<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 10 to 24.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/phandeeyar-event-what-is-open-data-movement-and-why-does-it-matter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/web-politics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/web-cultures-posts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/web-cultures"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/Members/tito_dutta.jpg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/telugu-wikipedia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/people/CIS_TM.jpeg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/sumandro-c-open-access-dialogues-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/Members/subodh_kulkarni.jpg"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/openness/blog-old/phandeeyar-event-what-is-open-data-movement-and-why-does-it-matter">
    <title>What is the Open Data Movement &amp; Why Does it Matter?</title>
    <link>https://cis-india.org/openness/blog-old/phandeeyar-event-what-is-open-data-movement-and-why-does-it-matter</link>
    <description>
        &lt;b&gt;I gave a talk at this event organized by Phandeeyar on May 13, 2015 in Yangon. About 25 delegates attended the event. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;My presentation focused on talking about the key qualities of open data, the process of opening up data, and its benefits. I mentioned various examples from across the world regarding usages of open data to describe and find patterns in how the various governmental processes function (elections, parliament, judiciary, and media outreach), and different topics related to flows of finance and resources (government budget and expenditure, international aids, financial information about corporates, allotment of oil concessions, and global investments in land). The discussion following the presentation focused on questions of how privacy concerns can be protected while opening up data, how protecting the (human) sources of published data is also important in sensitive situations (especially in the context of reporting incidents of hate speech and religious violence), how the capacity of grassroot organisations to collect, use, and share open data can be increased, and if open data can become a public resource during the upcoming national election later this year. At the end of the event, I was interviewed by a journalist of Myanmar Times on these topics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Phandeeyar_Sumandro_OpenData_13.05.20151.png" alt="Open Data Workshop" class="image-inline" title="Open Data Workshop" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/phandeeyar-event-what-is-open-data-movement-and-why-does-it-matter'&gt;https://cis-india.org/openness/blog-old/phandeeyar-event-what-is-open-data-movement-and-why-does-it-matter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2015-06-18T01:12:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/web-politics">
    <title>Web Politics</title>
    <link>https://cis-india.org/raw/web-politics</link>
    <description>
        &lt;b&gt;In the recent years, the Indian cyberspace has experienced a rising volume of political content, communication, and interactions. This cluster focuses on questions arising from the various forms that social, cultural, economic, and technological power takes in its online articulations, such as web-based political practices of social activists, policy advocates, change-makers, marginalised groups, and mainstream political parties in India. We are especially interested in the political expressions and activities of 'digital natives' and young users of the Internet; and the conceptualisations, articulations, and actualisations of 'change,' and the related emerging visions of political forms and social transformation, in the online discourse in India.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Projects&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt; (2009-2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/making-change"&gt;Making Change&lt;/a&gt; (2014)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Publications&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/dnbook"&gt;Digital Natives without a Cause?&lt;/a&gt;, a book series edited by Nishant Shah and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/position-papers"&gt;Digital Natives with a Cause? Thinkathon: Position Papers&lt;/a&gt; edited by Nishant Shah, Josine Stremmelaar and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? A Report&lt;/a&gt; by Nishant Shah and Sunil Abraham&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/stirrup-and-the-ground"&gt;Between the Stirrup and the Ground: Relocating Digital Activism&lt;/a&gt; by Nishant Shah and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/digital-activism-in-asia-reader"&gt;Digital Activism in 
Asia Reader&lt;/a&gt; (ongoing)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Recent Posts&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/web-politics'&gt;https://cis-india.org/raw/web-politics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-28T06:21:38Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/web-cultures-posts">
    <title>Web Cultures - Posts</title>
    <link>https://cis-india.org/raw/web-cultures-posts</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/web-cultures-posts'&gt;https://cis-india.org/raw/web-cultures-posts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-03-13T01:08:17Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/web-cultures">
    <title>Web Cultures</title>
    <link>https://cis-india.org/raw/web-cultures</link>
    <description>
        &lt;b&gt;This cluster focuses on questions arising from the social, political, and material dimensions of the web-based interactions, communities, and cultures. Our interests range across the topics of digital activism and practices and discourses of social change, forms and norms of online communities, experiences of body and intimacy, structures of violence and affect, and device cultures and materiality of interfaces. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Projects&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/raw/the-spaces-of-digital"&gt;&lt;strong&gt;The Spaces of Digital&lt;/strong&gt;&lt;/a&gt; (ongoing)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/digital-humanities/blogs/interface-intimacies/interface-intimacies"&gt;&lt;strong&gt;Interface Intimacies&lt;/strong&gt;&lt;/a&gt; (ongoing)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/making-change"&gt;&lt;strong&gt;Making Change&lt;/strong&gt;&lt;/a&gt; (2014)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives"&gt;&lt;strong&gt;Digital Natives&lt;/strong&gt;&lt;/a&gt; (2009-2012)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Publications&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/raw/digital-activism-in-asia-reader"&gt;&lt;strong&gt;Digital Activism in Asia Reader&lt;/strong&gt;&lt;/a&gt; edited by Nishant Shah, P.P. Sneha, and Sumandro Chattapadhyay&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism"&gt;&lt;strong&gt;Between the Stirrup and the Ground: Relocating Digital Activism&lt;/strong&gt;&lt;/a&gt; by Nishant Shah and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator"&gt;&lt;strong&gt;Material Cyborgs; Asserted Boundaries: Formulating the Cyborg as a Translator&lt;/strong&gt;&lt;/a&gt; by Nishant Shah&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-a-report"&gt;&lt;strong&gt;Digital Natives with a Cause? A Report&lt;/strong&gt;&lt;/a&gt; by Nishant Shah and Sunil Abraham&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/position-papers"&gt;&lt;strong&gt;Digital Natives with a Cause? Thinkathon: Position Papers&lt;/strong&gt;&lt;/a&gt; edited by Nishant Shah, Josine Stremmelaar, and Fieke Jansen&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/digital-natives/blog/dnbook"&gt;&lt;strong&gt;Digital Natives without a Cause?&lt;/strong&gt;&lt;/a&gt;, a book series edited by Nishant Shah and Fieke Jansen&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Recent Posts&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/web-cultures'&gt;https://cis-india.org/raw/web-cultures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-05-05T09:56:57Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016">
    <title>Understanding Aadhaar and its New Challenges, May 26-27, 2016</title>
    <link>https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016</link>
    <description>
        &lt;b&gt;A workshop on “Understanding Aadhaar and its New Challenges” is being organised by the Centre for Studies in Science Policy, Jawaharlal Nehru University, and the Centre for Internet and Society, during May 26-27. It is also supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science &amp; Technology. This is a legal and technical workshop to be attended by various key researchers and practitioners to discuss the current status of the implementation of the project, in the context of the passing of the Act and the various ongoing cases.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1&gt;Workshop Programme&lt;/h1&gt;
&lt;h3&gt;First Day, May 26&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00-9:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-10:00&lt;/td&gt;
&lt;td&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt;Self-introduction and expectations of participants&lt;br /&gt;Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a Bicycle&lt;/em&gt;&lt;br /&gt;Prof. Ram Kumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;Prof. Subashis Banerjee, Deptt of Computer Science &amp;amp; Engineering, IIT, Delhi - &lt;em&gt;Privacy and Security Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;Pukhraj Singh, former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00-16:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt;Prof. Chinmayi Arun, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in other parts of the world&lt;/em&gt;&lt;br /&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar
&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00-19:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Second Day, May 27&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy, Surveillance, and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;Col Mathew Thomas, Bengaluru
 - &lt;em&gt;The Deceit of Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - I&lt;/strong&gt;&lt;br /&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - II&lt;/strong&gt;&lt;br /&gt;Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;Nikhil Dey, MKSS, Rajasthan (TBC) - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016'&gt;https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-05-26T10:29:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27">
    <title>UIDAI and Welfare Services: Exclusion and Countermeasures (Bangalore, August 27)</title>
    <link>https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a one day workshop, on Saturday, August 27, 2016, to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of  UID-based verification for and distribution of welfare services. We look forward to making this a forum for knowledge exchange and a learning opportunity for our friends and colleagues.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Invitation&lt;/h3&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Venue&lt;/h3&gt;
&lt;p&gt;Institution of Agricultural Technologists, No. 15, Queen’s Road, Bangalore, 560 052.&lt;/p&gt;
&lt;p&gt;Location on Google Map: &lt;a href="https://www.google.com/maps/place/Institution+of+Agricultural+Technologists/" target="_blank"&gt;https://www.google.com/maps/place/Institution+of+Agricultural+Technologists/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;10:00-10:30&lt;/strong&gt; Tea and Coffee&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;10:30-11:00&lt;/strong&gt; Introductions and Updates from Delhi Workshop&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;11:00-12:45&lt;/strong&gt; Reconfiguration of Welfare Governance by UIDAI&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;12:45-14:00&lt;/strong&gt; Lunch&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;14:00-15:00&lt;/strong&gt; Updates on Ongoing Cases against UIDAI&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;15:00-15:15&lt;/strong&gt; Tea and Coffee&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;15:15-16:45&lt;/strong&gt; Open Discussion on Countering Welfare Exclusion&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;16:45-17:00&lt;/strong&gt; Tea and Coffee&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27'&gt;https://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Exclusion</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2016-08-22T13:25:03Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures">
    <title>UIDAI and Welfare Services: Exclusion and Countermeasures</title>
    <link>https://cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures'&gt;https://cis-india.org/internet-governance/files/uidai-and-welfare-services-exclusion-and-countermeasures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-08-22T13:23:24Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services">
    <title>TRAI Consultation on Differential Pricing for Data Services - Post-Open House Discussion Submission</title>
    <link>https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society sent this submission to the Telecom Regulatory Authority of India (TRAI)  following the Open House Discussion on Differential Pricing of Data Services, held in Delhi on February 21, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the submission document: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_TRAI-Differential-Pricing_Submission_2015.01.25.pdf"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Post-Open House Discussion Submission to TRAI&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Dear Ms. Kotwal,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is to heartily congratulate TRAI once again for taking several steps, including the Open House Discussion, to ensure that various opinions about the topic of ‘differential pricing for data services’ are presented and are responded to - and are all in full public view.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This brief note is to &lt;strong&gt;a)&lt;/strong&gt; add to the positions and arguments submitted previously by the Centre for Internet and Society (CIS), India, &lt;strong&gt;b)&lt;/strong&gt; put in writing our comments during the Open House Discussion (January 21, 2016), and &lt;strong&gt;c)&lt;/strong&gt; respond to other comments shared at the same event. We have six points to share in this note:&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Forbearance is not an option&lt;/strong&gt;: We are of the opinion that though the data services market has thus far been kept un-monitored and unregulated, and there are several reasons why this situation should not continue any more. Although the reality of differential pricing (that is data packets originating from different sources being priced differently by ISPs) was highlighted with the recent offering of zero rated packs, it is a general practice in the sector, as illustrated by widely available special/curated content packs for the user to consume data from a specified web-based source. It is not surprising that most such special/curated content packs involve an arrangement between the ISP and a prominent leader in the web-content/platform sector, such as Facebook and Twitter. Serious market distorting impacts of such arrangements are imminent if they are allowed to continue without any monitoring, enforced public disclosure, and regulatory actions by a public authority.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Address differential treatment of data, and not only differential pricing&lt;/strong&gt;: Pricing is only of the three ways in which data services can be treated differently by the ISPs depending upon the source of the data packets concerned. The other two ways are: a) differential speed, or throttling of some data packets and prioritisation of the others, and b) differential treatment of data protocols, for example, the blocking of peer-to-peer or voice-over-IP traffic by an ISP. If the public authority decides to only regulate differential pricing of data service, it is highly probable that ISPs may shift to other forms of discrimination between data packets - either in terms of prioritising some data packets over others based upon their origin, or blocking of specific protocols such as voice-over-IP to prevent the functioning of certain web-based services - and continue the market distorting impacts through these other means.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Allow and define reasonable network management practices&lt;/strong&gt;: Reasonable network management has to be allowed to enable the ISPs to manage performance on their network. However, ISPs may not indulge in acts that are harmful to users in the name of reasonable network management. Below is a set of potential guidelines to identify cases when discrimination against classes of data traffic in the name of reasonable network management can be considered justified and permissible:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;there is an intelligible differentia between the classes which are to be treated differently,&lt;/li&gt;
&lt;li&gt;there is a rational nexus between the differential treatment and the aim of such differentiation,&lt;/li&gt;
&lt;li&gt;the aim sought to be furthered is legitimate, and is related to the security, stability, or efficient functioning of the network, or is a technical limitation outside the control of the ISP, and&lt;/li&gt;
&lt;li&gt;the network management practice is the least harmful technical means that is reasonably available to achieve the aim.&lt;/li&gt;&lt;br /&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Establish an effective enforcement mechanism&lt;/strong&gt;: TRAI must establish an enforcement mechanism that is open to users [and groups of users] and private sector actors as current forums are insufficient. Clear and simple rules must be established ex-ante, if they are violated - ex-post regulation must be undertaken on the basis of principles listed in the TRAI consultation paper, that is “non-discrimination, transparency, affordable internet access, competition and market entry, and innovation” &lt;a name="fr1"&gt;[1]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Take regulatory decisions now, but also conduct and commission further research to review and refine the decisions over a defined period of time&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Need for better collection and proactive disclosure of statistics&lt;/strong&gt;: TRAI publishes quarterly performance indicators statistics collected from the telecom companies about telephone, mobile, and internet sectors in India &lt;a name="fr2"&gt;[2]&lt;/a&gt;. It will be very useful for researchers and analysts, and allow for a much more informed public debate on the matter, if the content and form of such data are improved in the following ways:&lt;br /&gt;
&lt;br /&gt;&lt;strong&gt;Content:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Please start collection (unless already done) and publication of not only data of average incoming and outgoing MOUs, average of total outgoing SMSs, Average Revenue Per User, and average data usage per GSM and CDMA subscriber, but distributions of the same in terms of user deciles (that is in terms of representative figures for each 10% section of users in ascending order of usage),&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide granular data about data usage across service areas and service providers (the numbers on ‘average data usage’ and total ‘revenue from data usage’ provided at present are very insufficient for the state of public debate),&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide data about internet subscriber base according to network technologies (for both wired and wireless) and the service providers concerned,&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide data about IP-based telephony across service areas and service providers,&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide data separately for the North Eastern states, and&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide granular data (separated from the corresponding state data) for all tier-1 cities.&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Form:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Please do not publish the data only as part of the quarterly reports available in PDF format, but also as independent machine-readable spreadsheet file (preferably in CSV format),&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Do not only publish quarterly data in separate files, but also provide a combined (all quarters together) dataset that would make it much easier for researchers and analysts to use the data,&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;In some exceptional cases, the data is not provided in the report directly but a diagram containing the data is published &lt;a name="fr3"&gt;[3]&lt;/a&gt;, which should be kindly avoided, and&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Please publish these statistics as open data, that is in open standards and under open licenses.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;Further, we request TRAI to explore possibilities of distributed sourcing of data, perhaps from the users themselves, about the actual network usage experiences, including but not limited to signal strength, data transfer speed (incoming and outgoing), frequency of switches between mobile (GSM and CDMA) and wi-fi connectivity, etc.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1"&gt;1&lt;/a&gt;]. http://trai.gov.in/WriteReaddata/ConsultationPaper/Document/CP-Differential-Pricing-09122015.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2"&gt;2&lt;/a&gt;]. http://www.trai.gov.in/Content/PerformanceIndicatorsReports/1_1_PerformanceIndicatorsReports.aspx.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3"&gt;3&lt;/a&gt;]. http://www.trai.gov.in/WriteReadData/PIRReport/Documents/Performance_Indicator_Report_Jun_2015.pdf , sections 1.43 and 1.44 (pp. 31-32).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services'&gt;https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>TRAI, OTT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-03-30T13:13:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/Members/tito_dutta.jpg">
    <title>Tito Dutta</title>
    <link>https://cis-india.org/Members/tito_dutta.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/Members/tito_dutta.jpg'&gt;https://cis-india.org/Members/tito_dutta.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-08-21T06:14:01Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system">
    <title>The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System</title>
    <link>https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system</link>
    <description>
        &lt;b&gt;Boosting welfare is the message, which is how Aadhaar is being presented in India. The Aadhaar system as a medium, however, is one that enables tracking, surveillance, and data monetisation. This piece by Sumandro Chattapadhyay was published in The Wire on April 19, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published in and cross-posted from &lt;a href="http://thewire.in/2016/04/19/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system-30256/"&gt;The Wire&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Once upon a time, a king desired that his parrot should be taught all the ancient knowledge of the kingdom. The priests started feeding the pages of the great books to the parrot with much enthusiasm. One day, the king asked the priests if the parrot’s education has completed. The priests poked the belly of the parrot but it made no sound. Only the rustle of undigested pages inside the belly could be heard. The priests declared that the parrot is indeed a learned one now.&lt;/p&gt;
&lt;p&gt;The fate of the welfare system in our country is quite similar to this parrot from Tagore’s parable. It has been forcefully fed identification cards and other official documents (often four copies of the same) for years, and always with the same justification of making it more effective and fixing the leaks. These identification regimes are in effect killing off the welfare system. And some may say that that has been the actual plan in any case.&lt;/p&gt;
&lt;p&gt;The Aadhaar number has been recently offered as &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the ‘last chance’ for the ailing welfare system&lt;/a&gt; – a last identification regime that it needs to gulp down to survive. This argument wilfully overlooks the acute problems with the Aadhaar project.&lt;/p&gt;
&lt;p&gt;Firstly, the ‘last chance’ for a welfare state in India is not provided by implementing a new and improved identification regime (Aadhaar numbers or otherwise), but by enabling citizens to effectively track, monitor, and ensure delivery of welfare, services, and benefits. This ‘opening up’ of the welfare bureaucracy has been most effectively initiated by the Right to Information Act. Instead of a centralised biometrics-linked identity verification platform, which gives the privilege of tracking and monitoring welfare flows only to a few expert groups, an effective welfare state requires the devolution of such privilege and responsibility.&lt;/p&gt;
&lt;p&gt;We should harness the tracking capabilities of electronic financial systems to disclose how money belonging to the Consolidated Fund of India travel around state agencies and departmental levels. Instead, the Aadhaar system effectively stacks up a range of entry barriers to accessing welfare – from malfunctioning biometric scanners, to connectivity problems, to the burden of keeping one’s fingerprint digitally legible under all labouring and algorithmic circumstances.&lt;/p&gt;
&lt;p&gt;Secondly, authentication of welfare recipients by Aadhaar number neither make the welfare delivery process free of techno-bureaucratic hurdles, nor does it exorcise away corruption. Anumeha Yadav has recently documented the emerging &lt;a href="http://scroll.in/article/805909/in-rajasthan-there-is-unrest-at-the-ration-shop-because-of-error-ridden-aadhaar"&gt;‘unrest at the ration shop’ across Rajasthan&lt;/a&gt;, as authentication processes face technical and connectivity delays, people get ‘locked out’ of public services for not having or having Aadhaar number with incorrect demographic details, and no mechanisms exist to provide rapid and definitive recourse.&lt;/p&gt;
&lt;p&gt;RTI activists at the &lt;a href="http://www.snsindia.org/"&gt;Satark Nagrik Sangathan&lt;/a&gt; have highlighted that the Delhi ration shops, using Aadhaar-based authentication, maintain only two columns of data to describe people who have come to the shop – those who received their ration, and those who did not (without any indication of the reason). This leads to erasure-by-design of evidence of the number of welfare-seekers who are excluded from welfare services when the Aadhaar-based authentication process fails (for valid reasons, or otherwise).&lt;/p&gt;
&lt;p&gt;Reetika Khera has made it very clear that using Aadhaar Payments Bridge to directly transfer cash to a beneficiary’s account, in the best case scenario, &lt;a href="http://www.epw.in/journal/2013/05/commentary/cost-benefit-analysis-uid.html"&gt;may only take care of one form of corruption&lt;/a&gt;: deception (a different person claiming to be the beneficiary). But it does not address the other two common forms of public corruption: collusion (government officials approving undue benefits and creating false beneficiaries) and extortion (forceful rent seeking after the cash has been transferred to the beneficiary’s account). Evidently, going after only deception does not make much sense in an environment where collusion and extortion are commonplace.&lt;/p&gt;
&lt;p&gt;Thirdly, the ‘relevant privacy question’ for Aadhaar is not limited to how UIDAI protects the data collected by it, but expands to usage of Aadhaar numbers across the public and private sectors. The privacy problem created by the Aadhaar numbers does begin but surely not end with internal data management procedures and responsibilities of the UIDAI.&lt;/p&gt;
&lt;p&gt;On one hand, the Aadhaar Bill 2016 has reduced the personal data sharing restrictions of the NIAI Bill 2010, and &lt;a href="http://scroll.in/article/806297/no-longer-a-black-box-why-does-the-revised-aadhar-bill-allow-sharing-of-identity-information"&gt;has allowed for sharing of all data except core biometrics (fingerprints and iris scan)&lt;/a&gt; with all agencies involved in authentication of a person through her/his Aadhaar number. These agencies have been asked to seek consent from the person who is being authenticated, and to inform her/him of the ways in which the provided data (by the person, and by UIDAI) will be used by the agency. In careful wording, the Bill only asks the agencies to inform the person about “alternatives to submission of identity information to the requesting entity” (Section 8.3) but not to provide any such alternatives. This facilitates and legalises a much wider collection of personal demographic data for offering of services by public agencies “or any body corporate or person” (Section 57), which is way beyond the scope of data management practices of UIDAI.&lt;/p&gt;
&lt;p&gt;On the other hand, the Aadhaar number is being seeded to all government databases – from lists of HIV patients, of rural citizens being offered 100 days of work, of students getting scholarships meant for specific social groups, of people with a bank account. Now in some sectors, such as banking, inter-agency sharing of data about clients is strictly regulated. But we increasingly have non-financial agencies playing crucial roles in the financial sector – from mobile wallets to peer-to-peer transaction to innovative credit ratings. Seeding of Aadhaar into all government and private databases would allow for easy and direct joining up of these databases by anyone who has access to them, and not at all by security agencies only.&lt;/p&gt;
&lt;p&gt;When it becomes publicly acceptable that &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the &lt;em&gt;money bill route&lt;/em&gt; was a ‘remedial’ instrument to put the Rajya Sabha ‘back on track’&lt;/a&gt;, one cannot not wonder about what was being remedied by avoiding a public debate about the draft bill before it was presented in Lok Sabha. The answer is simple: &lt;em&gt;welfare is the message, surveillance is the medium&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Acceptance and adoption of all medium requires a message, a content. The users are interested in the message. The message, however, is not the business. Think of Free Basics. Facebook wants people with none or limited access to internet to enjoy parts of the internet at zero data cost. Facebook does not provide the content that the users consume on such internet. The content is created by the users themselves, and also provided by other companies. Facebook own and control the medium, and makes money out of all content, including interactions, passing through it.&lt;/p&gt;
&lt;p&gt;The UIDAI has set up a biometric data bank and related infrastructure to offer authentication-as-a-service. As the Bill clarifies, almost all agencies (public or private, national or global) can use this service to verify the identity of Indian residents. Unlike Facebook, the content of these services do not flow through the Aadhaar system. Nonetheless, Aadhaar keeps track of all ‘authentication records’, that is records of whose identity was authenticated by whom, when, and where. This database is gold (data) mine for security agencies in India, and elsewhere. Further, as more agencies use authentication based on Aadhaar numbers, it becomes easier for them to combine and compare databases with other agencies doing the same, by linking each line of transaction across databases using Aadhaar numbers.&lt;/p&gt;
&lt;p&gt;Welfare is the message that the Aadhaar system is riding on. The message is only useful for the medium as far as it ensures that the majority of the user population are subscribing to it. Once the users are enrolled, or on-boarded, the medium enables flow of all kinds of messages, and tracking and monetisation (perhaps not so much in the case of UIDAI) of all those flows. It does not matter if the Aadhaar system is being introduced to remedy the broken parliamentary process, or the broken welfare distribution system. What matters is that the UIDAI is establishing the infrastructure for a universal surveillance system in India, and without a formal acknowledgement and legal framework for the same.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system'&gt;https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-19T13:18:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt">
    <title>The Aakash Tablet and Technological Imaginaries of Mass Education in Contemporary India (Excerpt)</title>
    <link>https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt</link>
    <description>
        &lt;b&gt;In a recently published paper, Jahnavi Phalkey and Sumandro Chattapadhyay explore public initiatives in technological solutions for educating the poor and the disadvantaged in independent India. Here is an edited excerpt from the paper that traces the recent history of technological solutions for mass education and unpacking the narrative of ‘failure’ that is associated with the Aakash experiment.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://github.com/cis-india/website/raw/master/img/2016.02.14_s-campion-aakash.jpg" alt="Students using &amp;lt;p&amp;gt;Aakash tablet, Anupshahr, Uttar Pradesh. Photograph by Sonali Campion." /&gt;&lt;/p&gt;
&lt;h6&gt;Students at Pardada Pardadi Education Society in Anupshahr, Uttar Pradesh, use the Aakash tablet in class as part of a pilot project introducing the low-cost computer into rural schools. Photograph by Sonali Campion, April 09, 2013: &lt;a href="https://www.flickr.com/photos/sonalicampion/9449250639/"&gt;https://www.flickr.com/photos/sonalicampion/9449250639/&lt;/a&gt;.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
In 2010, the Ministry of Human Resource Development (MHRD) of the Government of India launched a set of prototype devices of an affordable tablet computer, the development and production of which were to be supported by the Ministry as part of its larger ICTs for education project. This device later came to be known as the “Aakash” tablet, and the project went through several iterations, between 2010 and 2014, of not only technological re-designs, but also institutional arrangements to design, develop, manufacture, test, and procure the devices.
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Technological Solutions for Mass Education&lt;/h2&gt;
&lt;p&gt;Our exploration of technological solutions for mass education in India has taken us through a not-so-linear history of projects that have informed the imagination and making of the Aakash project. This include the Satellite Instructional Television Experiment, or SITE (1975); University Grants Commission-led Countrywide Classroom project (1984 -); the Simputer, the first hand-held device developed in India (1998); the Hole in the Wall project developed and led by Sugata Mitra (1999); the Government of India-led EDUSAT (2004); National Programme on Technology Enhanced Learning (2003); and finally, a national online education portal named Sakshat (2006). The Satellite Instructional Television Experiment itself terminated rather quickly, but it led to several versions of television based instruction programmes, most notably  aimed at higher secondary and university students. Instruction in the broadcast-format continues to date, even after the arrival of the internet and the fact it has become the preferred medium for the Indian state. The television has not been replaced, but certainly shadowed by a variety of internet access and computing devices.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Aakash, a “Low Cost Access-Cum-Computing Device”&lt;/h2&gt;
&lt;p&gt;An early official description of the then-nameless tablet as a “low cost access-cum-computing device” is noteworthy &lt;strong&gt;[1]&lt;/strong&gt;. It is difficult to imagine a contemporary computing device that does not also function as an access device (say, to the internet). Where does the need for calling it an “access-cum-computing” device come from? It comes, perhaps, from the hierarchy of priority – the device is primarily an access device, and secondarily can perform the function of a general-purpose computer. An archaeological reading of the assumptions of learning processes embodied in this device reveals an earlier layer of thinking – that of broadcasting educational programmes to television sets via satellite connection. Labelling it as “access-cum-computing” frames the object as being shaped by the residue of the Indian state’s education technological experiences of the past, including that of the SITE initiative.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;“[The] Aakash tablet was my dream but it was not fulfilled”&lt;/h2&gt;
&lt;p&gt;Throughout the short history of the Aakash device, the verdict of “failed innovation” figures prominently – from the early failure of "Sakshat" &lt;strong&gt;[2]&lt;/strong&gt;, to allegations of the Chinese origin of the Aakash device &lt;strong&gt;[3]&lt;/strong&gt;, to manufacturing troubles and under-production of the device &lt;strong&gt;[4]&lt;/strong&gt;, to criticisms of the tablet’s built quality and computing capacity &lt;strong&gt;[5]&lt;/strong&gt;, to mistrust and failed collaborations between parties involved in its production &lt;strong&gt;[6]&lt;/strong&gt;, and intra-governmental criticisms of the implementation process &lt;strong&gt;[7]&lt;/strong&gt;. Moreover, there remained a continuous tension within the government itself regarding the necessity of the project, especially fuelled by (and fuelling) the image of the project as being driven by the dreams of a specific minister &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To simply describe the Aakash project’s failure as one due to the unbearable heaviness of functions ranging from the technical to the symbolic and political is to fall short of a full explanation. Alongside that narrative of failure, it is critical to foreground the quiet success of the project in establishing the tablet computer as a near-essential and familiarised everyday object for access to educational material. There is an alarming accuracy in the MHRD claim that the Aakash project established a sub $100 tablet market in India – it did, even if it was not for the device they wanted to promote &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;The Device is the Desire&lt;/h2&gt;
&lt;p&gt;We observe that the Aakash project, as well as the ones preceding it, have been driven primarily by a desire to scale up the provision of education. The initiatives towards building delivery infrastructures for such mass-scale provision of education has almost always been accompanied by a larger desire for developing capabilities in space exploration, communication, and computing – the key technologies of twentieth century geopolitics. Our study of the manufacturing of the Aakash tablet, and its surrounding discourses, foreground the technological imagination of the state after liberalisation in India (1991), and its unique arrangements and efforts to create domestic capability of technological innovation in a context of globalised production and communication networks. We see our role as one of recovering the work of technology in the history of education as understood through the interactions between the state, academia, and industry.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Archival Research in (Increasingly) Digital India&lt;/h2&gt;
&lt;p&gt;Documenting the project has been an interesting historical exercise. We have been attentive to documents disappearing from their online locations. One remarkable possibility for archival research opened up by the internet is the (limited, and often uncertain) ability to access materials that are not presently available on a website, but were part of it in the past. This possibility allowed us to access a few crucial government documents that are not directly available on the official websites any more. We have also been attentive to the reiterations and revisions that do not merely overtake or shadow earlier documents. They sometimes erase earlier documents altogether as digital revisions. We do not have access to personal correspondence or internal institutional correspondence relating to the project. We are, however, skeptical of that happening as no protocols for the archiving of digital correspondence is yet in place with the Government of India. Doing recent history of India is becoming an ever more difficult exercise that historians must urgently attend to, if we are to make the present ready to have its own past in the future.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; Ministry of Human Resource Development, Government of India. “The History of Aakash Low Cost Access cum Computing Device.” Sakshat. October 05, 2011. &lt;a href="http://archive.sakshat.ac.in/pdf/Final_Note_Aakash.pdf"&gt;http://archive.sakshat.ac.in/pdf/Final_Note_Aakash.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; Mukherjee, Arindam. “Bonsai Netbooks.” Outlook. February 16, 2009. &lt;a href="http://www.outlookindia.com/article/Bonsai-Netbooks/239719"&gt;http://www.outlookindia.com/article/Bonsai-Netbooks/239719&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Raina, Pamposh, and Mia Li. “India’s ‘Aakash,’ Now Made in China.” The New York Times. November 26, 2012. &lt;a href="http://india.blogs.nytimes.com/2012/11/26/india%E2%80%99s-super-cheap-tablet-now-made-in-china/"&gt;http://india.blogs.nytimes.com/2012/11/26/india%E2%80%99s-super-cheap-tablet-now-made-in-china/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Nanda, Prashant K., and Surabhi Agarwal. “Government Close to Giving Up on Aakash Project.” Mint. March 22, 2013. &lt;a href="http://www.livemint.com/Politics/fmEi8gsOSFgOzSTFfLsw6J/Govt-almost-gives-up-on-Aakash-says-no-point-in-hardware-ob.html"&gt;http://www.livemint.com/Politics/fmEi8gsOSFgOzSTFfLsw6J/Govt-almost-gives-up-on-Aakash-says-no-point-in-hardware-ob.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Chopra, Ritika. “Kapil Sibal's Cheap Aakash Proves to be a Dud.” Mail Today. January 08, 2012. &lt;a href="http://indiatoday.intoday.in/story/kapil-sibal-cheapest-tablet-of-world-aakash-failure/1/167730.html"&gt;http://indiatoday.intoday.in/story/kapil-sibal-cheapest-tablet-of-world-aakash-failure/1/167730.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; Julka, Harsimran. “14 Lakh Aakash Tablets Booked in 14 Days.” The Economic Times. January 03, 2012. &lt;a href="http://economictimes.indiatimes.com/tech/hardware/14-lakh-aakash-tablets-booked-in-14-days/articleshow/11345695.cms"&gt;http://economictimes.indiatimes.com/tech/hardware/14-lakh-aakash-tablets-booked-in-14-days/articleshow/11345695.cms&lt;/a&gt;. Parthasarathi, Ashok. “Cloudy Outlook for Aakash.” The Hindu. May 21, 2012 (Updated: May 22, 2012). &lt;a href="http://www.thehindu.com/opinion/op-ed/article3439629.ece
"&gt;http://www.thehindu.com/opinion/op-ed/article3439629.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; Comptroller and Auditor General of India, Government of India. Report No. 19 of 2013 - Union Government (Civil) - Report of the Comptroller and Auditor General of India on Compliance Audit Observations. Government of India. 2013. &lt;a href="http://www.cag.gov.in/content/report-no-19-2013-compliance-audit-observations-union-governmentcivil"&gt;http://www.cag.gov.in/content/report-no-19-2013-compliance-audit-observations-union-governmentcivil&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; At an event in late 2013, Kapil Sibal admitted, “[the] Aakash tablet was my dream but it was not fulfilled, I tried hard...” Quoted in Press Trust of India. “Kapil Sibal: Aakash Tablet is My Unfulfilled Dream.” Financial Express. December 24, 2013. &lt;a href="http://www.financialexpress.com/news/kapil-sibal-aakash-tablet-is-my-unfulfilled-dream/1211284/0 "&gt;http://www.financialexpress.com/news/kapil-sibal-aakash-tablet-is-my-unfulfilled-dream/1211284/0 &lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See &lt;strong&gt;[1]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This is an edited excerpt from a paper titled ‘The Aakash Tablet and Technological Imaginaries of Mass Education in Contemporary India’ recently published in History and Technology, on 5 February, 2016. The paper can be accessed here: &lt;a href="http://www.tandfonline.com/doi/full/10.1080/07341512.2015.1136142" target="_blank"&gt;http://www.tandfonline.com/doi/full/10.1080/07341512.2015.1136142&lt;/a&gt; (the first 50 downloads are free).&lt;/p&gt;
&lt;p&gt;Cross-posted from &lt;a href="http://blogs.lse.ac.uk/southasia/2016/02/12/the-aakash-tablet-and-technological-imaginaries-of-mass-education-in-contemporary-india/" target="_blank"&gt;South Asia @ LSE Blog&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt'&gt;https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Education Technology</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2016-02-14T10:11:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/telugu-wikipedia">
    <title>Telugu Wikipedia Projects</title>
    <link>https://cis-india.org/a2k/telugu-wikipedia</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/telugu-wikipedia'&gt;https://cis-india.org/a2k/telugu-wikipedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-12-15T09:03:11Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/people/CIS_TM.jpeg">
    <title>Tasneem Mewa</title>
    <link>https://cis-india.org/about/people/CIS_TM.jpeg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/people/CIS_TM.jpeg'&gt;https://cis-india.org/about/people/CIS_TM.jpeg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-17T09:56:52Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/sumandro-c-open-access-dialogues-2013">
    <title> Sumandro C - Open Access Dialogues - Strategic Issues Emerging from the Comments of Indian Participants </title>
    <link>https://cis-india.org/openness/sumandro-c-open-access-dialogues-2013</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/sumandro-c-open-access-dialogues-2013'&gt;https://cis-india.org/openness/sumandro-c-open-access-dialogues-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-10-11T04:34:19Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/Members/subodh_kulkarni.jpg">
    <title>Subodh Kulkarni</title>
    <link>https://cis-india.org/Members/subodh_kulkarni.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/Members/subodh_kulkarni.jpg'&gt;https://cis-india.org/Members/subodh_kulkarni.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-08-21T07:08:21Z</dc:date>
   <dc:type>Image</dc:type>
   </item>




</rdf:RDF>
