organized a seminar on Hate Speech and Social Media in Hyderabad on January 4 and 5, 2014. Chinmayi Arun was one of the speakers at the seminar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Richa Kaul Padte was a keynote speaker on the panel on ‘Marginalised Communities and the Experience of Social Media’, while Anja Kovacs was the keynote speaker on the panel on ‘Internet - A Democratic Space?’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This seminar focused on emerging debates on free speech, marginalisation and radicalisation in the context of the internet. Long hailed as a great democratiser, the internet has been instrumental in granting a voice to millions of people, and yet, in permitting anonymity it raises important questions of liability and responsibility. Over the course of two days, the seminar explored issues through conversations between people who have worked on various aspects of this issue, including leading jurists, lawyers, bloggers and activists who have embraced new technologies. Some of the prominent speakers at the seminar included Hon’ble Justice Madan B Lokur, Hon’ble Dr. Justice S Muralidhar, Teesta Setalvad, Geeta Seshu, Chinmayi Arun, Anja Kovacs and Apar Gupta.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to read the details posted on &lt;a class="external-link" href="http://internetdemocracy.in/events/seminar-on-hate-speech-and-social-media/"&gt;Internet Democracy Project website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/nalsar-seminar-hate-speech-social-media'&gt;https://cis-india.org/news/nalsar-seminar-hate-speech-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-13T06:22:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/self-regulation">
    <title>Self-regulation in media and society meet to gain legal perspectives</title>
    <link>https://cis-india.org/news/self-regulation</link>
    <description>
        &lt;b&gt;With electronic media generally expressing its opposition to government imposed regulations, a two-day workshop is being organised here from tomorrow on 'Comparative Perspectives on Media Self-Regulation and Society'.&lt;/b&gt;
        
&lt;p&gt;The workshop will explore international and comparative perspectives on media regulation as it affects current and the future role of information in society, Star India said in a statement.&lt;/p&gt;
&lt;p&gt;The workshop will explore contemporary issues around media self-regulation in India from the differing perspectives of academics, bureaucrats and politicians, industry leaders, civil society and legal experts. In light of the current controversies in the media, including growing demands for content regulation on India's entertainment channels, as well as debates over media ethics, this will be a highly relevant and contemporary workshop.&lt;/p&gt;
&lt;p&gt;The University of Oxford's Programme in Comparative Media Law and Policy (PCMLP) in collaboration with the National Law University- New Delhi, the National University of Juridical Sciences- Kolkata, and the Annenberg School for Communication, University of Pennsylvania, with support from Star India .&lt;/p&gt;
&lt;p&gt;Information and Broadcasting Minister Ambika Soni, Ministry Joint Secretary Arvind Kumar, and National Commission for Women member Secretary Zohra Chatterjee will be speaking at the workshop.&lt;/p&gt;
&lt;p&gt;Among other expected speakers are ex-chief justice of India JS Verma who had drawn up a code for the electronic media on behalf of the News Broadcasters Association, academician Professor Satish Deshpande, former Central Board of Film Certification chairperson Anupam Kher, Centre for Internet and Society's Sunil Abraham, senior columnist Sevanti Ninan, BAG Films and Media CMD and President of the Association of Radio Operators of India (AROI) Anurradha Prasad, senior advocates Prashant Bhushanand Siddharth Luthra, TV Today Executive Director and CEO and IBF Vice President G Krishnan and NDTV CEO KVL Narayan Rao.&lt;/p&gt;
&lt;p&gt;Leading international researchers and experts in media regulation, Professor Monroe E Price from the University of Pennsylvania, Jonathan Blake of Covington and Burling, and Professor Wolfgang Shulz from the Hans Bredow Institute will be a part of this Seminar.&lt;/p&gt;
&lt;p&gt;Star India will be represented by COO Sanjay Gupta, EVP and General Counsel Deepak Jacob and EVP (Marketing and Communications) Anupam Vasudev.&lt;/p&gt;
&lt;p&gt;The workshop is aimed at bringing together diverse views of academics, bureaucrats, policy makers, industry leaders, civil society and legal experts.&lt;/p&gt;
&lt;p&gt;"In light of the current controversies in the media fraternity around the world, this workshop will deal with increased demands for content regulation on entertainment channels in India, as well as current debates on media ethics," the Star India release said.&lt;/p&gt;
&lt;p&gt;Read the original news &lt;a class="external-link" href="http://www.indiantelevision.com/headlines/y2k10/dec/dec105.php"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/self-regulation'&gt;https://cis-india.org/news/self-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:22:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology">
    <title>Security: Privacy, Transparency and Technology</title>
    <link>https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has been involved in privacy and data protection research for the last five years. It has participated as a member of the Justice A.P. Shah Committee, which has influenced the draft Privacy Bill being authored by the Department of Personnel and Training. It has organised 11 multistakeholder roundtables across India over the last two years to discuss a shadow Privacy Bill drafted by CIS with the participation of privacy commissioners and data protection authorities from Europe and Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was co-authored by Sunil Abraham, Elonnai Hickok and Tarun Krishnakumar. It was published by Observer Research Foundation, &lt;a href="https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf" class="internal-link"&gt;Digital Debates 2015: CyFy Journal Volume 2&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Our centre’s work on privacy was considered incomplete by some stakeholders because of a lack of focus in the area of cyber security and therefore we have initiated research on it from this year onwards. In this article, we have undertaken a preliminary examination of the theoretical relationships between the national security imperative and privacy, transparency and technology.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Privacy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Daniel J. Solove has identified the tension between security and privacy as a false dichotomy: "Security and privacy often clash, but there need not be a zero-sum tradeoff." &lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; Further unpacking this false dichotomy, Bruce Schneier says, "There is no security without privacy. And liberty requires both security and privacy." &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; Effectively, it could be said that privacy is a precondition for security, just as security is a precondition for privacy. A secure information system cannot be designed without guaranteeing the privacy of its authentication factors, and it is not possible to guarantee privacy of authentication factors without having confidence in the security of the system. Often policymakers talk about a balance between the privacy and security imperatives—in other words a zero-sum game. Balancing these imperatives is a foolhardy approach, as it simultaneously undermines both imperatives. Balancing privacy and security should instead be framed as an optimisation problem. Indeed, during a time when oversight mechanisms have failed even in so-called democratic states, the regulatory power of technology &lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; should be seen as an increasingly key ingredient to the solution of that optimisation problem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data retention is required in most jurisdictions for law enforcement, intelligence and military purposes. Here are three examples of how security and privacy can be optimised when it comes to Internet Service Provider (ISP) or telecom operator logs:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Data Retention&lt;/strong&gt;: We propose that the office of the Privacy Commissioner generate a cryptographic key pair for each internet user and give one key to the ISP / telecom operator. This key would be used to encrypt logs, thereby preventing unauthorised access. Once there is executive or judicial authorisation, the Privacy Commissioner could hand over the second key to the authorised agency. There could even be an emergency procedure and the keys could be automatically collected by concerned agencies from the Privacy Commissioner. This will need to be accompanied by a policy that criminalises the possession of unencrypted logs by ISP and telecom operators.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Privacy-Protective Surveillance&lt;/strong&gt;: Ann Cavoukian and Khaled El Emam &lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; have proposed combining intelligent agents, homomorphic encryption and probabilistic graphical models to provide “a positive-sum, ‘win–win’ alternative to current counter-terrorism surveillance systems.” They propose limiting collection of data to “significant” transactions or events that could be associated with terrorist-related activities, limiting analysis to wholly encrypted data, which then does not just result in “discovering more patterns and relationships without an understanding of their context” but rather “intelligent information—information selectively gathered and placed into an appropriate context to produce actual knowledge.” Since fully homomorphic encryption may be unfeasible in real-world systems, they have proposed use of partially homomorphic encryption. But experts such as Prof. John Mallery from MIT are also working on solutions based on fully homomorphic encryption.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Fishing Expedition Design&lt;/strong&gt;: Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal have proposed a standard &lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; that could be adopted by authorised agencies, telecom operators and ISPs. Instead of giving authorised agencies complete access to logs, they propose a format for database queries, which could be sent to the telecom operator or ISP by authorised agencies. The telecom operator or ISP would then process the query, and anonymise/obfuscate the result-set in an automated fashion based on applicable privacypolicies/regulation. Authorised agencies would then hone in on a subset of the result-set that they would like with personal identifiers intact; this smaller result set would then be shared with the authorised agencies.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;An optimisation approach to resolving the false dichotomy between privacy and security will not allow for a total surveillance regime as pursued by the US administration. Total surveillance brings with it the ‘honey pot’ problem: If all the meta-data and payload data of citizens is being harvested and stored, then the data store will become a single point of failure and will become another target for attack. The next Snowden may not have honourable intentions and might decamp with this ‘honey pot’ itself, which would have disastrous consequences.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If total surveillance will completely undermine the national security imperative, what then should be the optimal level of surveillance in a population? The answer depends upon the existing security situation. If this is represented on a graph with security on the y-axis and the proportion of the population under surveillance on the x-axis, the benefits of surveillance could be represented by an inverted hockey-stick curve. To begin with, there would already be some degree of security. As a small subset of the population is brought under surveillance, security would increase till an optimum level is reached, after which, enhancing the number of people under surveillance would not result in any security pay-off. Instead, unnecessary surveillance would diminish security as it would introduce all sorts of new vulnerabilities. Depending on the existing security situation, the head of the hockey-stick curve might be bigger or smaller. To use a gastronomic analogy, optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India the designers of surveillance projects have fortunately rejected the total surveillance paradigm. For example, the objective of the National Intelligence Grid (NATGRID) is to streamline and automate targeted surveillance; it is introducing technological safeguards that will allow express combinations of result-sets from 22 databases to be made available to 12 authorised agencies. This is not to say that the design of the NATGRID cannot be improved.&lt;/p&gt;
&lt;h3&gt;Security and Transparency&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;There are two views on security and transparency: One, security via obscurity as advocated by vendors of proprietary software, and two, security via transparency as advocated by free/open source software (FOSS) advocates and entrepreneurs. Over the last two decades, public and industry opinion has swung towards security via transparency. This is based on the Linus rule that “given enough eyeballs, all bugs are shallow.” But does this mean that transparency is a necessary and sufficient condition? Unfortunately not, and therefore it is not necessarily true that FOSS and open standards will be more secure than proprietary software and proprietary standards.&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;The recent detection of the Heartbleed &lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; security bug in Open SSL, &lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt; causing situations where more data can be read than should be allowed, and Snowden’s revelations about the compromise of some open cryptographic standards (which depend on elliptic curves), developed by the US National Institute of Standards and Technology, are stark examples. &lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At the same time, however, open standards and FOSS are crucial to maintaining the balance of power in information societies, as civil society and the general public are able to resist the powers of authoritarian governments and rogue corporations using cryptographic technology. These technologies allow for anonymous speech, pseudonymous speech, private communication, online anonymity and circumvention of surveillance and censorship. For the media, these technologies enable anonymity of sources and the protection of whistle-blowers—all phenomena that are critical to the functioning of a robust and open democratic society. But these very same technologies are also required by states and by the private sector for a variety of purposes—national security, e-commerce, e-banking, protection of all forms of intellectual property, and services that depend on confidentiality, such as legal or medical services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In order words, all governments, with the exception of the US government, have common cause with civil society, media and the general public when it comes to increasing the security of open standards and FOSS. Unfortunately, this can be quite an expensive task because the re-securing of open cryptographic standards depends on mathematicians. Of late, mathematical research outputs that can be militarised are no longer available in the public domain because the biggest employers of mathematicians worldwide today are the US military and intelligence agencies. If other governments invest a few billion dollars through mechanisms like Knowledge Ecology International’s proposed World Trade Organization agreement on the supply of knowledge as a public good, we would be able to internationalise participation in standard-setting organisations and provide market incentives for greater scrutiny of cryptographic standards and patching of vulnerabilities of FOSS. This would go a long way in addressing the trust deficit that exists on the internet today.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A techno-utopian understanding of security assumes that more technology, more recent technology and more complex technology will necessarily lead to better security outcomes.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is because the security discourse is dominated by vendors with sales targets who do not present a balanced or accurate picture of the technologies that they are selling. This has resulted in state agencies and the general public having an exaggerated understanding of the capabilities of surveillance technologies that is more aligned with Hollywood movies than everyday reality.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;More Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Increasing the number of x-ray machines or full-body scanners at airports by a factor of ten or hundred will make the airport less secure unless human oversight is similarly increased. Even with increased human oversight, all that has been accomplished is an increase in the potential locations that can be compromised. The process of hardening a server usually involves stopping non-essential services and removing non-essential software. This reduces the software that should be subject to audit, continuously monitored for vulnerabilities and patched as soon as possible. Audits, ongoing monitoring and patching all cost time and money and therefore, for governments with limited budgets, any additional unnecessary technology should be seen as a drain on the security budget. Like with the airport example, even when it comes to a single server on the internet, it is clear that, from a security perspective, more technology without a proper functionality and security justification is counter-productive. To reiterate, throwing increasingly more technology at a problem does not make things more secure; rather, it results in a proliferation of vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Latest Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Reports that a number of state security agencies are contemplating returning to typewriters for sensitive communications in the wake of Snowden’s revelations makes it clear that some older technologies are harder to compromise in comparison to modern technology. &lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; Between iris- and fingerprint-based biometric authentication, logically, it would be easier for a criminal to harvest images of irises or authentication factors in bulk fashion using a high resolution camera fitted with a zoom lens in a public location, in comparison to mass lifting of fingerprints.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Complex Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Fifteen years ago, Bruce Schneier said, "The worst enemy of security is complexity. This has been true since the beginning of computers, and it’s likely to be true for the foreseeable future." &lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt; This is because complexity increases fragility; every feature is also a potential source of vulnerabilities and failures. The simpler Indian electronic machines used until the 2014 elections are far more secure than the Diebold voting machines used in the 2004 US presidential elections. Similarly when it comes to authentication, a pin number is harder to beat without user-conscious cooperation in comparison to iris- or fingerprint-based biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the following section of the paper we have identified five threat scenarios &lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt; relevant to India and identified solutions based on our theoretical framing above.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Threat Scenarios and Possible Solutions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Hacking the NIC Certifying Authority&lt;/strong&gt;&lt;br /&gt;One of the critical functions served by the National Informatics Centre (NIC) is as a Certifying Authority (CA). &lt;a name="fr12" href="#fn12"&gt;[12]&lt;/a&gt; In this capacity, the NIC issues digital certificates that authenticate web services and allow for the secure exchange of information online. &lt;a name="fr13" href="#fn13"&gt;[13]&lt;/a&gt; Operating systems and browsers maintain lists of trusted CA root certificates as a means of easily verifying authentic certificates. India’s Controller of Certifying Authority’s certificates issued are included in the Microsoft Root list and recognised by the majority of programmes running on Windows, including Internet Explorer and Chrome. &lt;a name="fr14" href="#fn14"&gt;[14]&lt;/a&gt; In 2014, the NIC CA’s infrastructure was compromised, and digital certificates were issued in NIC’s name without its knowledge. &lt;a name="fr15" href="#fn15"&gt;[15]&lt;/a&gt; Reports indicate that NIC did not "have an appropriate monitoring and tracking system in place to detect such intrusions immediately." &lt;a name="fr16" href="#fn16"&gt;[16]&lt;/a&gt; The implication is that websites could masquerade as another domain using the fake certificates. Personal data of users can be intercepted or accessed by third parties by the masquerading website. The breach also rendered web servers and websites of government bodies vulnerable to attack, and end users were no longer sure that data on these websites was accurate and had not been tampered with. &lt;a name="fr17" href="#fn17"&gt;[17]&lt;/a&gt; The NIC CA was forced to revoke all 250,000 SSL Server Certificates issued until that date &lt;a name="fr18" href="#fn18"&gt;[18]&lt;/a&gt; and is no longer issuing digital certificates for the time being. &lt;a name="fr19" href="#fn19"&gt;[19]&lt;/a&gt;Public key pinning is a means through which websites can specify which certifying authorities have issued certificates for that site. Public key pinning can prevent man-in-the-middle attacks due to fake digital certificates. &lt;a name="fr20" href="#fn20"&gt;[20]&lt;/a&gt; Certificate Transparency allows anyone to check whether a certificate has been properly issued, seeing as certifying authorities must publicly publish information about the digital certificates that they have issued. Though this approach does not prevent fake digital certificates from being issued, it can allow for quick detection of misuse. &lt;a name="fr21" href="#fn21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;‘Logic Bomb’ against Airports&lt;/strong&gt;&lt;br /&gt;Passenger operations in New Delhi’s Indira Gandhi International Airport depend on a centralised operating system known as the Common User Passenger Processing System (CUPPS). The system integrates numerous critical functions such as the arrival and departure times of flights, and manages the reservation system and check-in schedules. &lt;a name="fr22" href="#fn22"&gt;[22]&lt;/a&gt; In 2011, a logic bomb attack was remotely launched against the system to introduce malicious code into the CUPPS software. The attack disabled the CUPPS operating system, forcing a number of check-in counters to shut down completely, while others reverted to manual check-in, resulting in over 50 delayed flights. Investigations revealed that the attack was launched by three disgruntled employees who had assisted in the installation of the CUPPS system at the New Delhi Airport. &lt;a name="fr23" href="#fn23"&gt;[23]&lt;/a&gt; Although in this case the impact of the attack was limited to flight delay, experts speculate that the attack was meant to take down the entire system. The disruption and damage resulting from the shutdown of an entire airport would be extensive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Adoption of open hardware and FOSS is one strategy to avoid and mitigate the risk of such vulnerabilities. The use of devices that embrace the concept of open hardware and software specifications must be encouraged, as this helps the FOSS community to be vigilant in detecting and reporting design deviations and investigate into probable vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Attack on Critical Infrastructure&lt;/strong&gt;&lt;br /&gt;The Nuclear Power Corporation of India encounters and prevents numerous cyber attacks every day. &lt;a name="fr24" href="#fn24"&gt;[24]&lt;/a&gt; The best known example of a successful nuclear plant hack is the Stuxnet worm that thwarted the operation of an Iranian nuclear enrichment complex and set back the country’s nuclear programme. &lt;a name="fr25" href="#fn25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The worm had the ability to spread over the network and would activate when a specific configuration of systems was encountered &lt;a name="fr26" href="#fn26"&gt;[26]&lt;/a&gt; and connected to one or more Siemens programmable logic controllers. &lt;a name="fr27" href="#fn27"&gt;[27]&lt;/a&gt; The worm was suspected to have been initially introduced through an infected USB drive into one of the controller computers by an insider, thus crossing the air gap. &lt;a name="fr28" href="#fn28"&gt;[28]&lt;/a&gt; The worm used information that it gathered to take control of normal industrial processes (to discreetly speed up centrifuges, in the present case), leaving the operators of the plant unaware that they were being attacked. This incident demonstrates how an attack vector introduced into the general internet can be used to target specific system configurations. When the target of a successful attack is a sector as critical and secured as a nuclear complex, the implications for a country’s security and infrastructure are potentially grave.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Security audits and other transparency measures to identify vulnerabilities are critical in sensitive sectors. Incentive schemes such as prizes, contracts and grants may be evolved for the private sector and academia to identify vulnerabilities in the infrastructure of critical resources to enable/promote security auditing of infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Micro Level: Chip Attacks&lt;/strong&gt;&lt;br /&gt;Semiconductor devices are ubiquitous in electronic devices. The US, Japan, Taiwan, Singapore, Korea and China are the primary countries hosting manufacturing hubs of these devices. India currently does not produce semiconductors, and depends on imported chips. This dependence on foreign semiconductor technology can result in the import and use of compromised or fraudulent chips by critical sectors in India. For example, hardware Trojans, which may be used to access personal information and content on a device, may be inserted into the chip. Such breaches/transgressions can render equipment in critical sectors vulnerable to attack and threaten national security. &lt;a name="fr29" href="#fn29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Indigenous production of critical technologies and the development of manpower and infrastructure to support these activities are needed. The Government of India has taken a number of steps towards this. For example, in 2013, the Government of India approved the building of two Semiconductor Wafer Fabrication (FAB) manufacturing facilities &lt;a name="fr30" href="#fn30"&gt;[30]&lt;/a&gt; and as of January 2014, India was seeking to establish its first semiconductor characterisation lab in Bangalore. &lt;a name="fr31" href="#fn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Macro Level: Telecom and Network Switches&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The possibility of foreign equipment containing vulnerabilities and backdoors that are built into its software and hardware gives rise to concerns that India’s telecom and network infrastructure is vulnerable to being hacked and accessed by foreign governments (or non-state actors) through the use of spyware and malware that exploit such vulnerabilities. In 2013, some firms, including ZTE and Huawei, were barred by the Indian government from participating in a bid to supply technology for the development of its National Optic Network project due to security concerns. &lt;a name="fr32" href="#fn32"&gt;[32]&lt;/a&gt; Similar concerns have resulted in the Indian government holding back the conferment of ‘domestic manufacturer’ status on both these firms. &lt;a name="fr33" href="#fn33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Following reports that Chinese firms were responsible for transnational cyber attacks designed to steal confidential data from overseas targets, there have been moves to establish laboratories to test imported telecom equipment in India. &lt;a name="fr34" href="#fn34"&gt;[34]&lt;/a&gt; Despite these steps, in a February 2014 incident the state-owned telecommunication company  Bharat Sanchar Nigam Ltd’s network was hacked, allegedly by Huawei. &lt;a name="fr35" href="#fn35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Security practitioners and policymakers need to avoid the zero-sum framing prevalent in popular discourse regarding security VIS-A-VIS privacy, transparency and technology.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;A successful hack of the telecom infrastructure could result in massive disruption in internet and telecommunications services. Large-scale surveillance and espionage by foreign actors would also become possible, placing, among others, both governmental secrets and individuals personal information at risk.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While India cannot afford to impose a general ban on the import of foreign telecommunications equipment, a number of steps can be taken to address the risk of inbuilt security vulnerabilities. Common International Criteria for security audits could be evolved by states to ensure compliance of products with international norms and practices. While India has already established common criteria evaluation centres, &lt;a name="fr36" href="#fn36"&gt;[36]&lt;/a&gt; the government monopoly over the testing function has resulted in only three products being tested so far. A Code Escrow Regime could be set up where manufacturers would be asked to deposit source code with the Government of India for security audits and verification. The source code could be compared with the shipped software to detect inbuilt vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyber security cannot be enhanced without a proper understanding of the relationship between security and other national imperatives such as privacy, transparency and technology. This paper has provided an initial sketch of those relationships, but sustained theoretical and empirical research is required in India so that security practitioners and policymakers avoid the zero-sum framing prevalent in popular discourse and take on the hard task of solving the optimisation problem by shifting policy, market and technological levers simultaneously. These solutions must then be applied in multiple contexts or scenarios to determine how they should be customised to provide maximum security bang for the buck.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. Daniel J. Solove, Chapter 1 in Nothing to Hide: The False Tradeoff between Privacy and Security (Yale University Press: 2011), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1827982.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. Bruce Schneier, “What our Top Spy doesn’t get: Security and Privacy aren’t Opposites,” Wired, January 24, 2008, http://archive.wired.com/politics/security commentary/security matters/2008/01/securitymatters_0124 and Bruce Schneier, “Security vs. Privacy,” Schneier on Security, January 29, 2008, https://www.schneier.com/blog/archives/2008/01/security_vs_pri.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. There are four sources of power in internet governance: Market power exerted by private sector organisations; regulatory power exerted by states; technical power exerted by anyone who has access to certain categories of technology, such as cryptography; and finally, the power of public pressure sporadically mobilised by civil society. A technically sound encryption standard, if employed by an ordinary citizen, cannot be compromised using the power of the market or the regulatory power of states or public pressure by civil society. In that sense, technology can be used to regulate state and market behaviour.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. Ann Cavoukian and Khaled El Emam, “Introducing Privacy-Protective Surveillance: Achieving Privacy and Effective Counter-Terrorism,” Information &amp;amp; Privacy Commisioner, September 2013, Ontario, Canada, http://www.privacybydesign.ca/content/uploads/2013/12/pps.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal, “Information Integration and Analysis: A Semantic Approach to Privacy”(presented at the third IEEE International Conference on Information Privacy, Security, Risk and Trust, Boston, USA, October 2011), ebiquity.umbc.edu/_file_directory_/papers/578.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. Bruce Byfield, “Does Heartbleed disprove ‘Open Source is Safer’?,” Datamation, April 14, 2014, http://www.datamation.com/open-source/does-heartbleed-disprove-open-source-is-safer-1.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. “Cybersecurity Program should be more transparent, protect privacy,” Centre for Democracy and Technology Insights, March 20, 2009, https://cdt.org/insight/cybersecurity-program-should-be-more-transparent-protect-privacy/#1.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. “Cracked Credibility,” The Economist, September 14, 2013, http://www.economist.com/news/international/21586296-be-safe-internet-needs-reliable-encryption-standards-software-and.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. Miriam Elder, “Russian guard service reverts to typewriters after NSA leaks,” The Guardian, July 11, 2013, www.theguardian.com/world/2013/jul/11/russia-reverts-paper-nsa-leaks and Philip Oltermann, “Germany ‘may revert to typewriters’ to counter hi-tech espionage,” The Guardian, July 15, 2014, www.theguardian.com/world/2014/jul/15/germany-typewriters-espionage-nsa-spying-surveillance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. Bruce Schneier, “A Plea for Simplicity,” Schneier on Security, November 19, 1999, https://www.schneier.com/essays/archives/1999/11/a_plea_for_simplicit.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. With inputs from Pranesh Prakash of the Centre for Internet and Society and Sharathchandra Ramakrishnan of Srishti School of Art, Technology and Design.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn12" href="#fr12"&gt;12&lt;/a&gt;]. “Frequently Asked Questions,” Controller of Certifying Authorities, Department of Electronics and Information Technology, Government of India, http://cca.gov.in/cca/index.php?q=faq-page#n41.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn13" href="#fr13"&gt;13&lt;/a&gt;]. National Informatics Centre Homepage, Government of India, http://www.nic.in/node/41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn14" href="#fr14"&gt;14&lt;/a&gt;]. Adam Langley, “Maintaining Digital Certificate Security,” Google Security Blog, July 8, 2014, http://googleonlinesecurity.blogspot.in/2014/07/maintaining-digital-certificate-security.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn15" href="#fr15"&gt;15&lt;/a&gt;]. This is similar to the kind of attack carried out against DigiNotar, a Dutch certificate authority. See: http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1246&amp;amp;context=jss.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn16" href="#fr16"&gt;16&lt;/a&gt;]. R. Ramachandran, “Digital Disaster,” Frontline, August 22, 2014, http://www.frontline.in/the-nation/digital-disaster/article6275366.ece.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn17" href="#fr17"&gt;17&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn18" href="#fr18"&gt;18&lt;/a&gt;]. “NIC’s digital certification unit hacked,” Deccan Herald, July 16, 2014, http://www.deccanherald.com/content/420148/archives.php.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn19" href="#fr19"&gt;19&lt;/a&gt;]. National Informatics Centre Certifying Authority Homepage, Government of India, http://nicca.nic.in//.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn20" href="#fr20"&gt;20&lt;/a&gt;]. Mozilla Wiki, “Public Key Pinning,” https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn21" href="#fr21"&gt;21&lt;/a&gt;]. “Certificate Transparency - The quick detection of fraudulent digital certificates,” Ascertia, August 11, 2014, http://www.ascertiaIndira.com/blogs/pki/2014/08/11/certificate-transparency-the-quick-detection-of-fraudulent-digital-certificates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn22" href="#fr22"&gt;22&lt;/a&gt;]. “Indira Gandhi International Airport (DEL/VIDP) Terminal 3, India,” Airport Technology.com, http://www.airport-technology.com/projects/indira-gandhi-international-airport-terminal -3/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn23" href="#fr23"&gt;23&lt;/a&gt;]. “How techies used logic bomb to cripple Delhi Airport,” Rediff, November 21, 2011, http://www.rediff.com/news/report/how-techies-used-logic-bomb-to-cripple-delhi-airport/20111121 htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn24" href="#fr24"&gt;24&lt;/a&gt;]. Manu Kaushik and Pierre Mario Fitter, “Beware of the bugs,” Business Today, February 17, 2013, http://businesstoday.intoday.in/story/india-cyber-security-at-risk/1/191786.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn25" href="#fr25"&gt;25&lt;/a&gt;]. “Stuxnet ‘hit’ Iran nuclear plants,” BBC, November 22, 2010, http://www.bbc.com/news/technology-11809827.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn26" href="#fr26"&gt;26&lt;/a&gt;]. In this case, systems using Microsoft Windows and running Siemens Step7 software were targeted.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn27" href="#fr27"&gt;27&lt;/a&gt;]. Jonathan Fildes, “Stuxnet worm ‘targeted high-value Iranian assets’,” BBC, September 23, 2010, http://www.bbc.com/news/technology-11388018.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn28" href="#fr28"&gt;28&lt;/a&gt;]. Farhad Manjoo, “Don’t Stick it in: The dangers of USB drives,” Slate, October 5, 2010, http://www.slate.com/articles/technology/technology/2010/10/dont_stick_it_in.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn29" href="#fr29"&gt;29&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn30" href="#fr30"&gt;30&lt;/a&gt;]. “IBM invests in new $5bn chip fab in India, so is chip sale off?,” ElectronicsWeekly, February 14, 2014, http://www.electronicsweekly.com/news/business/ibm-invests-new-5bn-chip-fab-india-chip-sale-2014-02/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn31" href="#fr31"&gt;31&lt;/a&gt;]. NT Balanarayan, “Cabinet Approves Creation of Two Semiconductor Fabrication Units,” Medianama, February 17, 2014, http://articles.economictimes.indiatimes.com/2014-02-04/news/47004737_1_indian-electronics-special-incentive-package-scheme-semiconductor-association.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn32" href="#fr32"&gt;32&lt;/a&gt;]. Jamie Yap, “India bars foreign vendors from national broadband initiative,” ZD Net, January 21, 2013, http://www.zdnet.com/in/india-bars-foreign-vendors-from-national-broadband-initiative-7000010055/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn33" href="#fr33"&gt;33&lt;/a&gt;]. Kevin Kwang, “India holds back domestic-maker status for Huawei, ZTE,” ZD Net, February 6, 2013, http://www.zdnet.com/in/india-holds-back-domestic-maker-status-for-huawei-zte-70 00010887/. Also see “Huawei, ZTE await domestic-maker tag,” The Hindu, February 5, 2013, http://www.thehindu.com/business/companies/huawei-zte-await-domesticmaker-tag/article4382888.ece.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn34" href="#fr34"&gt;34&lt;/a&gt;]. Ellyne Phneah, “Huawei, ZTE under probe by Indian government,” ZD Net, May 10, 2013, http://www.zdnet.com/in/huawei-zte-under-probe-by-indian-government-7000015185/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn35" href="#fr35"&gt;35&lt;/a&gt;]. Devidutta Tripathy, “India investigates report of Huawei hacking state carrier network,” Reuters, February 6, 2014, http://www.reuters.com/article/2014/02/06/us-india-huawei-hacking-idUSBREA150QK20140206.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn36" href="#fr36"&gt;36&lt;/a&gt;]. “Products Certified,” Common Criteria Portal of India, http://www.commoncriteria-india.gov.in/Pages/ProductsCertified.aspx.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology'&gt;https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-09-15T10:53:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy">
    <title>Security, Governments, and Data: Technology and Policy</title>
    <link>https://cis-india.org/internet-governance/events/security-governments-data-technology-policy</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;About the Conference&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;&lt;strong&gt;Conference &lt;/strong&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;&lt;span&gt;Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with.  Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws &amp;amp; policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.&lt;/span&gt;&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;Panel Descriptions&lt;/h3&gt;
&lt;p align="left"&gt; &lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt;Challenges &amp;amp; Present Scenario&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities.  The Government of India has taken numerous steps to address and resolve such challenges.  In July 2013, the National Cyber Security Policy  was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52&lt;/span&gt;&lt;sup&gt;nd&lt;/sup&gt;&lt;span&gt; Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre.  CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Law &amp;amp; Policy&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things,  mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Architecture &amp;amp; Technology&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;International and Domestic Markets&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015.  Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised.  Towards this end, the Government of India  has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment.  Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the &lt;/span&gt;&lt;span&gt;Wassenaar agreement, they have yet to be accepted.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;/td&gt;
&lt;td&gt;Key Note Speech&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;/td&gt;
&lt;td&gt;Challenges &amp;amp; Present Scenario&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;/td&gt;
&lt;td&gt;Law &amp;amp; Policy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;/td&gt;
&lt;td&gt;Architecture &amp;amp; Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;/td&gt;
&lt;td&gt;International &amp;amp; Domestic Markets&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.30&lt;/td&gt;
&lt;td&gt;Conclusion &amp;amp; Closing Remarks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-governments-data-technology-policy'&gt;https://cis-india.org/internet-governance/events/security-governments-data-technology-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-24T08:06:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy">
    <title>Security, Governments and Data: Technology and Policy </title>
    <link>https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy</link>
    <description>
        &lt;b&gt;On January 8, 2015, the Centre for Internet and Society, in collaboration with the Observer research foundation, hosted the day long conference "Security, Governments, and Data: Technology and Policy"  The conference discussed a range of topics including internet governance, surveillance, privacy, and cyber security. &lt;/b&gt;
        &lt;p&gt;The full report written and compiled by Lovisha Aggarwal and Nehaa Chaudhari and edited by Elonnai Hickok &lt;a href="https://cis-india.org/internet-governance/blog/security-governments-data-technology-policy.pdf" class="internal-link"&gt;can be accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The conference was focused on the technologies, policies, and practices around cyber security and surveillance. The conference reached out to a number of key stakeholders including civil society, industry, law enforcement, government, and academia and explored the present scenario in India to reflect on ways forward. The conference was a part of CIS’s work around privacy and surveillance, supported by Privacy International.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Welcome Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The welcome address opened with a reference to a document circulated by CIS in 2014 which contained hypothetical scenarios of potential threats to Indian cyber security. This document highlighted the complexity of cyber security and the challenges that governments face in defending their digital borders. When talking about cyber security it is important that certain principles are upheld and security is not pursued only for the sake of security. This approach allows for security to be designed and to support other rights such as the right of access, the right to freedom of expression, and the right to privacy. Indeed, the generation, use, and protection of communications data by the private sector and the government are a predominant theme across the globe today. This cannot be truer for India, as India hosts the third largest population on the internet in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the welcome, a brief introduction to the Centre for Internet and Society was given. It was noted that CIS is a 6.5 half year old organization that is comprised of lawyers, mathematicians, sociologists, and computer scientists and works across multiple focus areas including accessibility, internet governance, telecom, openness, and access to knowledge. CIS began researching privacy and surveillance in 2010, and has recently begun to expand their research into cyber security. The purpose of this is to understand the relationship between privacy, surveillance, and security and is the beginning of a learning process for CIS. In 2013 CIS undertook a process to attempt to evolve a legal regime to intelligently and adequately deal with privacy in India. Industry specific requirements are key in the Indian context and this process was meant to try and evolve a consensus on what a privacy law in India should look like by bringing together key stakeholders for roundtables. CIS is now in the final stages of preparing individual legal proposals that will be sent to the Government – to hopefully have an informed Privacy Law in India. This event represents CIS’s first attempt to have a simultaneous dialogue on surveillance, cyber security, and privacy. As part of this event and research CIS is trying to understand the technology and market involved in surveillance and cyber security as these are important factors in the development of policy and law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy'&gt;https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-04T05:59:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
