<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 21 to 28.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-16-2013-nitin-pai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-7-jochem-de-groot"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis">
    <title>Exposing the Invisible - Tactical Tech films screening at CIS</title>
    <link>https://cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis</link>
    <description>
        &lt;b&gt;Exposing the Invisible is Tactical Tech's series of short films examining some inspiring and provocative investigative cases, those that go beyond traditional journalistic investigations. CIS is pleased to invite you to a special screening of two of the films on 9th December, 6pm, at the CIS venue. &lt;/b&gt;
        
&lt;p align="LEFT"&gt;&lt;strong&gt;&lt;em&gt;Exposing the Invisible&lt;/em&gt; &lt;/strong&gt;is Tactical Tech's series of short films examining some inspiring and provocative investigative cases, those that go beyond traditional journalistic investigations.&lt;/p&gt;
&lt;p align="LEFT"&gt;In the past decade, the work of investigators has undergone a significant transformation due to the rapid development of new technologies, the ubiquity of the Internet, and new possibilities in working with evidence, data and visualisation. The stories in the film illustrate this evolution as activists take advantage of this new wave of opportunities, while remaining aware of the dangers they expose themselves to.&amp;nbsp;&lt;/p&gt;
&lt;p align="LEFT"&gt;Episode one,&lt;strong&gt; Our Currency is Information&lt;/strong&gt;, introduces the work of a team of investigators led by Romanian reporter Paul Radu, investigating organised crime. The film takes you to the heart of Radu’s investigations, where the power of criminals, corporations and governments overlap in chilling cases.&amp;nbsp;&lt;/p&gt;
&lt;p align="LEFT"&gt;Episode two,&lt;strong&gt; From Our Point of View&lt;/strong&gt;, profiles three individuals from the UK, Lebanon and Israel, non-specialists who have taken it upon themselves to use information in innovative and varies ways to shed light on Syria's 'YouTube conflict', the theft of Lebanon's seashore, and house demolitions in East Jerusalem.&lt;/p&gt;
&lt;p align="LEFT"&gt;Episode three,&lt;strong&gt; Unseen War&lt;/strong&gt;, touches on the issues of US drone strikes in Pakistan.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p align="LEFT"&gt;More about the project here:&lt;/p&gt;
&lt;p align="LEFT"&gt;&lt;a href="https://exposingtheinvisible.org/"&gt;https://exposingtheinvisible.org/&lt;/a&gt;&lt;/p&gt;
&lt;p align="LEFT"&gt;CIS is very excited to participate in the week-long global films festival and will be organizing screenings of Episode one and Episode three on December 9, 2013.&amp;nbsp;The screening of the films will be followed by an interactive discussion on the cases shown in the film, how activism is transforming in India, and how it effects us.&amp;nbsp;&lt;/p&gt;
&lt;p align="LEFT"&gt;&amp;nbsp;We look forward to your participation in making this event a success!&lt;/p&gt;
&lt;p align="LEFT"&gt;&amp;nbsp;Venue: http://osm.org/go/yy4fIjrQL?m=&lt;/p&gt;
&lt;p align="LEFT"&gt;Tactical Tech Hompage:&amp;nbsp;&lt;a href="https://www.tacticaltech.org/"&gt;https://www.tacticaltech.org/&lt;/a&gt;&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis'&gt;https://cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-12-02T07:37:21Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay">
    <title>CIS Cybersecurity Series (Part 19) – Lobsang Sangay</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay</link>
    <description>
        &lt;b&gt;CIS interviews Lobsang Sangay, Prime Minister of the Central Tibetan Administration, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;“If there is already freedom of speech in a democratic country, then anonymous commentary could be misplaced in many instances. Because if the country is democratic, it has freedom of speech, and the laws protect you when you speak out. Then I think the citizens also have responsibilities. Democracy not only means freedom, but it also means duties. Your duty is to say who you are and criticize the government, or the employer, or the policy or whatever, in your name. So anonymity is misplaced in that sense, in most of the instances. Having said that, if a particular country or a government restricts freedom of speech, then you have no option but to be anonymous &amp;nbsp;because just by speaking out, you are committing a crime and hence you are liable. For example, in Tibet, even if you paste a poster on the wall, saying just two words ‘human right’, you will be arrested and you will go behind bars. Even if you just shout a slogan, you will be arrested and you will be in prison.”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its nineteenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Dr. Lobsang Sangay took office as Sikyong (Prime Minister) of the Central Tibetan Administration in Dharamsala, India, in 2011. He was born in a Tibetan refugee settlement in northern India. As a Fulbright scholar, he was the first Tibetan to receive a doctorate from the Harvard Law School in 2004. He worked as a senior fellow at Harvard University for a number of years during which he organized landmark conferences between the Dalai Lama and Chinese scholars. An expert on Tibet, international human rights law, democratic constitutionalism and conflict resolution, Dr Sangay has lectured at various universities and think-tanks throughout Europe, Asia and North America.&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/pdSohCND-9Q?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-31T05:40:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering">
    <title>CIS Cybersecurity Series (Part 21) – Gyanak Tsering</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering</link>
    <description>
        &lt;b&gt;CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;“I have three mobile phones but I use only one to exchange information to and from Tibet. I don't give that number to anyone and nobody knows about it. High security forces me to use three phones. Usually a mobile phone can be tracked easily in many ways, especially by the network provider but my third mobile phone is not registered so that makes sure that the Chinese government cannot track me. The Chinese have a record of all mobile phone numbers and they can block them at anytime. But my third number cannot be traced and that allows me to communicate freely. This is only for security reasons so that my people in Tibet don't get into trouble.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society presents its twenty-first installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gyanak Tsering is a Tibetan monk in exile, studying at Kirti Monastery, Dharamshala. He came to India in 1999, and has been using the internet and mobile phone technology, since 2008, to securely transfer information to and from Tibet. Tsering adds a new perspective to the cybersecurity debate and explains how his personal security is interlinked with internet security and mobile phone security.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/mqSw3cy7MEc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-06T05:08:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta">
    <title>CIS Cybersecurity Series (Part 9) - Saikat Datta</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta</link>
    <description>
        &lt;b&gt;CIS interviews Saikat Datta, Resident Editor of DNA, Delhi, as part of the Cybersecurity Series.
&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"Anonymous speech, in countries which have extremely severe systems of governments, which do not have freedom, etcetera, is welcome. But in a democracy like India, I do not see the need for anonymous speech because it is anyways guaranteed by the Constitution of India. So, no, I do not see the need for anonymity in an open and democratic state like India and I would be seriously worried if such a requirement comes up. Shouldn't I strive to be ideal? The ideal suggests that the constitution has guaranteed freedom of speech. Anonymity, for a time being may be acceptable to some people but I would like a situation where a person, without having to seek anonymity, can speak about anything and not be prosecuted by the state, or persecuted by society. And that is the ideal situation that I would like to strive for." - Saikat Datta, Resident Editor, DNA, Delhi.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its ninth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;Saikat Datta is a journalist who began his career in December 1996 and has worked with several publications like The Indian Express, the Outlook magazine and the DNA newspaper. He is currently the Resident Editor of DNA, Delhi. Saikat has authored a book on India's Special Forces and presented papers at seminars organized by the Centre for Land Warfare Studies, the Centre for Air Power Studies and the National Security Guards. He has also been awarded the International Press Institute Award for investigative journalism, the National RTI award in the journalism category and the Jagan Phadnis Memorial Award for investigative journalism.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/Fn2tqVU5mGg" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-05T05:24:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang">
    <title>CIS Cybersecurity Series (Part 10) - Lawrence Liang</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang</link>
    <description>
        &lt;b&gt;CIS interviews Lawrence Liang, researcher and lawyer, and co-founder of Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"The right to privacy and the right to free speech have often been understood as distinct rights. But I think in the ecology of online communication, it becomes crucial for us to look at the two as being inseparable. And this is not entirely new in India. But, interestingly, a lot of the cases that have had to deal with this question in the Indian context, have pitted one against the other. Now, India doesn't have a law for the protection of whistle-blowers. So how do we now think of the idea of whistle-blowers being one of the subjects of speech and privacy coming together? How do we use the strong pillars that have been established, in terms of a very rich tradition that Indian law has, on the recognition of free speech issues but slowly start incorporating questions of privacy?" - Lawrence Liang, researcher and lawyer, Alternative Law Forum.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its tenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;Lawrence Liang is one of the co-founders of the Alternative Law Forum where he works on issues of intellectual property, censorship, and the intersection of law and culture. He is also a fellow with the Centre for Internet and Society and serves on its board.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/odQajlxcLLA" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-09-10T08:31:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-16-2013-nitin-pai">
    <title>CIS Cybersecurity Series (Part 16) – Nitin Pai</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-16-2013-nitin-pai</link>
    <description>
        &lt;b&gt;CIS interviews Nitin Pai, policy analyst, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;“There is always a tension between the public interest and the individual's interest. Most republics function on this principle; they take a part of your freedom or liberty away in order to guarantee you the rest of your liberties and freedoms. So, I don’t think this inherent tension would be any different when it comes to cyberspace.”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its sixteenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Nitin Pai is Founder &amp;amp; Fellow for geopolitics at the Takshashila Institution, an independent networked think tank and editor of Pragati – The Indian National Interest Review, a publication on strategic affairs, public policy and governance. He is a graduate of Singapore’s Lee Kuan Yew School of Public Policy from where he obtained a Master in Public Administration degree. Nitin is an alumnus of Nanyang Technological University, Singapore and National College, Bangalore.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/P2Uxh2ye9Tg" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the cyber stewards network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-16-2013-nitin-pai'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-16-2013-nitin-pai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-07T13:18:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh">
    <title>CIS Cybersecurity Series (Part 24) – Shantanu Ghosh</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh</link>
    <description>
        &lt;b&gt;CIS interviews Shantanu Ghosh, Managing Director, Symantec Product Operations, India, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;“Remember
that India is also a land where there are a lot of people who are beginning to
use computing devices for the first time in their lives. For many people, their
smartphone is their first computing device because they have never had
computers in the past. For them, the challenge is how do you make sure that
they understand that that can be a threat too. It can be a threat not only to
their bank accounts, with their financial information, but even to their
private lives.”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twenty fourth
installment of the CIS Cybersecurity Series.”&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.&lt;/p&gt;
&lt;p&gt;Shantanu Ghosh is the Managing Director of Symantec
Product Operations, India. He also runs the Data Centre Security Group for
Symantec globally.&lt;/p&gt;
&lt;iframe src="https://www.youtube.com/embed/dFN2_R0HzbA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-07-15T14:58:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-7-jochem-de-groot">
    <title>CIS Cybersecurity Series (Part 7) - Jochem de Groot</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-7-jochem-de-groot</link>
    <description>
        &lt;b&gt;CIS interviews Jochem de Groot, former policy advisor to the Netherlands government, as part of the Cybersecurity Series&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"The basic principle that I think we must continue to embrace is that rights online are the same as rights offline... The amount of information that is available online is so enormous that it would be easy for governments to abuse that information for all kinds of purposes... And we are at a stage right now where we are really experimenting with how much information the govt or law enforcement can take to ensure the rule of law." - Jochem de Groot&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its seventh installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS interviews Jochem de Groot. Jochem has worked on the Netherlands government’s agenda to promote Internet freedom globally since 2009. He initiated and coordinated the founding conference of the Freedom Online Coalition in The Hague in December 2011, and advised the Kenyan government on the second Freedom Online event in Nairobi in 2012. Jochem represents the Dutch government in the EU, UN, OSCE and other multilateral fora, and oversees a project portfolio for promoting internet freedom globally.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/EU-PV2bmECg" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-7-jochem-de-groot'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-7-jochem-de-groot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-30T09:26:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
