<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1741 to 1755.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/2010-special-301"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/China-club-Bombay-club"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/biometry-is-watching"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/what-women-want"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/tpm-copyright-amendment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/when-copyright-goes-bad"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/ci-global-meeting-a2k"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/cpov"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/wwrep"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/arguments-against-software-patents"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/blogs/2010-special-301">
    <title>The 2010 Special 301 Report Is More of the Same, Slightly Less Shrill</title>
    <link>https://cis-india.org/a2k/blogs/2010-special-301</link>
    <description>
        &lt;b&gt;Pranesh Prakash examines the numerous flaws in the Special 301 from the Indian perspective, to come to the conclusion that the Indian government should openly refuse to acknowledge such a flawed report.  He notes that the Consumers International survey, to which CIS contributed the India report, serves as an effective counter to the Special 301 report.&lt;/b&gt;
        &lt;h1&gt;Special 301 Report: Unbalanced Hypocrisy&lt;/h1&gt;
&lt;p&gt;The United States Trade Representative has put yet another edition of the Special 301 report which details the copyright law and policy wrongdoings of the US's trading partners.  Jeremy Malcolm of Consumers International notes that the report this year claims to be "well-balanced assessment of intellectual property protection and enforcement ... taking into account diverse factors", but:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;[I]n fact, the report largely continues to be very one-sided.  As in previous editions, it lambasts developing countries for failing to meet unrealistically stringent standards of IP protection that exceed their obligations under international law.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;More the report changes, &lt;a href="http://cis-india.org/advocacy/ipr/blog/consumers-international-ip-watch-list-2009"&gt;the more it stays the same&lt;/a&gt;. &lt;a href="http://www.michaelgeist.ca/content/view/4684/195/"&gt;Despite having wider consultations&lt;/a&gt; than just the International Intellectual Property Alliance (IIPA, consisting of US-based IP-maximalist lobbyists like the Motion Picture Association of America, Recording Industry Association of America, National Music Publishers Association, Association of American Publishers, and Business Software Alliance) and the Pharmaceutical Research and Manufacturers of America (PhRMA, consisting of US-based pharma multinationals), things haven't really changed much in terms of the shoddiness of the Special 301 report.&lt;/p&gt;
&lt;h1&gt;India and the 2010 Special 301 Report&lt;/h1&gt;
&lt;p&gt;The Special 301 report for 2010 contains the following assessment of India:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;India will remain on the Priority Watch List in 2010. India continues to make gradual progress on efforts to improve its legislative, administrative, and enforcement infrastructure for IPR. India has made incremental improvements on enforcement, and its IP offices continued to pursue promising modernization efforts. Among other steps, the United States is encouraged by the Indian government’s consideration of possible trademark law amendments that would facilitate India’s accession to the Madrid Protocol. The United States encourages the continuation of efforts to reduce patent application backlogs and streamline patent opposition proceedings. Some industries report improved engagement and commitment from enforcement officials on key enforcement challenges such as optical disc and book piracy. However, concerns remain over India’s inadequate legal framework and ineffective enforcement. Piracy and counterfeiting, including the counterfeiting of medicines, remains widespread and India’s enforcement regime remains ineffective at addressing this problem. Amendments are needed to bring India’s copyright law in line with international standards, including by implementing the provisions of the WIPO Internet Treaties. Additionally, a law designed to address the unauthorized manufacture and distribution of optical discs remains in draft form and should be enacted in the near term. The United States continues to urge India to improve its IPR regime by providing stronger protection for patents. One concern in this regard is a provision in India’s Patent Law that prohibits patents on certain chemical forms absent a showing of increased efficacy. While the full import of this provision remains unclear, it appears to limit the patentability of potentially beneficial innovations, such as temperature-stable forms of a drug or new means of drug delivery. The United States also encourages India to provide protection against unfair commercial use, as well as unauthorized disclosure, of undisclosed test or other data generated to obtain marketing approval for pharmaceutical and agricultural chemical products. The United States encourages India to improve its criminal enforcement regime by providing for expeditious judicial disposition of IPR infringement cases as well as deterrent sentences, and to change the perception that IPR offenses are low priority crimes. The United States urges India to strengthen its IPR regime and will continue to work with India on these issues in the coming year. &lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This short dismissal of the Indian IPR regime, and subsequent classification of India as a "Priority Watch List" country reveals the great many problems with the Special 301.&lt;/p&gt;
&lt;h2&gt;On Copyrights&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;The report notes that there are "concerns over India's inadequate legal framework and ineffective enforcement".  However, nowhere does it bother to point out precisely &lt;em&gt;how&lt;/em&gt; India's legal framework is inadequate, and how this is negatively affecting authors and creators, consumers, or even the industry groups (MPAA, RIAA, BSA, etc.) that give input to the USTR via the IPAA.  Nor does it acknowledge the well-publicised fact that the statistics put out by these bodies have time and again &lt;a href="http://www.cis-india.org/a2k/blog/fallacies-lies-and-video-pirates"&gt;proven to be wrong&lt;/a&gt;:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Apart from this bald allegation which has not backing, there is a bald statement about India needing to bring its copyright law "in line with international standards" including "the WIPO Internet Treaties".  The WIPO Internet Treaties given that more than half the countries of the world are not signatories to either of the WIPO Internet Treaties (namely the WIPO Copyright Treaty and the WIPO Performance and Phonograms Treaty), calling them 'international standards' is suspect.  That apart, both those treaties are TRIPS-plus treaties (requiring protections greater than the already-high standards of the TRIPS Agreement).  India has not signed either of them.  It should not be obligated to do so. Indeed, Ruth Okediji, a noted copyright scholar, &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1433848"&gt;states&lt;/a&gt;:&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote&gt;
&lt;p&gt;Consistent with their predecessors, the WIPO Internet Treaties marginalize collaborative forms of creative engagement with which citizens in the global South have long identified and continue in the tradition of assuming that copyright’s most enduring cannons are culturally neutral. [...] The Treaties do not provide a meaningful basis for a harmonized approach to encourage new creative forms in much the same way the Berne Convention fell short of embracing diversity in patterns and modes of authorial expression.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Some of the of the 'problems' noted in the report are actually seen as being beneficial by many researchers and scholars such as Lawrence Liang, Achal Prabhala, Perihan Abou Zeid &lt;a href="https://sites.google.com/site/iipenforcement/bibliography"&gt;and others&lt;/a&gt;, who argue that &lt;a href="http://www.altlawforum.org/intellectual-property/publications/articles-on-the-social-life-of-media-piracy/reconsidering-the-pirate-nation"&gt;lax enforcement has enabled access to knowledge and promotion of innovation&lt;/a&gt;.  In a panel on 'Access to Knowledge' at the Internet Governance Forum, &lt;a href="http://a2knetwork.org/access-knowledge-internet-governance-forum"&gt;Lea Shaver, Jeremy Malcolm and others&lt;/a&gt; who have been involved in that Access to Knowledge movement noted that lack of strict enforcement played a positive role in many developing countries.  However, they also noted, with a fair bit of trepidation, that this was sought to be changed at the international level through treaties such as the Anti-Counterfeiting Treaty Agreement (ACTA).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The scope of an optical disc law are quite different from copyright law.  The report condemns "unauthorized manufacture and distribution of optical discs", however it does not make it clear that what it is talking about is not just unlicensed copying of films (which is already prohibited under the Copyright Act) but the manufacture and distribution of blank CDs and DVDs as well.  The need for such a law is assumed, but never demonstrated.  It is onerous for CD and DVD manufacturers (such as the Indian company Moserbaer), and is an overbearing means of attacking piracy.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The report calls for "improve[ment] [of India's] criminal enforcement regime" and for "deterrent" sentences and expeditious judicial disposition of IPR infringement cases.  While we agree with the last suggestion, the first two are most unacceptable.  Increased criminal enforcement of a what is essentially a private monopoly right is undesirable.  Copyright infringment on non-commercial scales should not be criminal offences at all.  What would deter people from infringing copyright laws are not "deterrent sentences" but more convenient and affordable access to the copyright work being infringed.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;On Patents&lt;/h2&gt;
&lt;p&gt;Thankfully, this year the Special 301 report does not criticise the Indian Patent Act for providing for post-grant opposition to patent filings, as it has in previous years.  However, it still criticises section 3(d) of the Patent Act which ensures that 'evergreening' of drug patents is not allowed by requiring for new forms of known substances to be patented only if "the enhancement of the known efficacy of [the known] substance" is shown.  Thus, the US wishes India to change its domestic law to enable large pharma companies to patent new forms of known substances that aren't even better ("enhancement of the known efficacy").  For instance, "new means of drug delivery" will not, contrary to the assertions of the Special 301 report and the worries of PhRMA, be deemed unpatentable.&lt;/p&gt;
&lt;p&gt;The United States has been going through much turmoil over its patent system.  Reform of the patent system is currently underway in the US through administrative means, judicial means, as well as legislative means.  One of the main reasons for this crumbling of the patent system has been the low bar for patentability (most notably the 'obviousness' test) in the United States and the subsequent over-patenting.  An &lt;a href="http://supreme.justia.com/us/447/303/case.html"&gt;American judgment&lt;/a&gt; even noted that "anything under the sun that is made by man" is patentable subject matter. It is well-nigh impossible to take American concerns regarding our high patent standards seriously, given this context.&lt;/p&gt;
&lt;h2&gt;Miscellanea&lt;/h2&gt;
&lt;p&gt;The harms of counterfeit medicine, as &lt;a href="http://www.cis-india.org/a2k/blog/fallacies-lies-and-video-pirates"&gt;we have noted earlier&lt;/a&gt;, are separate issues that are best dealt under health safety regulations and consumer laws, rather than trademark law.&lt;/p&gt;
&lt;p&gt;Data exclusivity has been noted to be harmful to the progress of generics, and seeks to extend proprietary rights over government-mandated test data.  It is [clear from the TRIPS Agreement][de-trips] that data exclusivity is not mandatory.  There are clear rationale against it, and the Indian pharmaceutical industry [is dead-set against it][de-india].  Still, the United States Trade Representative persists in acting as a corporate shill, calling on countries such as India to implement such detrimental laws.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Michael Geist, professor at University of Ottowa &lt;a href="http://www.michaelgeist.ca/content/view/4997/125"&gt;astutely notes&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Looking beyond just Canada, the list [of countries condemned by the Special 301 report] is so large, that it is rendered meaningless.  According to the report, approximately 4.3 billion people live in countries without effective intellectual property protection.  Since the report does not include any African countries outside of North Africa, the U.S. is effectively saying that only a small percentage of the world meet its standard for IP protection.  Canada is not outlier, it's in good company with the fastest growing economies in the world (the BRIC countries are there) and European countries like Norway, Italy, and Spain. 
In other words, the embarrassment is not Canadian law.  Rather, the embarrassment falls on the U.S. for promoting this bullying exercise and on the Canadian copyright lobby groups who seemingly welcome the chance to criticize their own country. &lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;His comments apply equally well for India as well.&lt;/p&gt;
&lt;h1&gt;IIPA's Recommendation for the Special 301 Report&lt;/h1&gt;
&lt;p&gt;Thankfully, this year &lt;a href="http://www.iipa.com/rbc/2010/2010SPEC301INDIA.pdf"&gt;IIPA's recommendations&lt;/a&gt; have not been directly copied into the Special 301 report.  (They couldn't be incorporated, as seen below.)  For instance, the IIPA report notes:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The industry is also concerned about moves by the government to consider mandating the use of open source software and software of only domestic origin. Though such policies have not yet been implemented, IIPA and BSA urge that this area be carefully monitored.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Breaking that into two bit:&lt;/p&gt;
&lt;h2&gt;Open Source&lt;/h2&gt;
&lt;p&gt;Firstly, it is curious to see industry object to legal non-pirated software.  Secondly, many of BSA's members (if not most) use open source software, and a great many of them also produce open source software.  &lt;a href="http://hp.sourceforge.net/"&gt;HP&lt;/a&gt; and &lt;a href="http://www-03.ibm.com/linux/ossstds/"&gt;IBM&lt;/a&gt; have been huge supporters of open source software.  Even &lt;a href="http://www.microsoft.com/opensource/"&gt;Microsoft has an open source software division&lt;/a&gt;.  [Intel][intel], &lt;a href="http://www.sap.com/usa/about/newsroom/press.epx?pressid=11410"&gt;SAP&lt;/a&gt;, &lt;a href="http://www.cisco.com/web/about/doing_business/open_source/index.html"&gt;Cisco&lt;/a&gt;, &lt;a href="http://linux.dell.com/projects.shtml"&gt;Dell&lt;/a&gt;, &lt;a href="http://www.sybase.com/developer/opensource"&gt;Sybase&lt;/a&gt;, &lt;a href="http://www.entrust.com/news/index.php?s=43&amp;amp;item=702"&gt;Entrust&lt;/a&gt;, &lt;a href="http://about.intuit.com/about_intuit/press_room/press_release/articles/2009/IntuitPartnerPlatformAddsOpenSourceCommunity.html"&gt;Intuit&lt;/a&gt;, &lt;a href="http://www.synopsys.com/community/interoperability/pages/libertylibmodel.aspx"&gt;Synopsys&lt;/a&gt;, &lt;a href="http://www.apple.com/opensource/"&gt;Apple&lt;/a&gt;, &lt;a href="http://www.theregister.co.uk/2005/04/22/jbuilder_eclipse/"&gt;Borland&lt;/a&gt;, &lt;a href="http://w2.cadence.com/webforms/squeak/"&gt;Cadence&lt;/a&gt;, &lt;a href="http://usa.autodesk.com/adsk/servlet/item?siteID=123112&amp;amp;id=6153839"&gt;Autodesk&lt;/a&gt;, and &lt;a href="http://news.cnet.com/8301-13505_3-9967593-16.html"&gt;Siemens&lt;/a&gt; are all members of BSA which support open source software / produce at least some open source software.  And &lt;em&gt;all&lt;/em&gt; BSA members rely on open source software (as part of their core products, their web-server, their content management system, etc.) to a lesser or greater extent.  BSA's left hand doesn't seem to know what its right hand -- its members -- are doing.  Indeed, the IIPA does not seem to realise that the United States' government itself uses [open source software], and has been urged to &lt;a href="http://news.bbc.co.uk/2/hi/7841486.stm"&gt;look at FOSS very seriously&lt;/a&gt; and is doing so, especially under CIO Vivek Kundra.  And that may well be the reason why the USTR could not include this cautionary message in the Special 301 report.&lt;/p&gt;
&lt;h2&gt;Domestic Software&lt;/h2&gt;
&lt;p&gt;As &lt;a href="http://arstechnica.com/tech-policy/news/2010/04/indias-copyright-proposals-are-un-american-and-thats-bad.ars"&gt;this insightful article by Nate Anderson in Ars Technica&lt;/a&gt; notes:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Open source is bad enough, but a "buy Indian" law? That would be &lt;a href="http://www.canadainternational.gc.ca/sell2usgov-vendreaugouvusa/procurement-marches/buyamerica.aspx?lang=eng"&gt;an outrage&lt;/a&gt; and surely something the US government would not itself engage in &lt;a href="http://www.canadainternational.gc.ca/sell2usgov-vendreaugouvusa/procurement-marches/ARRA.aspx?lang=eng"&gt;as recently as last year&lt;/a&gt;. Err, right?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Furthermore, the IIPA submission do not provide any reference for their claim that "domestic origin" software is being thought of being made a mandatory requirement in governmental software procurement.&lt;br /&gt;
&lt;/p&gt;
&lt;h2&gt;WCT, WPPT, Camcording, and Statutory Damages&lt;/h2&gt;
&lt;p&gt;The IIPA submission also wish that India would:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adopt a system of statutory damages in civil cases; allow compensation to be awarded in criminal cases;&lt;/li&gt;
&lt;li&gt;Adopt an optical disc law;&lt;/li&gt;
&lt;li&gt;Enact Copyright Law amendments consistent with the WCT and WPPT;&lt;/li&gt;
&lt;li&gt;Adopt an anti-camcording criminal provision.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Quick counters:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Statutory damages (that is, an amount based on statute rather than actual loss) would result in ridiculousness such as the $1.92 million damages that the jury (based on the statutory damages) slapped on Jammie Thomas.  The judge in that case &lt;a href="http://arstechnica.com/tech-policy/news/2010/01/judge-slashes-monstrous-jammie-thomas-p2p-award-by-35x.ars"&gt;called the damage award&lt;/a&gt; "monstrous and shocking" and said that veered into "the realm of gross injustice."&lt;/li&gt;
&lt;li&gt;The reasons against an optical disc law are given above.  Quick recap: it is a) unnecessary and b) harmful.&lt;/li&gt;
&lt;li&gt;India has not signed the WCT and the WPPT.  Indian law satisfies all our international obligations.  Thus enacting amendments consistent with the WCT and the WPPT is not required.&lt;/li&gt;
&lt;li&gt;Camcording of a film is in any case a violation of the Copyright Act, 1957, and one would be hard-pressed to find a single theatre that allows for / does not prohibit camcorders.  Given this, the reason for an additional law is, quite frankly, puzzling.  At any rate, IIPA in its submission does not go into such nuances.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Further conclusions&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://spicyipindia.blogspot.com/2010/05/us-special-301-report-and-not-so.html"&gt;Shamnad Basheer&lt;/a&gt;, an IP professor at NUJS, offer the following as a response:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;"Dear USA,&lt;/p&gt;
&lt;p&gt;India encourages you to mind your own business. We respect your sovereignty to frame IP laws according to your national priorities and suggest that you show us the same courtesy. If your grouse is that we haven't complied with TRIPS, please feel free to take us to the WTO dispute panel. Our guess is that panel members familiar with the English language will ultimately inform you that section 3(d) is perfectly compatible with TRIPS. And that Article 39.3 does not mandate pharmaceutical data exclusivity, as you suggest!
More importantly, at that point, we might even think of hauling you up before the very same body for rampant violations, including your refusal to grant TRIPS mandated copyright protection to our record companies, despite a WTO ruling (Irish music case) against you.&lt;/p&gt;
&lt;p&gt;Yours sincerely,&lt;/p&gt;
&lt;p&gt;India."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Basheer's suggestion seems to be in line with that Michael Geist who believes that other countries should join Canada and Israel in openly refusing to acknowledge the validity of the Special 301 Reports because they lack ['reliable and objective analysis'][geist-reliable].  And that thought serves as a good coda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/2010-special-301'&gt;https://cis-india.org/a2k/blogs/2010-special-301&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Access to Medicine</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>FLOSS</dc:subject>
    
    
        <dc:subject>Technological Protection Measures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2011-10-03T05:37:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/China-club-Bombay-club">
    <title>China Club instead of Bombay Club?</title>
    <link>https://cis-india.org/telecom/blog/China-club-Bombay-club</link>
    <description>
        &lt;b&gt;Emulate China's coordinated policies for strategic sectors, and we'll rely less on commodity exports, says Shyam Ponappa in his article in the Business Standard on May 13, 2010.&lt;/b&gt;
        
&lt;p&gt;With the momentum of the past few years, India’s potential for growth is enormous, despite the chaotic loose linkages. In sectors like power and telecommunications, this translates to demand far outstripping capacity. Some contend that domestic inability to build capacity — i.e., being able to actually pull it off, as against the perpetual potential — will conscribe not only these sectors, but also limit overall growth. So the argument goes, e.g., let China build India’s power plants, because we need the power and don’t have capacity/they do it cheaper.&lt;/p&gt;
&lt;p&gt;Comparative advantage notwithstanding, this reasoning is fallacious given the realities of national interests and self-interest. To understand why, consider the naïveté of the underlying assumptions — about “rational man”, that capitalism is fair, capital is immobile, surplus value accrues to countries and not to companies, or that the pursuit of self-interest maximises societal &lt;a class="external-link" href="http://www.lsd.ic.unicamp.br/~oliva/papers/free-software/BMind.pdf"&gt;benefits&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Our quandary is aggravated by our inability so far to orchestrate supportive policies for even a level playing field. Ironically, one need only consider India’s approach to IT and IT-enabled services (ITeS) in the initial growth years to realise this. India’s policies in IT and ITeS, while far from perfect — in fact, sneaked through by stealth, as in the preferential 64 kbps communications lifeline, and the tax breaks for software service exporters — provided the foundations for transforming IT and then ITeS/BPO/KPO (Business Process and Knowledge Process Outsourcing).&lt;/p&gt;
&lt;p&gt;These sectors also benefited from a controlled exchange rate, as the Reserve Bank of India (RBI) managed a steady depreciation during those years. But they did not have another vital ingredient of coordinated policies as did the Asian tigers: low borrowing rates (&lt;a class="external-link" href="http://www.business-standard.com/general/pdf/050610_03.jpg"&gt;see the diagram&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;This is one reason why, for instance, India’s machine tool manufacturers or shipbuilders have not matched the growth of knowledge-based services. The former need inexpensive, long-term capital for production and marketing, as well as for continuous innovation, upgrade and &lt;a class="external-link" href="http://www.wu.ac.at/europainstitut/noeg/raju_s2.3-2"&gt;scale&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Why labour arbitrage and not products&lt;/h3&gt;
&lt;p&gt;This is also one reason why we lack product orientation, because product design, development and marketing require the support of easy access to cheap capital for a long period. Labour arbitrage needs little capital. Therefore, we have been better mercenaries than producers of products, compared with the chaebols (Samsung, Hyundai) or keiretsu (Mitsubishi, Dai-Ichi/Mizuho). There are, of course, many additional reasons: their education, training, work practices, our policies against large corporations, etc.&lt;/p&gt;
&lt;p&gt;With growth in domestic markets across a broad range — telecom equipment, engineering goods, power — there are domestic manufacturing initiatives, such as L&amp;amp;T and Bharat Forge in power generation joining Bhel, or Tejas Networks in optical switching. But for the transformational changes we have witnessed in IT, we need coordinated industrial policies that support domestic manufacturing, because that’s the competition. Unthinking acceptance of “open markets” without heed to how others — including developed economies — cosseted and built their manufacturing capacity will ensure that India stays a raw materials and commodities exporter, while importing trains, aircraft, machine tools, and equipment for power generation, telecommunications and defence.&lt;/p&gt;
&lt;h3&gt;Integrated policies work&lt;/h3&gt;
&lt;p&gt;Ideally, supportive policies comprise a coordinated range, such as state and central taxes, favoured locations with good infrastructure — energy, transport and communications, subsidised land, favourable exchange and interest rates, preferred access to domestic markets, and barriers to unfair competition, like import tariffs not below the WTO floor, and safeguard duties. Without this orchestration, the victors are companies and countries that have understood these principles, and have these systems in place. (This applies equally to farm products.)&lt;/p&gt;
&lt;p&gt;Many are apprehensive that what works elsewhere will not work in India because of malpractices, as seen in recurring scams. There is every need for systems with integrity, and for enforcement with penalties. But just as corruption in government or civil society does not do away with the need for either, misuse does not negate the need for incentives. It would be self-damaging to lose the opportunity to try and get our act together simply because of apprehensions of corruption and/or incompetence. That would be like not subsidising food for the poor; it’s a different matter that we need better methods to prevent gross misappropriation.&lt;/p&gt;
&lt;p&gt;The consequence of heedless, ad hoc muddling through instead of orchestrated strategies is that manufactured imports will dominate our markets, while domestic manufacturing is fragmented, hamstrung or absent. Having said that, consider India’s needs in electricity or communications — telecom, Internet and broadcasting — and it is apparent that crafting policies is not simple. So many conflicting images, some based on facts, others, mere impressions, which are often more important than facts. What should policy-makers do for our needs on such a massive scale with growing shortfalls?&lt;/p&gt;
&lt;h3&gt;Emulate China&lt;/h3&gt;
&lt;p&gt;The short answer: learn from China. In the power sector, Chinese suppliers have the following advantages:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Low-cost access to capital.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;An exchange rate advantage (10-30 per cent).&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;No sales tax and octroi, aggregating to about 11 per cent.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Zero customs duty on equipment for large plants (China imposes a 30 per cent import duty)&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Corrective action discussed for years has not resulted in concrete steps. The power ministry, citing supposed user benefits, opposes the planning commission’s recommendation of a safeguard duty. This is as shortsighted as “free electricity” that undercuts investments in power.&lt;/p&gt;
&lt;p&gt;In telecommunications, consider Huawei, with revenues of over $20 billion, nurtured for 20 years with the People’s Liberation Army (PLA) as an R&amp;amp;D partner and guaranteed customer, vis-à-vis, say, Tejas Networks from Bangalore, with no government support.&lt;/p&gt;
&lt;p&gt;Our policies need to focus on our long-term interests with strategic intent and execution, as in other countries, balancing costs with the benefits of domestic capabilities. These sectors need government procurement support, not criteria that disqualify Indian companies in strategic sectors like power and communications. They also need interim methods for Chinese companies to contribute while upgrading our skills and processes. Our aim needs to be a level playing field.&lt;/p&gt;
&lt;p&gt;Read the original article in the &lt;a class="external-link" href="http://www.business-standard.com/india/storypage.php?autono=393889"&gt;Business Standard&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/China-club-Bombay-club'&gt;https://cis-india.org/telecom/blog/China-club-Bombay-club&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2012-05-10T10:35:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/biometry-is-watching">
    <title>Biometry Is Watching</title>
    <link>https://cis-india.org/news/biometry-is-watching</link>
    <description>
        &lt;b&gt;In its first steps, the UID drive encounters practical problems, raises ethical questions, reports Sugata Srinivasaraju in Outlook.&lt;/b&gt;
        
&lt;p&gt;Three women are fighting to take one chair in a classroom of a government school in Chelur village, in Gubbi taluka of Tumkur district. One sits on the lap of another and the third tries to push them both off the chair. What all three want is to be the first to be profiled under the Centre’s ambitious Aadhaar or unique identity number (UID) project. Their squabbling holds up the documentation by nearly 20 minutes, and the crowd outside, standing in line in the afternoon sun, grows restless. To calm them, the village revenue secretary orders the distribution of another round of buttermilk.&lt;/p&gt;
&lt;p&gt;Chelur is one of four villages in the district picked for field trials before the 12-digit UIDs are assigned to people later in the year. Besides Tumkur, the pilot project is simultaneously running in seven villages of Mysore district. Each village has been given a target of 2,400-2,500 profiles to be completed in 20 days. This involves photographing the face, imaging the iris and scanning all ten digits of each person profiled and assigned a UID.&lt;/p&gt;
&lt;p&gt;Villagers are enthusiastic about this rigorous profiling process even though there’s little awareness about the true purpose of the exercise. This is because of some falsehoods that have somehow spread in these areas. Nagamma, an elderly woman coming out after being profiled, thinks her eyes had been tested and found to be in perfect condition. Another middle-aged woman thought the exercise would bring her a new ration card—one that would entitle her family to an extra four kilos of rice. Some others were in a tizzy that if they didn’t undergo this “photography” their BPL cards would be taken away. Most, however, had queued up because they didn’t want to be left out of a sarkari exercise their neighbours were submitting to. Of the dozen people Outlook&amp;nbsp; spoke to, only Muniswamy could tell us that this process would ensure that no one had more than one voter ID card or ration card—the way it should be, unlike some in his village who had illegally acquired two of each.&lt;/p&gt;
&lt;p&gt;The village authorities have been doing little to counter the misinformation because their attention is focused on other compelling matters, like meeting the assigned target. This is an important issue because gram panchayat elections have been declared in Karnataka and lots of youngsters set off for campaigning early in the morning and would be difficult to locate for profiling.&lt;/p&gt;
&lt;p&gt;According to official figures, Chelur has a population of 5,000, with 3,640 people above the age of 18. A random selection&amp;nbsp; of 2,400 has been made from this to meet the UID target. The number seems small, but handling it at the village level can be demanding for the local authorities—there’s no police for crowd control, refreshments have to be distributed and the computerised work has to be done despite the power outages. Using generators has become inevitable, for the villages get hardly four or five hours’ power supply.&lt;/p&gt;
&lt;p&gt;Another problem lies in obtaining the fingerprints of rural folk: most of them are engaged in manual labour or farm work and arrive with dirty palms that defeat the biometric reading machines. Pails of water, detergent and towels are provided for cleaning up. Much time is lost in such rescanning and it goes against the official&amp;nbsp; estimate of five minutes for the young, nine for the elderly.&lt;/p&gt;
&lt;p&gt;Prasanna Kumar, the village secretary, admits to the problems. “We did not make an open announcement for the UID pilot because we didn’t want to attract large crowds. We quietly prepared a random list of 2,400 people from the ration card database and went door-to-door to invite them,” he says. “We have left out people above the age of 80 and under 18. We told people this identity number will help them access various government schemes. Fingerprinting is the toughest problem. Initially people were reluctant, but suddenly they have become curious.”&lt;/p&gt;
&lt;p&gt;H. Gnanesh, the tehsildar, says the ongoing step is only “concept testing”; the next will be rechecking, in which those already profiled will verify their identity details against what has been stored. Only after that will the UID be issued. In Chelur village, the concept testing ended on May 4;&amp;nbsp; rechecking began the very next day.&lt;/p&gt;
&lt;p&gt;Some NGOs observing the process have noted the lack of awareness in villagers. “They are clueless about what they are taking part in,” say Mahadev Prasad and Murthy, of the Basava Seva Trust. Murthy says fingerprinting is a big problem. He speaks of Hommaragalli, in Mysore district, where some foreign experts had to be called in to take a look at the scanning machines.&lt;/p&gt;
&lt;p&gt;Then there are larger issues. Away from the surging crowds in Chelur, civil society organisations like the Centre for Internet &amp;amp; Society, the Alternative Law Forum and PUCL have been demanding greater dialogue. In fact, they have even suggested a review of the scheme. They argue there is no clarity on how the government proposes to store and secure personal and biometric data, given the fact that various agencies such as banks, telecom companies and government departments would potentially access it. Security is a huge concern also because the software, hardware and expertise of foreign companies is being used. These NGOs say the UID data, the National Population Registry and the NATGRID, when connected, could prove a grave threat to civil liberties.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“First, a centralised database, like the UID will create, has never been safe,” says Sunil Abraham of CIS. “It needs to be decentralised like our various mail servers. Second, we feel the collection of biometric data is happening at the wrong end of the pyramid. Instead of putting the poor through the process first, why not start with those with financial dealings of Rs 1 crore and above. Third, one study says 48 per cent of our people cannot remember a 12-digit ID. Fourth, we need privacy laws in place before the UID regime sets in.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Those problems apart, even raising the level of the current exercise—from small samples of a few thousand each to profiling the billion-plus population of India—could place severe demands on our shaky administration. There’s a mountain to be moved.&lt;/p&gt;
&lt;p&gt;Read the original article in the &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?265326"&gt;Outlook&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/biometry-is-watching'&gt;https://cis-india.org/news/biometry-is-watching&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T12:08:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/what-women-want">
    <title>What Women Want: The ability debates</title>
    <link>https://cis-india.org/news/what-women-want</link>
    <description>
        &lt;b&gt;In this article published in the Hindu, Deepa Alexander argues that the proposed amendments to the Copyright Act (1957) are restrictive and discriminatory.&lt;/b&gt;
        
&lt;p&gt;The triumphs and disasters of the differently-abled in India are two ends of the spectrum. Among the 70 million disabled in our country are those who have conquered peaks, won gold at the Paralympics, and raced in Himalayan and desert car rallies. But, millions more struggle to meet daily challenges in a society that tends to portray the disabled as either heroes or victims with little or no access to their rightful resources. The proposed amendments to the Copyright Act (1957) are seen as restrictive and discriminatory, as the copyright exception, which aims at allowing persons with disability easy access to copyrighted material, applies only to certain types of disability. We spoke to activists who address these issues, not as charity or welfare but as matters of development and dignity.&lt;/p&gt;
&lt;h3&gt;Change in attitude &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;National Trust's programmes work on building capacity, changing patronising attitudes, building trust in the abilities of people with developmental disability and creating an equal playing field. Unfortunately, deeply entrenched attitudes continue to exclude people with disabilities. Even if an opportunity is given, it is given only once; if a person with disability fails, incapacity is assumed.&lt;br /&gt;&lt;br /&gt;But, in the recent case of a young woman with intellectual disability who had been raped in a women's home, the Supreme Court upheld her right to ‘choose' to keep her baby, and she has proved to be a competent mother. However, the disapproval of the intelligentsia in the media is an indicator of the social prejudices people with disabilities have to live with.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Poonam Natarajan, Chairperson, National Trust (Ministry of Social Justice and Empowerment), New Delhi&lt;/p&gt;
&lt;h3&gt;Implement their rights&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;Ability Foundation's thrust is on creating an equitable society. Through our magazine Success &amp;amp; Ability, we spread this message at a time when service to the disabled was seen only at the physical, and not at the emotional level. Persons with disabilities need access to inclusive education, employment and public places. Being ‘accounted' in the Census 2011 will open up a plethora of possibilities. Accurate data will enable Government intervention at various levels, leading to proactive action. We need ramps for wheelchair users, audio announcements in bus / train stations for the visually-impaired, and video announcements for the hearing-impaired. Floor numbers in Braille for lifts, sign language interpreters in every hospital, police station and court of law, slip-proof flooring in malls, and large-print books in public libraries for those with low vision are the other needs. The implementation of the rights of persons with disabilities as per the United Nations convention and the Persons with Disabilities Act (PWD), in letter and spirit, is also essential.&lt;/p&gt;
&lt;p&gt;Jaysheree Ravindran, Founder and Honorary Executive Director, Ability Foundation, Chennai&lt;/p&gt;
&lt;h3&gt;A development issue&lt;/h3&gt;
&lt;p&gt;My daughter Tamana was born with cerebral palsy. It pushed me to found an organisation in 1984 to fulfil the dreams of children with special needs and those of their parents. Therapy and counselling for children and their families is essential for optimum adult rehabilitation. Since Independence, the disabled have been categorised along with sections such as women, Scheduled Castes and Scheduled Tribes. While these have had powerful political lobbies, there has been no spokesperson for the disabled. The dichotomies between the Ministries of Education and Social Justice further worsen the exclusion. Most policy-makers look at disability as a welfare, not a development issue. Disability should be jointly addressed by the Ministries of Health, Women and Child Development, HRD, Social Justice and Empowerment. The definition of disability in the PWD Act does not include autism, which leaves out nearly two million autistic persons in India. Admitting disabled children in normal schools is not enough — you need to have professionally trained staff, who are sensitised. I also hope for a different curriculum for special children, even as they are being integrated in the mainstream. Better pay scales will also bring in more jobs in the disability sector.&lt;/p&gt;
&lt;p&gt;Dr. Shyama Chona, President, Tamana, New Delhi&lt;/p&gt;
&lt;h3&gt;Public-private partnership&lt;/h3&gt;
&lt;p&gt;NGO-run establishments provide free schooling for disabled children. The Government has provided legislative intent through the Inclusive Education Act, which makes it mandatory to include all kinds of impaired children. However, Government schools that cater to the poor are generally marked by grossly inadequate infrastructure and teaching aids, so imagine the predicament of the disabled.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I would like a public-private partnership for day-care and residential institutions which provide educational and recreational service on a long-term basis. This needs to be supported by research institutions which focus on technology, communication and teaching aids. We need to benefit from global expertise, and customise them to local needs.&lt;/p&gt;
&lt;p&gt;As Childline's primary mandate is child protection, I feel that the Government must compulsorily provide for a child protection policy in any institution that deals with disabled children, as, such children are more vulnerable to abuse.&lt;/p&gt;
&lt;p&gt;Kajol Menon, Executive Director, Childline India Foundation, Mumbai&lt;/p&gt;
&lt;h3&gt;The copyright angle&lt;/h3&gt;
&lt;p&gt;The Centre for Internet and Society is associated with the copyright amendment movement for persons with disabilities, and is one of the founding organisations for the Indian Right to Read campaign. At present, the proposed copyright amendment is detrimental to the disability sector's needs. The exception extends only to ‘specially designed' formats such as Braille and sign language, and does not benefit the millions who have cerebral palsy, dyslexia and low vision, and the visually-impaired persons who do not know Braille. Such persons require audio, reading material with large fonts and electronic texts, which are not ‘specially designed' formats. For conversion to non-specialised formats, the amendment proposes a licensing system, which will permit only organisations working for the benefit of the disabled to undertake conversion and distribution. This will prevent educational institutions, SHGs, other NGOs and print-disabled individuals from undertaking conversion. The licensing system will also require approaching the Copyright Board for each work, which will be extremely time-consuming. The waiting period for obtaining permissions and subsequent conversion will result in students losing academic years, a violation of their right to education.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The proposed amendment violates the Constitutional guarantee of equality under Article 14 since it discriminates between those visually-impaired persons who know Braille and those print-disabled persons who do not. It is important for the nation as a whole to take the concern of persons with disabilities as a mainstream concern.&lt;/p&gt;
&lt;p&gt;Nirmita Narasimhan, Programme Manager, Centre for Internet and Society, Bangalore&lt;/p&gt;
&lt;p&gt;Read the original article in the &lt;a class="external-link" href="http://beta.thehindu.com/life-and-style/metroplus/article420517.ece"&gt;Hindu&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/what-women-want'&gt;https://cis-india.org/news/what-women-want&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-04-02T12:08:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/tpm-copyright-amendment">
    <title>Technological Protection Measures in the Copyright (Amendment) Bill, 2010</title>
    <link>https://cis-india.org/a2k/blogs/tpm-copyright-amendment</link>
    <description>
        &lt;b&gt;In this post Pranesh Prakash conducts a legal exegesis of section 65A of the Copyright (Amendment) Bill, 2010, which deals with the stuff that enables 'Digital Rights/Restrictions Management', i.e., Technological Protection Measures.  He notes that while the provision avoids some mistakes of the American law, it still poses grave problems to consumers, and that there are many uncertainties in it still.&lt;/b&gt;
        &lt;p&gt;&lt;a href="http://www.wipo.int/enforcement/en/faq/technological/faq03.html"&gt;Technological Protection Measures&lt;/a&gt; are sought to be introduced in India via the Copyright (Amendment) Bill, 2010.  This should be quite alarming for consumers for reasons that will be explained in a separate blog post on TPMs that will follow shortly.&lt;/p&gt;
&lt;p&gt;In this post, I will restrict myself to a legal exegesis of section 65A of the Bill, which talks of "protection of technological measures".  (Section 65B, which talks of Right Management Information will, similarly, be tackled in a later blog post.)&lt;/p&gt;
&lt;p&gt;First off, this provision is quite unnecessary.  There has been no public demand in India for TPMs to be introduced, and the pressure has come mostly from the United States in the form of the annual "Special 301" report prepared by the United States Trade Representative with input coming (often copied verbatim) from the International Intellectual Property Alliance.  India is not a signatory to the WIPO Copyright Treaty (WCT) which requires technological protection measures be safeguarded by law.  That provision, interestingly, was pushed for by the United States in 1996 when even it did not give legal sanctity to TPMs via its copyright law (which was amended in 2000 by citing the need to comply with the WCT).&lt;/p&gt;
&lt;p&gt;TPMs have been roundly criticised, have been shown to be harmful for consumers, creators, and publishers, and there is also evidence that TPMs do not really decrease copyright infringement (but instead, quite perversely through unintended consequences, end up increasing it).  Why then would India wish to introduce it?&lt;/p&gt;
&lt;p&gt;Leaving that question aside for now, what does the proposed law itself say?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;65A. Protection of Technological Measures &lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(1) Any person who circumvents an effective technological measure applied for the purpose of protecting any of the rights conferred by this Act, with the intention of infringing such rights, shall be punishable with imprisonment which may extend to two years and shall also be liable to fine.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(2) Nothing in sub-section (1) shall prevent any person from:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(a) doing anything referred to therein for a purpose not expressly prohibited by this Act:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Provided that any person facilitating circumvention by another person of a technological measure for such a purpose shall maintain a complete record of such other person including his name, address and all relevant particulars necessary to identify him and the purpose for which he has been facilitated; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(b) doing anything necessary to conduct encryption research using a lawfully obtained encrypted copy; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(c) conducting any lawful investigation; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(d) doing anything necessary for the purpose of testing the security of a computer system or a computer network with the authorisation of its owner; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(e) operator; or [&lt;em&gt;sic&lt;/em&gt;]&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(f) doing anything necessary to circumvent technological measures intended for identification or surveillance of a user; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(g) taking measures necessary in the interest of national security.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h1&gt;Implications: The Good Part&lt;/h1&gt;
&lt;p&gt;This provision clearly takes care of two of the major problems with the way TPMs have been implemented by the Digital Millennium Copyright Act (DMCA) in the United States:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;In s.65A(1) it aligns the protection offered by TPMs to that offered by copyright law itself (since it has to be "applied for the purpose of protecting any of the rights conferred by this Act").  Thus, presumably, TPMs could not be used to restrict &lt;em&gt;access&lt;/em&gt;, only to restrict copying, communication to the public, and that gamut of rights.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In s.65A(1) and 65A(2) it aligns the exceptions granted by copyright law with the exceptions to the TPM provision.  Section 65A(1) states that the act of circumvention has to be done "with the intention of infringing ... rights", and s.52(1) clearly states that those exceptions cannot be regarded as infringement of copyright.  And s.65A(2)(a) states that circumventing for "a purpose not expressly prohibited by this Act" will be allowed.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A third important difference from the DMCA is that&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It does not criminalise the manufacture and distribution of circumvention tools (including code, devices, etc.).  (More on this below.)&lt;/li&gt;
&lt;/ul&gt;
&lt;h1&gt;Implications: The Bad Part&lt;/h1&gt;
&lt;p&gt;This provision, despite the seeming fair-handed manner in which it has been drafted, still fails to maintain the balance that copyright seeks to promote:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;TPM-placers (presumably, just copyright holders, because of point 1. above) have been given the ability to restrict the activities of consumers, but they have not been given any corresponding duties.  Thus, copyright holders do not have to do anything to ensure that the Film &amp;amp; Telivision Institute of India professor who wishes to use a video clip from a Blu-Ray disc can actually do so.  Or that the blind student who wishes to circumvent TPMs because she has no other way of making it work with her screen reader is actually enabled to take advantage of the leeway the law seeks to provide her through s.52(1)(a) (s.52(1)(zb) is another matter!).  Thus, while there are many such exceptions that the law allows for, the technological locks themselves prevent the use of those exceptions.  Another way of putting that would be to say:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The Bill presumes that every one has access to all circumvention technology.  This is simply not true.  In fact, Spanish law (in &lt;a href="http://noticias.juridicas.com/base_datos/Admin/rdleg1-1996.l3t5.html"&gt;Article 161 of their law&lt;/a&gt;) expressly requires that copyright holders facilitate access to works protected by TPM to beneficiaries of limitations of copyright.   Thus, copyright holders who employ TPMs should be required to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;tell their customers how they can be contacted if the customer wishes to circumvent the TPM for a legitimate purpose&lt;/li&gt;
&lt;li&gt;upon being contacted, aid their customer in making use of their rights / the exceptions and limitations in copyright law&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How seriously can you take a Bill that has been introduced in Parliament that includes a provision that states: "Nothing in sub-section (1) shall prevent any person from operator; or" (as s.65A(2)(e), read in its entirety, does)?&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h1&gt;Uncertainties&lt;/h1&gt;
&lt;p&gt;As mentioned above, the provisions are not all that clear regarding manufacture and distribution of circumvention tools.  Thus, the proviso to s.65A(2)(a) deserves a closer reading.  What is clear is that there are no penalties mentioned for manufacture or dissemination of TPMs, and that only those who &lt;em&gt;circumvent&lt;/em&gt; are penalised in 65A(1), and not those who produce the circumvention devices.  However:&lt;/p&gt;
&lt;h2&gt;On "shall maintain" and penalties&lt;/h2&gt;
&lt;p&gt;In the proviso to s.65B(2)(a), there is an imperative ("shall maintain") requiring "any person facilitating circumvention" to keep records.  It
is unclear what the implications of not maintaining such records are.&lt;/p&gt;
&lt;p&gt;The obvious one is that the exemption contained in s.65(1)(a) will not apply if one were facilitated without the facilitator keeping records.  Thus, under this interpretation, there is no independent legal (albeit penalty-less) obligation on facilitators.  This interpretation runs into
the problem that if this was the intention, then the drafters would have written "Provided that any person facilitating circumvention ... for
such a purpose &lt;em&gt;maintain&lt;/em&gt;/&lt;em&gt;maintained&lt;/em&gt; a complete record ...".  Instead, &lt;em&gt;shall maintain&lt;/em&gt; is used, and an independent legal obligation seems,
thus, to be implied.  But can a proviso create an independent legal obligation?  And is there any way a penalty could &lt;em&gt;possibly&lt;/em&gt; be attached
to violation of this proviso despite it not coming within 65A(1)?&lt;/p&gt;
&lt;h2&gt;On "facilitating" and remoteness&lt;/h2&gt;
&lt;p&gt;The next question is who all can be said to "facilitate", and how remote can the connection be?  Is the coder who broke the circumvention a
facilitator?  The distributor/trafficker?  The website which provided you the software?  Or is it (as is more likely) a more direct "the friend who sat at your computer and installed the circumvention software" / "the technician who unlocked your DVD player for you while installing it in your house"?&lt;/p&gt;
&lt;p&gt;While such a record-keeping requirement is observable by people those who very directly help you (the last two examples above), it would be more difficult to do so the further up you get on the chain of remoteness.  Importantly, such record-keeping is absolutely not possible in decentralized distribution models (such as those employed by most free/open source software), and could seriously harm fair and legitimate circumvention.&lt;/p&gt;
&lt;h1&gt;More uncertainties&lt;/h1&gt;
&lt;p&gt;It is slightly unclear which exception the bypassing of Sony's dangerous "Rootkit" copy protection technology would fall under if I wish to get rid of it simply because it makes my computer vulnerable to malicious attacks (and not to exercise one of the exceptions under s.52(1)).  Will such circumvention come under s.65A(2)(a)?  Because it does not quite fall under any of the others, including s.65(2)(b) or (f).&lt;/p&gt;
&lt;h2&gt;On "purpose" as a criterion in 65A(2)(a)&lt;/h2&gt;
&lt;p&gt;A last point, which is somewhat of an aside is that 65A(2)(a) states:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Nothing in sub-section (1) shall prevent any person from doing anything referred to therein for a purpose not expressly prohibited by this Act.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There's something curious about the wording, since the Copyright Act generally does not prohibit any acts based on purposes (i.e., the prohibitions by ss.14 r/w s.51 are not based on &lt;em&gt;why&lt;/em&gt; someone reproduces, etc., but on the act of reproduction).  In fact, it &lt;em&gt;allows&lt;/em&gt; acts based on purposes
(via s.52(1)).  The correct way of reading 65A(2)(a) might then be:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Nothing in sub-section (1) shall prevent any person from doing anything referred to therein for a purpose expressly allowed by this Act.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;But that might make it slightly redundant as s.65A(1) covers that by having the requirement of the circumvention being done "with the intention of infringing such right" (since the s.52(1) exceptions are clearly stated as not being infringements of the rights granted under the Act).&lt;/p&gt;
&lt;h1&gt;Conclusion&lt;/h1&gt;
&lt;p&gt;It would be interesting to note how leading copyright lawyers understand this provision, and we will be tracking such opinions.  But it is clear that TPMs, as a private, non-human enforcement of copyright law, are harmful and that we should not introduce them in India.  And we should be especially wary of doing so without introducing additional safeguards, such as duties on copyright holder to aid access to TPM'ed works for legitimate purposes, and remove burdensome record-keeping provisions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/tpm-copyright-amendment'&gt;https://cis-india.org/a2k/blogs/tpm-copyright-amendment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>FLOSS</dc:subject>
    
    
        <dc:subject>Technological Protection Measures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2012-05-17T16:51:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/when-copyright-goes-bad">
    <title>When Copyright Goes Bad</title>
    <link>https://cis-india.org/a2k/blogs/when-copyright-goes-bad</link>
    <description>
        &lt;b&gt;A part of the Access to Knowledge Project, this short film by Consumers International is available on DVD and online at A2Knetwork.org/film. &lt;/b&gt;
        
&lt;p&gt;For centuries, copyright law has existed to protect creative production whilst promoting public access. But the digital age is challenging this balance and fundamentally changing how we produce, access and distribute content. Suddenly, copyright rules no longer do what they are supposed to do. They have gone bad.&lt;/p&gt;
&lt;p&gt;This is a film about how copyright has become one of the most important consumer issues of the digital age; why corporate lobbying risks criminalising the actions of hundreds of thousands of people; and what the future holds for the fight for fairer copyright laws.&lt;/p&gt;
&lt;p&gt;When Copyright Goes Bad is an introduction to the renegotiation of copyright and is for anyone interested in how copyright is affecting consumers. It features some of the key players in the copyright debate, including: Fred Von Lohmann - Electronic Frontier Foundation; Michael Geist - University of Ottawa Law School; Jim Killock - Open Rights Group; and Hank Shocklee - Co-founder of Public Enemy.&lt;/p&gt;
&lt;h3&gt;Quotes from When Copyright Goes Bad&lt;br /&gt;&lt;/h3&gt;
&lt;blockquote&gt;“People have realised that copyright affects them every day and the direction that we’ve seen over the last few years really troubles them.&amp;nbsp; That’s why so many people are speaking out.” Michael Geist&lt;br /&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;“In the U.S, over 35,000 Americans were targeted for lawsuits for downloading music.&amp;nbsp; In ten years time, everyone will look back at that as incredibly unjust and ridiculous.&amp;nbsp; No-one thinks that suing music fans one at a time is the business model of the future.” Fred Von Lohmann&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;“The industry is trying to demonise consumer behaviour.&amp;nbsp; They’re trying to create the idea that it’s a moral debate: is downloading something wrong or right?&amp;nbsp; Is it theft or not?&amp;nbsp; These are the wrong questions and they will only ever produce the wrong answers.” Jim Killock&lt;br /&gt;&lt;/blockquote&gt;
&lt;h3&gt;Making copyright, right&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;When Copyright Goes Bad is being released under a Creative Commons (CC) licence, which means it’s free to copy and adapt, as long as content is attributed and the same CC licence is used. &lt;br /&gt;We will also be making available extended interviews with all the contributors, as well as with other experts not featured in the film, under the same CC licence at A2Knetwork.org/film. By providing access in this way we are allowing others to go on and create further work around the issue. &lt;br /&gt;&lt;br /&gt;View it on &lt;a class="external-link" href="http://www.youtube.com/user/ConsumersIntl#p/u/0/mBfgmN2gwu0"&gt;youtube&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/when-copyright-goes-bad'&gt;https://cis-india.org/a2k/blogs/when-copyright-goes-bad&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-08-04T04:37:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2010-bulletin">
    <title>April 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! We bring you updates of our research, events and news for the month of April 2010.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;News Updates &lt;/b&gt;&lt;/h2&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;Worries voiced over ID Project&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The Government of India's Unique Identification (UID) Project came under flak at a workshop organised jointly by the Citizen Action Forum (CAF), the People's Union of Civil Liberties - Karnataka, the Alternative Law Forum and the Centre for Internet and Society - An article in The Hindu - 17th April.&lt;br /&gt; &lt;a href="https://cis-india.org/news/worries-voiced-over-id-project" target="_blank"&gt;http://cis-india.org/news/worries-voiced-over-id-project&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;UID: A debate on the Fundamental Rights&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;UID: A debate on the Fundamental Rights - was jointly organized by the Citizen Action Forum, People's Union for Civil Liberties - Karnataka, Alternative Law Forum and the Centre for Internet and Society on April 16th at IAT, Queens Road, Bangalore - An article in the Prajavani news paper - April 17th. &lt;br /&gt; &lt;a href="https://cis-india.org/news/uid-a-debate-on-fundamental-rights" target="_blank"&gt;http://cis-india.org/news/uid-a-debate-on-fundamental-rights&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;UID is an invasion of Privacy: Experts&lt;/b&gt;&lt;br /&gt; The Nandan Nilekani headed Unique Identification Authority of India (UIDAI) came in for much criricism at the first of a series of debates on the issue organised in the city on Friday - Deccan Chronicle, April 17th.&lt;br /&gt; &lt;a href="https://cis-india.org/news/uid-is-an-invasion-of-privacy-experts" target="_blank"&gt;http://cis-india.org/news/uid-is-an-invasion-of-privacy-experts&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Experts debate on UID and rights &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Bangalore, Apr 16, DHNS: A debate on ‘UID and Fundamental Rights’ organised by several city-based organisations, discussed the social, ethical issues, economic and legal issues that accompanies the UID. &lt;br /&gt; &lt;a href="https://cis-india.org/news/experts-debate-on-uid-and-rights" target="_blank"&gt;http://cis-india.org/news/experts-debate-on-uid-and-rights&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Amendment to Copyright Act opposed &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;A report on the press conference held on 15th April, at the Press Club, Bangalore: The Hindu &lt;br /&gt; &lt;a href="https://cis-india.org/news/amendment-to-copyright-act-opposed" target="_blank"&gt;http://cis-india.org/news/amendment-to-copyright-act-opposed&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;They fight for the visually challenged &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Times News Network - A report on the press conference held at the Press Club, Bangalore on 15th April, 2010. &lt;br /&gt; &lt;a href="https://cis-india.org/news/they-fight-for-the-visually-challenged" target="_blank"&gt;http://cis-india.org/news/they-fight-for-the-visually-challenged&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Digital Natives Research Project Coordinator &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The Centre for Internet and Society, Bangalore, in collaboration with Hivos Netherlands, is looking for a Research Project Coordinator to help develop a knowledge network and coordinate international workshops for the project "Digital Natives with a Cause?" &lt;br /&gt; &lt;a href="https://cis-india.org/news/research-coordinator" target="_blank"&gt;http://cis-india.org/news/research-coordinator&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Expel or not? That is the question &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The decision of an international school to expel 14 students for their alleged ‘promiscuous’ behaviour has led to much debate and discussion. &lt;br /&gt; &lt;a href="https://cis-india.org/news/expel-or-not" target="_blank"&gt;http://cis-india.org/news/expel-or-not&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Nokia eyes GeNext to tap mobile email mkt &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Finnish handset giant banks on youth to be in the technology race &lt;br /&gt; &lt;a href="https://cis-india.org/news/nokia-eyes-genNext" target="_blank"&gt;http://cis-india.org/news/nokia-eyes-genNext&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Critical Point of View: Videos &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The Second event for the Critical Point of View reader on Wikipedia was held in Amsterdam, by the Institute of Network Cultures and the Centre for Internet and Society. A wide range of scholars, academics, researchers, practitioners, artists and users came together to discuss questions on design, analytics, access, education, theory, art, history and processes of knowledge production. The videos for the full event are now available for free viewing and dissemination.&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Colour Me Political &lt;/b&gt;&lt;br /&gt; What are the tools that Digital Natives use to mobilise groups towards a particular cause? How do they engage with crises in their immediate environments? Are they using their popular social networking sites and web 2.0 applications for merely entertainment? Or are these tools actually helping them to re-articulate the realm of the political? Nishant Shah looks at the recent Facebook Colour Meme to see how new forms of political participation and engagement are being initiated by young people across the world.&lt;br /&gt; &lt;a href="https://cis-india.org/research/dn/dn2" target="_blank"&gt;http://cis-india.org/research/dn/dn2&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Meet the Web 2.0 Suicide Machine&lt;/b&gt;&lt;br /&gt;Digital Natives live their lives differently. But sometimes, they also die their lives differently! What happens when we die online? Can the digital avatar die? What is digital life? The Web 2.0 Suicide machine that has now popularly been called the 'anti-social-networking' application brings some of these questions to the fore. As a part of the Hivos-CIS "Digital Natives with a Cause?" research programme, Nishant Shah writes about how Life on the Screen is much more than just a series of games. &lt;br /&gt; &lt;a href="https://cis-india.org/research/dn/dn1" target="_blank"&gt;http://cis-india.org/research/dn/dn1&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Digital Natives with a Cause? &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Digital Natives With A Cause? - a product of the Hivos-CIS collaboration charts the scholarship and practice of youth and technology with a specific attention for developing countries to create a framework that consolidates existing paradigms and informs further research and intervention within diverse contexts and cultures. &lt;br /&gt; &lt;a href="https://cis-india.org/research/dn/dnrep" target="_blank"&gt;http://cis-india.org/research/dn/dnrep&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Advocacy&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;e-Accessibility: A Wiki Project &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Envisaged and funded by the National Internet Exchange of India, and executed by the Centre for Internet and Society, a Wiki site pertaining to issues of disability and e-accessibility has recently been launched. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/accessibility/blog/e-accessibility-a-wiki-project" target="_blank"&gt;http://cis-india.org/advocacy/accessibility/blog/e-accessibility-a-wiki-project&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Copyright Law as a tool for Inclusion &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Can Copyright Law be used as a tool for Inclusion? Rahul Cherian examines this in his blog on copyright. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/accessibility/blog/copyright-law-as-tool-for-inclusion" target="_blank"&gt;http://cis-india.org/advocacy/accessibility/blog/copyright-law-as-tool-for-inclusion&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Web Accessibility as a Government Mandate?&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;/span&gt;Is Web accessibility just a Government Mandate? Should private sites be ignored? Wesolowski examines this in light of the steps taken by ictQATAR to make its website accessible to W3C standards, and hopes that Qatar and eventually all other Arab nations will follow suit and make Web accessibility much more of a mandate. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/accessibility/blog/web-accessibility-government-mandate" target="_blank"&gt;http://cis-india.org/advocacy/accessibility/blog/web-accessibility-government-mandate&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;When Copyright Goes Bad &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;A part of the Access to Knowledge Project, this short film by Consumers International is available on DVD and online at A2Knetwork.org/film. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/ipr/blog/when-copyright-goes-bad" target="_blank"&gt;http://cis-india.org/advocacy/ipr/blog/when-copyright-goes-bad&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;Research Project on Open Video in India &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Open Video Alliance and the Centre for Internet and Society are calling for researchers for a project on open video in India, its potentials, limitations, and recommendations on policy interventions. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/openness/blog/open-video-research" target="_blank"&gt;http://cis-india.org/advocacy/openness/blog/open-video-research&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Does the Social Web need a Googopoly?&lt;/b&gt;&lt;br /&gt;While the utility of the new social tool Buzz is still under question, the bold move into social space taken last week by the Google Buzz team has Gmail users questioning privacy implications of the new feature. In this post, I posit that Buzz highlights two privacy challenges of the social web. First, the application has sidestepped the consensual and contextual qualities desirable of social spaces. Secondly, Google’s move highlights the increasingly competitive and convergent nature of the social media landscape. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/openness/blog/does-the-social-web-need-a-googopoly" target="_blank"&gt;http://cis-india.org/advocacy/openness/blog/does-the-social-web-need-a-googopoly&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;The (in)Visible Subject: Power, Privacy and Social Networking &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;In this entry, I will argue that the interplay between privacy and power on social network sites works ultimately to subject individuals to the gaze of others, or to alternatively render them invisible. Individual choices concerning privacy preferences must, therefore, be informed by the intrinsic relationship which exists between publicness/privateness and subjectivity/obscurity. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/openness/blog/the-in-visible-subject-power-privacy-and-social-networking" target="_blank"&gt;http://cis-india.org/advocacy/openness/blog/the-in-visible-subject-power-privacy-and-social-networking&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;Does the Safe-Harbor Program Adequately Address Third Parties Online? &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data. Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/igov/blog/does-the-safe-harbor-program-adequately-address-third-parties-online" target="_blank"&gt;http://cis-india.org/advocacy/igov/blog/does-the-safe-harbor-program-adequately-address-third-parties-online&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Sense and censorship &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Sunil Abraham examines Google's crusade against censorship in China in wake of the attacks on its servers in this article published in the Indian Express. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/igov/blog/sense-and-censorship" target="_blank"&gt;http://cis-india.org/advocacy/igov/blog/sense-and-censorship&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Report on the Fourth Internet Governance Forum for Commonwealth IGF &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;This report by Pranesh Prakash reflects on the question of how useful is the IGF in the light of meetings on the themes of intellectual property, freedom of speech and privacy. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/igov/blog/report-on-fourth-IGF" target="_blank"&gt;http://cis-india.org/advocacy/igov/blog/report-on-fourth-IGF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;The Right Ring Tone &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Focus on improving service quality with a strong partner, and not on one-shot stake sales, says Shyam Ponappa in his article published in the Business Standard on April 1, 2010. &lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/ring-tone" target="_blank"&gt;http://cis-india.org/advocacy/telecom/blog/ring-tone&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Other Advocacy&lt;/b&gt;&lt;/h2&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;Maps for Making Change Wiki Now Open to the Public &lt;/b&gt;&lt;br /&gt; Since December 2009, CIS has been coordinating and nurturing the Maps for Making Change project, organised in collaboration with Tactical Tech. During the past four months, participants have been on a challenging yet fertile and inspiring journey that is now slowly coming to an end. Would you like to know more about what has happened in the time that has passed? The Maps for Making Change wiki is a good place to start. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/others/maps-for-making-change-wiki-now-open-to-the-public" target="_blank"&gt;http://cis-india.org/advocacy/others/maps-for-making-change-wiki-now-open-to-the-public&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2010-bulletin'&gt;https://cis-india.org/about/newsletters/april-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-08-13T04:51:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online">
    <title>Does the Safe-Harbor Program Adequately Address Third Parties Online?</title>
    <link>https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online</link>
    <description>
        &lt;b&gt;While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data.  Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem. &lt;/b&gt;
        
&lt;p&gt;To date, the EU-US Safe Harbor Program leads in governing
the complex and multi-directional flows of personal information online. &amp;nbsp;&amp;nbsp;As commerce began to thrive in the online
context, the European Union was faced with the challenge of ensuring that personal
information exchanged through online services were granted
levels of protect on par with provisions set out in EU privacy law.&amp;nbsp; This was important, notably as the piecemeal
and sectoral approach to privacy legislation in the United states was deemed incompatible
with the EU approach.&amp;nbsp; While the Safe
Harbor program did not aim to protect the privacy of citizens outside of the
European Union per say, the program has in practice set minimum standards for
online data privacy due to the international success of American online
services.&lt;/p&gt;

&lt;p&gt;While many citizens outside of the US and EU benefit from
the Safe Harbor Program, it remains unclear how successful the program will be in an
online ecosystem where third-parties are being granted increasingly more rights
over the data they receive from first parties.&amp;nbsp;
Using Facebook as a site of analysis, I will attempt to shed light on
the deficiencies of the framework for addressing the complexity of data flows
in the online ecosystem.&amp;nbsp; First, I will argue
that the safe harbor program does not do enough to ensure that participants are
held reasonably responsible third party privacy practices.&amp;nbsp; Second, I will argue that the information
asymmetries created between first party sites, citizens, and governance bodies
vis-à-vis third parties obscures the application of the Safe Harbor Model.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The EU-US
Safe-Harbor Agreement&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In 1995, and based on earlier &lt;a href="http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html"&gt;OECD
guidelines&lt;/a&gt;, the EU Data Directive on the “protection of individuals with
regard to the processing of personal data and the free movement of such data”
was passed&lt;a name="_ednref1" href="#_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [1].&amp;nbsp; The original purpose of the EU Privacy
Directive was not only to increase privacy protection within the European
Union, but to also promote trade liberalization and a single integrated market
in the EU.&amp;nbsp; After the Data Directive was
passed, each member state of the EU incorporated the principles of
the directive into national laws accordingly.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the Directive was successful in harmonizing data
privacy in the European Union, it also embodied extraterritorial
provisions, giving in reach&lt;a name="_ednref2" href="#_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; beyond the EU.&amp;nbsp; Article 25 of the Directive states that the
EU commission may ban data transfers to third countries that do not ensure “an
adequate level of protect’ of data privacy rights&lt;a name="_ednref3" href="#_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [2].&amp;nbsp; Also, Article 26 of the Directive, expanding
on Article 25, states that personal data cannot be &lt;em&gt;transferred &lt;/em&gt;to a country that “does not ensure an adequate level of
protection” if the data controller does not enter into a contract that adduces
adequate privacy safeguards&lt;a name="_ednref4" href="#_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [3].
&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In light of the increased occurrence of cross-border
information flows, the Data Directive itself was not effective enough to ensure that
privacy principles were enforced outside of the EU.&amp;nbsp; Articles 25 and 26 of the Directive had essentially deemed all cross-border data-flows to the US in contravention of EU privacy law.&amp;nbsp; Therefor, the EU-US Safe-Harbor was established by the
EU Council and the US Department of Commerce as a way of mending the variant
levels of privacy protection set out in these jurisdictions, while also promoting
online commerce.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Social Networking
Sites and the Safe-Harbor Principles&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The case of social networking sites exemplifies the ease
with which data is transferred, processed, and stored between jurisdictionas.&amp;nbsp; While many of the top social networking sites
are registered American entities, they continue to attract users not only from
the EU, but also internationally.&amp;nbsp; In agreement
to the EU law, many social networking sites, including LinkedIn, Facebook,
Myspace, and Bebo, now adhere to the principles of the program.&amp;nbsp; The enforcement of the Safe Harbor takes
place in the United States in accordance with U.S. law and relies, to a great
degree, on enforcement by the private sector.&amp;nbsp;
TRUSTe, an independent certification program and dispute mechanism, has become the most popular governance mechanism for the safe harbor program
among social networking sites.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Drawing broadly on the principles embodied within the EU
Data Directive and the OECD Guidelines, the seven principles of the Safe-Harbor
were developed.&amp;nbsp; These principles include
Notice, Choice, Onward Transfer, Access and Accuracy, Security, Data Integrity
and Enforcement.&amp;nbsp;&amp;nbsp; The principle of “Notice”
sets out that organizations must inform individuals about the purposes for
which it collects and uses information about them, how to contact the
organization with any inquiries or complaints, the types of third parties to
which it disclosures the information, and the choices and means the organization
offers individuals for limiting its use and disclosure.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“Choice” ensures that individuals have the opportunity to
choose to opt out whether their personal information is disclosed to a third
party, and to ensure that information is not used for purposes incompatible with the purposes for
which it was originally collected.&amp;nbsp; The
“Onward Transfer” principle ensures that third parties receiving information
subscribes to the Safe Harbor principles, is subject to the Directive, or
enters into a written agreement which requires that the third party provide at
least the same level of privacy protection as is requires by the relevant
principles.&lt;/p&gt;
&lt;p&gt;The principles of “Security” and “Data Integrity” seek to
ensure that reasonable precautions are taken to protect the loss or misuse of
data, and that information is not used in a manner which is incompatible with
the purposes for it is has been collected—minimizing the risk that personal
information would be misused or abused.&amp;nbsp;&amp;nbsp;&amp;nbsp;
Individuals are also granted the right, through the access principle, to
view the personal information about them that an organization holds, and to
ensure that it is up-to-date and accurate.&amp;nbsp;
The “Enforcement” principle works to ensure that an effective mechanism
for assuring compliance with the principles, and that there are consequences
for the organization when the principles are not followed.&lt;/p&gt;
&lt;p&gt;The principles of the program are rather quite clear and
enforceable in the first party context, despite some prevailing ambiguities.&amp;nbsp; The privacy policies of most social
networking services have become increasingly clear and straightforward since
their inception.&amp;nbsp; Facebook, for example,
has revamped its &lt;a href="http://www.facebook.com/privacy/explanation.php"&gt;privacy
regime&lt;/a&gt; several times, and gives explicit notice to users how their
information is being used.&amp;nbsp; The privacy
policy also explains the relationship between third parties and your personal information—including
how it may be used by advertisers, search engines, and fellow members.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With respect to third party advertisers, principles of
“choice” are clearly granted by most social networking services.&amp;nbsp; For example, the &lt;a href="http://www.networkadvertising.org/"&gt;Network Advertising Initiative&lt;/a&gt;, a
self-regulatory initiative of the online advertising industry, clearly lists
its member websites and allows individuals to opt out of any targeted
advertising conducted by its members.&amp;nbsp; In
Facebook’s description of “cookies” in their privacy policy, a direct link to NAI’s
opt out features is given, allowing individuals to make somewhat informed
choices about their participation in such programs.&amp;nbsp; This point is, of course, in light of the
fact that most users do not read or understand the privacy policies provided by
social networking sites&lt;a name="_ednref5" href="#_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [4].
It is also important to note that Google—a major player in the online
advertising business, does not grant users of Buzz and Orkut the same “opt-out”
options as sites such as Facebook and Bebo.&lt;/p&gt;
&lt;p&gt;Under the auspices of the US Federal Trade Commission, the
Safe Harbor Program has also successfully investigated and settled several
privacy-related breaches which have taken place on social networking sites.&amp;nbsp; Of the most famous cases is &lt;a href="http://www.beaconclasssettlement.com/"&gt;Lane et al. v. Facebook et al.&lt;/a&gt;,
which was a class action suit brought against Facebook’s Beacon Advertising
program.&amp;nbsp; The US Federal Trade Commission
was quick to insight an investigation of the program after many privacy groups
and individuals became critical of its questionable advertising practices.&amp;nbsp; The Beacon program was designed to allow
Facebook users to share information with their friends about actions taken on
affiliated, third party sites.&amp;nbsp; This had included,
for example, the movie rentals a user had made through the Blockbuster website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Plaintiffs filed a suit, alleging that Facebook and its
affiliates did not give users adequate notice and choice about Beacon and the
collection and use of users’ personal information. &amp;nbsp;&amp;nbsp;&amp;nbsp;The Beacon program was ultimately found to
be in breach of US law, including the &lt;a href="http://epic.org/privacy/vppa/"&gt;Video
Privacy Protection Act&lt;/a&gt;, which bans the disclosure of personally identifiable
rental information.&amp;nbsp; Facebook has
announced the settlement of the lawsuit, not bringing individual settlements,
but a marked end to the program and the development of a 9.5 million dollar &lt;a href="http://www.p2pnet.net/story/37119"&gt;Facebook Privacy Fund&lt;/a&gt; dedicated to
privacy and data-related issues.&amp;nbsp; Other privacy
related investigations of social networking sites launched by the FTC under the
Safe Harbor Program include Facebook’s &lt;a href="http://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changes-good-bad-and-ugly"&gt;privacy
changes&lt;/a&gt; in late 2009, and the Google’s recently released &lt;a href="http://www.networkworld.com/news/2010/032910-lawmakers-ask-for-ftc-investigation.html"&gt;Buzz
application&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Despite the headway the Safe Harbor is making, many privacy
related questions remain ambiguous with respect to the responsibilities social networking
sites through the program.&amp;nbsp; For example,
Bebo &lt;a href="http://www.bebo.com/Privacy2.jsp"&gt;reserves the right&lt;/a&gt; to
supplement a social profile with addition information collected from publicly
available information and information from other companies.&amp;nbsp; Bebo’s does adhere to the “notice principle”—as
it makes know to users how their information will be used through their privacy
policy. However, it remains unclear if appropriate disclosures are given by Bebo
as required by Safe Harbor Framework, notably as the sources of “publicly
available information” as a concept remains broad and obscured in the privacy policy.&amp;nbsp; It is also unclear whether or not Bebo users
are able to, under the “Choice” principle, refuse to having their profiles from
being supplemented by other information sources.&amp;nbsp; Also, under the “access
principle”, do individuals have the right to review all information held about them as “Bebo
users”?&amp;nbsp; The right to review information
held by a social networking site is an important one that should be upheld.&amp;nbsp; This is most notable as supplementary information
from outside social networking services is employed &amp;nbsp;to profile individual users in ways which may
work to categorize individuals in undesirable ways.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Third Party Problem&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Cooperation between social networking sites and the Safe
Harbor has improved, and most of these sites now have privacy policies which
explicitly address the principles of the Program.&amp;nbsp;&amp;nbsp; It should also be noted that public interest
groups, such as Epic, the Center for Digital Democracy, and The Electronic
Frontier Foundation, have played a key role in ensuring that data privacy
breaches are brought to the attention of the FTC under the program.&amp;nbsp; While the program has somewhat adequately
addressed the privacy practices of first party participants, the number of
third parties on social networking sites calls into question the
comprehensiveness and effectiveness of the Safe Harbor program.&amp;nbsp; Facebook itself as a first party site may adhere
to the Safe Harbor Program.&amp;nbsp; However, its
growing number third party platform members may not always adhere to best practices
in the field, nor can Facebook or the Safe Harbor Program guarantee that they
do so.&lt;/p&gt;
&lt;p&gt;The Safe Harbor Program does require that all participants
take certain security measures when transferring data to a third party.&amp;nbsp; Third parties must either subscribe to the
safe harbor principles, or be subject to the EU Data Directive.&amp;nbsp; Alternatively, an organization can may also
enter into a written agreement with a third party requiring that they provide
at least the same level of privacy protection as is required by program
principles.&amp;nbsp; Therefore, third parties of
participating program sites are, de facto, bound by the safe harbor principles by
the way of entering into agreement with a first party participant of the
program. &amp;nbsp;This is the approach taken by
most social networking sites and their third parties.&lt;/p&gt;
&lt;p&gt;It is important to note, however, that third parties are not
governed directly by the regulatory bodies, such as the FTC.&amp;nbsp; The safe harbor website also &lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;explicitly notes&lt;/a&gt;
that the program does not apply to third parties.&amp;nbsp; Therefore, as per these provisions, Facebook must
adhere to the principles of the program, while its third party platform members
(such as social gaming companies), only must do so indirectly as per a separate
contract with Facebook.&amp;nbsp; The
effectiveness of this indirect mode of governing of third party privacy
practices is questionable for numerous reasons.&lt;/p&gt;
&lt;p&gt;Firstly, while Facebook does take steps to ensure that
third parties use information from Facebook in a manner which is consistent to
the safe harbor principles, the company explicitly &lt;a href="http://www.facebook.com/policy.php"&gt;waives any guarantee&lt;/a&gt; that third
parties will “follow their rules”. &amp;nbsp;&amp;nbsp;Prior to allowing third parties to access any
information about users, Facebook requires third parties to &lt;a href="http://www.facebook.com/terms.php"&gt;agree to terms&lt;/a&gt; that limit their
use of information, and also use technical measures to ensure that they only
obtain authorized information.&amp;nbsp;&amp;nbsp; Facebook
also warns users to “always review the policies of third party applications and
websites to make sure you are comfortable with the ways in which they use
information”.&amp;nbsp; Not only are users
required to read the privacy policies of every third party application, but are
also expected to report applications which may be in violation of privacy
principles.&amp;nbsp; In this sense, Facebook not
only waives responsibility for third party privacy breaches, but also places further
regulatory onus upon the user.&lt;/p&gt;
&lt;p&gt;As the program guidelines express, the safe harbor relies to
a great degree on enforcement by the private sector.&amp;nbsp; However, it is likely that a self-regulatory
framework may lead the industry into a state of regulatory malaise.&amp;nbsp; Under the safe harbor program, Facebook must
ensure that the privacy practices of third parties are adequate.&amp;nbsp; However, at the same time, the company may
simultaneously waiver their responsibility for third party compliance with safe
harbor principles.&amp;nbsp; Therefore, it remains
questionable as to where responsibility for third parties exactly lies.&amp;nbsp; When third parties are not directly
answerable to the governing bodies of safe harbor program, and when first parties
can to waive responsibility for their practices, from where does the incentive to
effectively regulate third parties to come from?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While Facbeook may in fact take reasonable legal and technical
measures to ensure third party compliance, the room for potential dissonance
between speech and deed&amp;nbsp; is worrisome.&amp;nbsp; Facebook is required to ensure that third
parties provide “&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;at least the same
level of privacy protection&lt;/a&gt;” as they do.&amp;nbsp;
However, in practice, this has yet to become the case.&amp;nbsp; A quick survey of twelve of the most popular
Platform Applications in the gaming category showed&lt;a name="_ednref6" href="#_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
that third parties are not granting their users the “same level of privacy
protection”[5].&amp;nbsp; For example, section 9.2.3
of Facebooks “&lt;a href="http://www.facebook.com/terms.php"&gt;Rights and
Responsibilities&lt;/a&gt;” for Developers/Operators of applications/sites states
that they must “have a privacy policy or otherwise make it clear to users what
user data you are going to use and how you will use, display, or share that
data”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, out of the 12 gaming applications surveyed, four
companies failed to make privacy policies available to users &lt;em&gt;before&lt;/em&gt; they granted the application
access to the personal information, including that of their friends&lt;a name="_ednref7" href="#_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [6].&amp;nbsp; After searching for the privacy policies on
the websites of each of the four social gaming companies, two completely failed
to post privacy policies on their central websites. &amp;nbsp;&amp;nbsp;This practice is in direct breach of the
contract made between these companies and Facebook, as mentioned above.&amp;nbsp; In addition to many applications failing to clearly
post privacy policies, many of provisions set out in these policies were
questionable vis-à-vis safe harbor principles.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For example Zynga, makes of popular games Mafia Wars and
Farmville, reserve the right to “maintain copies of your content
indefinitely”.&amp;nbsp; This practice remains contrary
to Safe Harbor principles which states that information should not be kept for
longer than required to run a service.&amp;nbsp;
Electronic Arts also maintains similar provisions for data retention in
its privacy policy.&amp;nbsp;&amp;nbsp; Such practices are
rather worrisome also in light of the fact that both companies also reserve the
right to collect information on users from other sources to supplement profiles
held.&amp;nbsp; This includes (but is not limited
to) newspapers and Internet sources such as blogs, instant messaging services, and
other games.&amp;nbsp;&amp;nbsp; It is also notable to
mention that only one of the twelve social gaming companies surveyed directly
participates in the safe harbor program.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to the difficulties of ensuring that safe harbor
principles are adhered to by third parties, the information asymmetries which
exist between first party sites, citizens, and governance bodies vis-à-vis
third parties complicate this model.&amp;nbsp; Foremost,
it is clear that Facebook, despite its resources, cannot keep tabs on the
practices of all of their applications.&amp;nbsp;&amp;nbsp;
This puts into question if industry self-regulation can really guarantee
that privacy is respected by third parties in this context.&amp;nbsp; Furthermore, the lack of knowledge or
understanding held by citizens about how third parties user their information
is particularly problematic when a system relies so heavily on users to report
suspected privacy breaches.&amp;nbsp; The same is
likely to be true for governments, too.&amp;nbsp; As
one legal scholar, promoting a more laisse-fair approach to third party
regulation, notes—multiple and invisible third party relationships presents
challenges to traditional forms of legal regulation&lt;a name="_ednref8" href="#_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [7].&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In an “open “social ecosystem, the sheer volume of data
flows between users of social networking sites and third party players appears
to have become increasingly difficult to effectively regulate.&amp;nbsp; While the safe harbor program has been
successful in establishing best practices and minimum standards for data
privacy, it is also clear that governance bodies, and public interest groups,
have focused most attention on large industry players such as Facebook.&amp;nbsp; This has left smaller third party players on
social networking sites in the shadows of any substantive regulatory concern.&amp;nbsp; &amp;nbsp;&amp;nbsp;If
one this has become clear, it is the fact that governments may no longer be
able to effectively govern the flows of data in the burgeoning context of “open
data”.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As I have demonstrated, it remains questionable whether or
not Facebook can regulate third parties data collection practices
effectively.&amp;nbsp; Imposing more stringent
responsibilities on safe harbor participants could be a positive step.&amp;nbsp; It is reasonable to assume that it would be
undue to impose liability on social networking sites for the data breaches of
third parties.&amp;nbsp; However, it is not
unreasonable to require sites like Facebook go beyond setting “minimum
standards” for data privacy, towards taking a more active enforcement, if even
through TRUSTe or another regulatory body.&amp;nbsp;
If the safe harbor is to be effective, it cannot allow program participants
to simply wave the liability for third party privacy practices.&amp;nbsp; The indemnity granted to third parties on social
networking sites may deem the safe harbor program more effective in sustaining
the non-liability of third parties, rather than protecting the data privacy of
citizens.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="33%" /&gt;

&lt;/div&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn1" href="#_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[1] Official Directive 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn2" href="#_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn3" href="#_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[2] 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;[3] Ibid&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn4" href="#_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a name="_edn5" href="#_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/a&gt;[4] See Acquisit,
A. a. (n.d.). Imagined Communities: Awareness, Information Sharing, and Privacy
on Facebook. &lt;em&gt;PET 2006&lt;/em&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn6" href="#_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[5] Of the Privacy Policy browsed include, Zynga, Rock
You!, Crowdstar, Mind Jolt, Electronic Arts, Pop Cap Games, Slash Key, Playdom,
Meteor Games, Broken Bulb Studios, Wooga, and American Global Network.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn7" href="#_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[6] By adding an application, users are also sharing with
third parties the information of their friends if they do not specifically &amp;nbsp;opt out of this practice.&lt;/p&gt;
&lt;p class="discreet"&gt;[7]See&lt;strong&gt;
&lt;/strong&gt;&amp;nbsp;Milina, S. (2003).
Let the Market Do its Job: Advocating an Integrated Laissez-Faire Approach to
Online Profiling. &lt;em&gt;Cardozo Arts and Entertainment Law Journal&lt;/em&gt; .&lt;/p&gt;
&lt;pre&gt;&lt;/pre&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online'&gt;https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2011-08-02T07:19:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march-2010-bulletin">
    <title>March 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/march-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! We bring you updates of our research, news, and events for the month of March 2010 in this bulletin.&lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;An Open Answer to Office&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;OpenOffice with its new features is giving Microsoft Word tough competition, says Deepa Kurup in this article published in The Hindu.&lt;br /&gt; &lt;a href="https://cis-india.org/news/open-office" target="_blank"&gt;http://cis-india.org/news/open-office&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;CPOV: Wikipedia Research Initiative&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The second WikiWars conference will be held in Amsterdam from 26 to 27 March 2010&lt;br /&gt; &lt;a href="https://cis-india.org/research/conferences/conference-blogs/cpov" target="_blank"&gt;http://cis-india.org/research/conferences/conference-blogs/cpov&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;CI Global Meeting on A2K&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;CIS is a co-sponsor of the Consumers International Meeting on A2K to be held in Kuala Lumpur, Malaysia on April 21 and 22, 2010.&lt;br /&gt; &lt;a href="https://cis-india.org/events/ci-global-meeting-a2k" target="_blank"&gt;http://cis-india.org/events/ci-global-meeting-a2k&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;India Game Developer Summit Bangalore 2010&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The India Game Developer Conference held at Nimhans Convention Centre on the 27th of February, 2010 was attended by Arun Menon who is working on The Gaming and Gold Project at The Centre for Internet and Society. The Developer forum brought together game developers from different sectors of the Game Production Cycle, with hardware manufacturers like Nvidia demonstrating their latest 3d technology and Software developers like Crytek and Adobe demonstrating the latest in developer tools for creating and editing games on multiple platforms.&lt;br /&gt; &lt;a href="https://cis-india.org/research/cis-raw/histories/gaming/india-game-developer-summit-in-bangalore-2010" target="_blank"&gt;http://cis-india.org/research/cis-raw/histories/gaming/india-game-developer-summit-in-bangalore-2010&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;10 Legendary Obscene Beasts&lt;/b&gt;&lt;br /&gt; Nishant Shah analyses a peculiar event of vandalism which has now become the core of free speech and anti-censorship debates in mainland China. Looking at the structure of user generated knowledge websites and the specific event on the Chinese language encyclopaedia, 'Baidu Baike', he shows how, in cities where spaces of political spectacle and public protest are quickly diminishing, the Internet has become a tool for producing new public spaces of demonstration and protest.&lt;br /&gt; &lt;a href="https://cis-india.org/research/grants/ISShanghai/itcity4" target="_blank"&gt;http://cis-india.org/research/grants/ISShanghai/itcity4&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;WikiWars - A report&lt;/b&gt;&lt;br /&gt; In this blog, Nishant Shah analyses about the WikiWars, the first of the three events held in Bangalore on January 12 and 13.&lt;br /&gt; &lt;a href="https://cis-india.org/research/conferences/conference-blogs/wwrep" target="_blank"&gt;http://cis-india.org/research/conferences/conference-blogs/wwrep&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Understanding Spectrum&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/span&gt;What is spectrum and how do government and commercial decisions on this scientific phenomenon affect public facilities and costs? Shyam Ponappa examines this in his latest blog published in the Business Standard on March 4, 2010.&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/understanding-spectrum%0c" target="_blank"&gt;http://cis-india.org/advocacy/telecom/blog/understanding-spectrum&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march-2010-bulletin'&gt;https://cis-india.org/about/newsletters/march-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-13T05:02:42Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/ci-global-meeting-a2k">
    <title>CI Global Meeting on A2K</title>
    <link>https://cis-india.org/events/ci-global-meeting-a2k</link>
    <description>
        &lt;b&gt;CIS is a co-sponsor of the Consumers International Meeting on A2K&lt;/b&gt;
        
&lt;p&gt;The Consumers International Global Meeting on A2K 2010 is to be held at the Holiday Villa hotel in Subang, Kuala Lumpur, Malaysia on 21 and 22 April 2010.&lt;br /&gt;&lt;br /&gt;The meeting will bring together CI members and other NGOs from around the world to discuss and collaborate on issues of access to knowledge (A2K) and communications rights. Highlights will include the launch of the &lt;a class="external-link" href="http://a2knetwork.org/watchlist"&gt;Consumers International IP Watch List&lt;/a&gt; for 2010, the launch of CI's new film on A2K, and a preview of the results of our &lt;a class="external-link" href="http://a2knetwork.org/survey"&gt;access barrier survey&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Don't miss the most important day on the A2K calendar for the global consumer movement!&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://a2knetwork.org/ci-global-meeting-a2k#agenda"&gt;Agenda&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://a2knetwork.org/ci-global-meeting-a2k#papers"&gt;Paper abstracts&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://a2knetwork.org/registration-ci-global-meeting-a2k"&gt;Registration&lt;/a&gt;&amp;nbsp; - now open!&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://a2knetwork.org/ci-global-meeting-a2k#sponsors"&gt;Sponsors&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/ci-global-meeting-a2k'&gt;https://cis-india.org/events/ci-global-meeting-a2k&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-05T04:08:06Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/cpov">
    <title>CPOV : Wikipedia Research Initiative</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/cpov</link>
    <description>
        &lt;b&gt;The Second event, towards building the Critical Point of View Reader on Wikipedia, brings a range of scholars, practitioners, theorists and activists to critically reflect on the state of Wikipedia in our contemporary Information Societies. Organised in Amsterdam, Netherlands, by the Institute of Network Cultures, in collaboration with the Centre for Internet and Society, Bangalore, the event builds on the debates and discussions initiated at the WikiWars that launched off the knowledge network in Bangalore in January 2010. Follow the Live Tweets at #CPOV&lt;/b&gt;
        
&lt;p&gt;Second international conference of the &lt;em&gt;CPOV Wikipedia Research 
Initiative&lt;/em&gt; :: March 26-27, 2010 :: OBA (Public Library Amsterdam, 
next to Amsterdam central station), Oosterdokskade 143, Amsterdam.&lt;/p&gt;
&lt;p&gt;Wikipedia is at the brink of becoming the de facto global reference 
of dynamic knowledge. The heated debates over its accuracy, anonymity, 
trust, vandalism and expertise only seem to fuel further growth of 
Wikipedia and its user base. Apart from leaving its modern counterparts 
Britannica and Encarta in the dust, such scale and breadth places 
Wikipedia on par with such historical milestones as Pliny the Elder’s 
Naturalis Historia, the Ming Dynasty’s Wen-hsien ta- ch’ eng, and the 
key work of French Enlightenment, the Encyclopedie. &lt;span id="more-10604"&gt;&lt;/span&gt;The multilingual Wikipedia as digital 
collaborative and fluid knowledge production platform might be said to 
be the most visible and successful example of the migration of FLOSS 
(Free/ Libre/ Open Source Software) principles into mainstream culture. 
However, such celebration should contain critical insights, informed by 
the changing realities of the Internet at large and the Wikipedia 
project in particular.&lt;/p&gt;
&lt;p&gt;The CPOV Research Initiative was founded from the urge to stimulate 
critical Wikipedia research: quantitative and qualitative research that 
could benefit both the wide user-base and the active Wikipedia community
 itself. On top of this, Wikipedia offers critical insights into the 
contemporary status of knowledge, its organizing principles, function, 
and impact; its production styles, mechanisms for conflict resolution 
and power (re-)constitution. The overarching research agenda is at once a
 philosophical, epistemological and theoretical investigation of 
knowledge artifacts, cultural production and social relations, and an 
empirical investigation of the specific phenomenon of the Wikipedia.&lt;/p&gt;
&lt;p&gt;Conference Themes: Wiki Theory, Encyclopedia Histories, Wiki Art, 
Wikipedia Analytics, Designing Debate and Global Issues and Outlooks.&lt;/p&gt;
&lt;p&gt;Follow the live tweets on http://twitter.com/#search?q=%23CPOV&lt;/p&gt;
&lt;p&gt;Confirmed speakers: Florian Cramer (DE/NL), Andrew Famiglietti (UK), 
Stuart Geiger (USA), Hendrik-Jan Grievink (NL), Charles van den Heuvel 
(NL), Jeanette Hofmann (DE), Athina Karatzogianni (UK), Scott Kildall 
(USA), Patrick Lichty (USA), Hans Varghese Mathews (IN), Teemu Mikkonen 
(FI), Mayo Fuster Morell (IT), Mathieu O’Neil (AU), Felipe Ortega (ES), 
Dan O’Sullivan (UK), Joseph Reagle (USA), Ramón Reichert (AU), Richard 
Rogers (USA/NL), Alan Shapiro (USA/DE), Maja van der Velden (NL/NO), 
Gérard Wormser (FR).&lt;/p&gt;
&lt;p&gt;Editorial team: Sabine Niederer and Geert Lovink (Amsterdam), Nishant
 Shah and Sunil Abraham (Bangalore), Johanna Niesyto (Siegen), Nathaniel
 Tkacz (Melbourne). Project manager CPOV Amsterdam: Margreet Riphagen. 
Research intern: Juliana Brunello. Production intern: Serena Westra.&lt;/p&gt;
&lt;p&gt;The CPOV conference in Amsterdam will be the second conference of the
 CPOV Wikipedia Research Initiative. The launch of the initiative took 
place in Bangalore India, with the conference WikiWars in January  2010.
 After the first two events, the CPOV organization will work on  
producing a reader, to be launched early 2011. For more information or 
submitting a &lt;a href="http://networkcultures.org/wpmu/cpov/reader"&gt;reader&lt;/a&gt;
 contribution.&lt;/p&gt;
&lt;p&gt;Buy your ticket &lt;a href="http://networkcultures.org/wpmu/cpov/practical-info/tickets/"&gt;online&lt;/a&gt;
 (with iDeal), or register by sending an email to: info (at) 
networkcultures.org. One day ticket: €25, students and OBA members: 
€12,50. Full conference pass (2 days): €40, students and OBA members:  
25.&lt;/p&gt;
&lt;p&gt;Organized by the Institute of Network Cultures Amsterdam, in 
cooperation with the Centre for Internet and Society in Bangalore, 
India.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/cpov'&gt;https://cis-india.org/research/conferences/conference-blogs/cpov&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2011-08-23T02:52:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly">
    <title>Does the Social Web need a Googopoly?</title>
    <link>https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly</link>
    <description>
        &lt;b&gt;While the utility of the new social tool Buzz is still under question, the bold move into social space taken last week by the Google Buzz team has Gmail users questioning privacy implications of the new feature.  In this post, I posit that Buzz highlights two  privacy challenges of the social web.  First, the application has sidestepped the consensual and contextual qualities desirable of social spaces.  Secondly, Google’s move highlights the increasingly competitive and convergent nature of the social media landscape.  &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Last week, and for many a surprise, Google launched its new
social networking platform, Buzz.&amp;nbsp; The
new service is Google’s effort to amplify the “social nature” of their services
by integrating them under one platform, and adding some extra social utility.&amp;nbsp;&amp;nbsp; The social application runs from the Gmail
interface, but also links other Google accounts a user may have, including
albums on Picasa, and Google Reader.&amp;nbsp; &amp;nbsp;The service also allows for the sharing from
external sources, such as photos on Flickr, and videos from YouTube.&amp;nbsp; The service also allows users to post, like,
or dislike the status updates of others which may be publicly searchable if the
user opts.&amp;nbsp; Before a Gmail user may fully
participate in Google Buzz service, a unique Google Personal Profile must be
created.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;User Consent&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Much of the buzz surrounding the new social networking
service last week wasn’t paying much lip service to the new application.&amp;nbsp; Instead, an uproar of privacy concerns continued
to dominate the Buzz scene, with many critics quickly labeling Buzz a “&lt;a href="http://news.cnet.com/8301-31322_3-10451428-256.html"&gt;privacy nightmare&lt;/a&gt;”.&amp;nbsp; A &lt;a href="http://digitaldaily.allthingsd.com/20100216/epic-files-ftc-complaint-over-google-buzz/?mod=ATD_rss"&gt;formal
complaint&lt;/a&gt; has been already filed with the US Federal Trade Commission in
response to Google’s new privacy violating service.&amp;nbsp; &amp;nbsp;A
second-year Harvard Law student has also filed a &lt;a href="http://abcnews.go.com/Technology/google-buzz-draws-class-action-suit-harvard-student/story?id=9875095&amp;amp;page=1"&gt;class-action
suit&lt;/a&gt; against the company for its privacy malpractices.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Much of the privacy talk thus far has focused on issues of
consent, or lack thereof, in this case.&amp;nbsp; Upon
Buzz’s launch, Gmail users were automatically subscribed as “opting in” for the
service.&amp;nbsp; Google has used the private
address books of millions of Gmail accounts to build social networks from the
contacts users email and chat with most.&amp;nbsp;
To entice users into using the service, Gmail users were set to
auto-follow all of their contacts, and in turn, to be followed by them,
too.&amp;nbsp; Furthermore, all new Buzz users had
been set to automatically share all public Picasa albums and Google Reader items
with their new social graph.&amp;nbsp; It is
argued that social network services should be &lt;a href="http://jonoscript.wordpress.com/2010/02/20/buzz-off-google-social-networks-should-always-be-opt-in-not-opt-out/"&gt;opt-in,
rather than opt-out&lt;/a&gt;, and that Buzz has violated the consensual nature of
the social web.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Illuminating the complications of building a social graph
from ones inbox is the story of an Australian women, who remains anonymous.&amp;nbsp; As she claims, most of the emails currently received
through her Gmail account, are those from her abusive ex-boyfriend.&amp;nbsp; Due to Google’s assumption that Gmail users
would like to be “auto-followed” by their Gmail contacts (mirroring Twitters friendship
protocol), items shared between herself and new boyfriend through her Google
reader account had become public to her broader social graph, including her
ex-boyfriend and his harassing friends.&lt;/p&gt;
&lt;p&gt;In a &lt;a href="http://www.gizmodo.com.au/2010/02/fck-you-google/"&gt;blog response&lt;/a&gt;
directed to Google’s Buzz team, the woman scornfully wrote- “&lt;em&gt;F*ck you, Google. My privacy concerns are
not trite. They are linked to my actual physical safety, and I will now have to
spend the next few days maintaining that safety by continually knocking down
followers as they pop up. A few days is how long I expect it will take before
you either knock this shit off, or I delete every Google account I have ever
had and use Bing out of f*cking spite&lt;/em&gt;”.&amp;nbsp;
As this case demonstrates, the people we mail most often may not be our
closest friends. &amp;nbsp;&amp;nbsp;As email has replaced
the telephone for many as the dominate mode of communication--some contacts may
be friends, however, many others may not be. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;In response to the uproar, tweaks to Buzz’s privacy features
have since been made.&amp;nbsp; Todd Jackson,
Buzz’s product manager, has also posted a &lt;a href="http://gmailblog.blogspot.com/2010/02/millions-of-buzz-users-and-improvements.html"&gt;public
apology&lt;/a&gt; to the official Gmail Blog late last week for not “getting
everything quite right”.&amp;nbsp; The service will
now assume the more user-centric “auto-suggest” model, allowing users to selectively
choose the contacts they wish to follow, and will also no longer auto-link Picasa
and Reader content.&amp;nbsp; However, as the &lt;a href="http://digitaldaily.allthingsd.com/20100216/epic-files-ftc-complaint-over-google-buzz/?mod=ATD_rss"&gt;EPIC’s
complaint notes&lt;/a&gt;, many are still unsatisfied with the opt-out nature of the
service, arguing that users should be able to opt-into the service if they so
choose, rather than having to delist themselves for a service they didn’t necessarily
sign up.&amp;nbsp; Ethical quandaries also still
loom over Google’s misuse of the users’ private contact lists to jumpstart
their new service.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contextual Integrity &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacks on personal privacy resulting from Google’s model
are vast.&amp;nbsp; As the case of the Australian
woman illuminates, the concept of the “online friend” has completely taken out
of context with Buzz’s initial auto-follow model.&amp;nbsp; Many of the contacts we make on a daily basis
need not be made public through the Google profile.&amp;nbsp; For most, this Buzz’s privacy breach may be
benign or annoying at most. However, those who are engaged in sensitive social
or political relationships via their Gmail chat or email accounts, the revelation
of common contact could have been potentially damaging for many. &amp;nbsp;A reporter from CNET has cleverly labeled
Buzz’ as a “&lt;a href="http://news.cnet.com/8301-17939_109-10451703-2.html"&gt;socially
awkward networking&lt;/a&gt;”, as bringing diverse contacts under one umbrella
doesn’t exactly make the most social sense. In response, Gmail users are
required to sort through and filter their Buzz followers according, or choose
to disable the service all together.&lt;/p&gt;
&lt;p&gt;Besides questions of who is stalking whom, the assumptive
and public nature of Google’s&amp;nbsp; new move
has cast a shadow of doubt among Gmail users regarding the ability of Google to
maintain the privacy and contextual integrity of the Gmail account.&amp;nbsp; Should one account be the place to socialize,
and&amp;nbsp; “do business”?&amp;nbsp; Gmail is, and should remain, an email
service.&amp;nbsp; However, Buzz takes the email
experience into new and questionable grounds.&amp;nbsp;
Do Gmail users feel entirely comfortable having their personal email,
social graph, and chat functions all coming under the auspices of one platform?
&amp;nbsp;&amp;nbsp;Many users felt they had been lured
into using a social networking service that they didn’t sign up for in the
first place. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Social Media Competition&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In addition to Google’s attempt to integrate their various
service offerings, Buzz is seen as an obvious attempt to bolster
competitiveness in the social media market.&amp;nbsp;
In 2004, Google released Orkut. While the service has become big in
countries such as Brazil and India, it has been overshadowed by sites such as
Facebook in other jurisdictions, and has not been able to prove itself as a mainstream
space for networking.&amp;nbsp; In the past year, Google
had also launched Google Wave, a tool that mixes e-mail, with instant messaging
and the ability for several people to collaborate on documents.&amp;nbsp; However, the application failed to completely
win over audiences, and was considered one of the &lt;a href="http://www.readwriteweb.com/archives/top_10_failures_of_2009.php"&gt;top
failures of 2009&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With Google unable to effectively saturate the social media
ecosystem, Buzz is an attempt to compete with the searchable and real time
experiences provided by social media giants, Facebook and Twitter.&amp;nbsp; Increased competition within the social media
market could be a positive development for privacy, as social media companies
could arguably be compete on their ability to provide users with preferable privacy
architectures.&amp;nbsp; To the contrary, however,
such competition has thus far had negative ramifications for user privacy, as
the recent Buzz and Facebook moves illustrates.&amp;nbsp;
Facebook’s loosened privacy settings were a &lt;a href="http://www.economist.com/specialreports/displaystory.cfm?story_id=15350984"&gt;competitive
knee-jerk&lt;/a&gt; to Twitters searchable and real time experience.&amp;nbsp; Through a Twitter search, individuals can
come to know what people are saying about a certain topic, event, or product,
and as a result, the service has received a great deal attention from users,
and non-users such as advertisers, alike.&amp;nbsp;
&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In an attempt to one-up, their competition, the “Twitterization”
of Facebook followed in two distinct stages.&amp;nbsp;
First was with the implementation of the Facebook News Feed, which gave
users a real time account of actions their friends on the site.&amp;nbsp; Many argued that this feature invaded user
privacy.&amp;nbsp; However, it was argued by
Facebook that they only were making available information that was already
accessible through individual profile pages.&amp;nbsp;
The News Feed, as it happens, effectively took user information and
actions on the site out of original context by streaming this information live
for others easy viewing.&amp;nbsp; Information
users once had to rummage for had become accessible in real time on the
homepage of the service.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Secondly, Facebooks’ recent &lt;a href="http://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changes-good-bad-and-ugly"&gt;privacy
scandal&lt;/a&gt; was a step towards making profile information more searchable and accessible
to third parties, as is most often the case with the more public feeds on Twitter.&amp;nbsp; As &lt;a href="https://cis-india.org/openness/blog-old/•%09http:/www.simplyzesty.com/twitter/unrelenting-twitterization-facebook-continues/"&gt;one
commentator notes&lt;/a&gt;, &amp;nbsp;&amp;nbsp;“&lt;em&gt;Facebook used to be very private but private
is not great for search, to have great search you need all of the data to be
publicly available as it mostly is on Twitter. Facebook have not quite nailed
real time search yet but they are getting there and it will soon be a great way
of examining sentiment across different demographics&lt;/em&gt;”. &amp;nbsp;As a result, information on Facebook, such as
name, profile picture, friends list, location and fan pages have become open
access information.&amp;nbsp; In addition, users
on Facebook have been subjected to new privacy regime without notice, leaving
their profile pages generally more open, and searchable through Google.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Converging the Online
Self&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The impact Buzz alone can make on the social media landscape
remains questionable (Gmail heralds only 140 million accounts, which is a deficient
cry from Facebooks’ 400+ million dedicated users).&amp;nbsp; However, despite Googles’ in/ability to
become claim hegemony over the social web landscape, the abuse of private information
to launch a new service has raised serious debate over the privacy and the
future of social networking.&amp;nbsp; The Buzz
service marks more than yet another new social networking service that brushes
aside the privacy of users.&amp;nbsp; As user control
and privacy becomes an increasingly peripheral concern, Google’s shift toward privacy
decontrol also signifies a worrisome supply-side shift towards the
“convergence” of online identity.&lt;/p&gt;
&lt;p&gt;Within this new dominant paradigm, privacy concerns are
often interpreted as antithetical to competitiveness in the social media
marketplace.&amp;nbsp; Instead of an imagined ecosystem
based on user control and privacy preference, it can now be inferred that the
competiveness of social networking services will continue to disrupt the
delicate balance between the public and private online. Regardless that greater
visibility and searchability of the social profile may not be in the public
interest, Google’s recent move works to reinforcement of the new status quo of
“openness”.&amp;nbsp; Furthermore, it is
questionable as to how concentrated and integrated a user may want their online
activities to become.&amp;nbsp; A critical
discourse of online privacy must, therefore, take into account the ways in
which the social web has renders the user increasingly transparent through networks
of networking services.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Google’s Buzz illustrates this point quite well.&amp;nbsp;&amp;nbsp; Initially, Gmail was a straightforward email
service.&amp;nbsp; Next, the AdWords advertising service
and Gmail chat had become integrated into the Gmail experience.&amp;nbsp; Because Google was using the confidential
emails of its Gmail users, privacy concerns began to mount upon the launch of
the the AdWords service.&amp;nbsp; However,
turmoil surrounding AdWords died down, notably as Google continues to reassert
that is is bots, not humans, that are scanning the emails in order to provide
the AdWords service.&amp;nbsp; Next, there gradually
occurred a convergence of Google services under the single social profile, or
“email address”.&amp;nbsp; A single Gmail account
potentially includes use of with Google reader, calendar, chat, groups and an Orkut
account.&amp;nbsp; In terms of behavioral targeted
advertising, Google has recently announced that they will be providing
personalized search results even to users who have not signed up for Google
services.&amp;nbsp; This will be done through the
placement a cookie on all machines to provide targeted advertising seamlessly
through each Google search and browsing session.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While many argue that the collection of non-personally
identifiable information poses no privacy harm, this assumption needs
reassessment.&amp;nbsp; As Google comes to offer
us more, they also come to learn more, and Buzz signifies this trend towards a Googopolized
social web.&amp;nbsp; To add another layer of
complexity to Googles hegemony, users of the Buzz service are also required to create
a “Google Profile”, which is searchable online and displays real time status
updates, comments, and connections from other social network services, such as
Facebook and Twitter.&amp;nbsp; As Google recently
launched the beta version of the new &lt;a href="http://googleblog.blogspot.com/2009/10/introducing-google-social-search-i.html"&gt;Social
Search&lt;/a&gt;, Buzz was just the service required to increase the relevance to the
new service by encouraging Gmail users to publish even more personal
information.&amp;nbsp; The creation of a personal
Google profile, which is indexed and searchable, raises many concerns about
privacy and identity, and doubts are continually raised over &lt;a href="http://www.businessinsider.com/hey-google-thi-i-why-privacy-matter-2010-2"&gt;how
much Google should come to know&lt;/a&gt; about us.&lt;/p&gt;
&lt;p&gt;While Google’s services have arguably made the online social
experience more seamless and tailored, it is questionable as to how relevant,
or even desirable, such a shift may be.&amp;nbsp;
At present, it may appear that Google is wearing far too many hats, and
users should be wary of placing all eggs into one basket.&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;As
the launch of Buzz has shown us, user consent and the contextual integrity of
private personal information can be compromised when a diverse number of online
services are integrated and given a social spin.&amp;nbsp;&amp;nbsp;&amp;nbsp; When competition among social web providers
drives users to lose control of the private information which is inherently theirs,
critical questions surrounding competition, convergence and privacy require
critical exploration.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly'&gt;https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    
    
        <dc:subject>Competition</dc:subject>
    
    
        <dc:subject>Google Buzz</dc:subject>
    

   <dc:date>2011-08-18T05:06:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking">
    <title>The (in)Visible Subject: Power, Privacy and Social Networking</title>
    <link>https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking</link>
    <description>
        &lt;b&gt;In this entry, I will argue that the interplay between privacy and power on social network sites works ultimately to subject individuals to the gaze of others, or to alternatively render them invisible. Individual choices concerning privacy preferences must, therefore, be informed by the intrinsic relationship which exists between publicness/privateness and subjectivity/obscurity. &lt;/b&gt;
        &lt;strong&gt;&lt;br /&gt;The Architecture of Openness&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;div id="parent-fieldname-text"&gt;
&lt;p&gt;Through a Google search or a quick scan of Facebook, people
today are able to gain “knowledge” on others in a way never once 
possible.&amp;nbsp; The ability to search and collect information
on individuals online only continues to improve as online social networks grow 
and
search engines become more comprehensive.&amp;nbsp;
Social networks, and the social web more broadly, has worked to
fundamentally alter the nature of personal information made available 
online.&amp;nbsp; Social &amp;nbsp;networking services today enable the average person, with web access, to publish information through a “social 
profile”.&amp;nbsp; &amp;nbsp;Personal
information made available online is now communicative, narrative and 
biographic.&amp;nbsp; Consequentially, social profiles have become
rich containers of personal information that can be searched, indexed 
and
analyzed.&lt;/p&gt;
&lt;p&gt;The architecture of the social web further encourages users
to enclose volumes of personally identifiable information.&amp;nbsp; Most social 
network sites embrace the “ethos
of openness” as, by default, most have relaxed privacy settings.&amp;nbsp; While 
most sites give users relative control
over the disclosure of personal information, services such as MySpace, 
Facebook
and Live Journal are far ahead of the black and white public/private 
privacy
models of sites such as Bebo and Orkut.&amp;nbsp; Bebo,
for example, only allows users to disclose information to “friends” or
“everyone”, granting little granularity for diverse privacy 
preferences.&amp;nbsp; MySpace and Facebook, on the other hand, have
made room for “friends of friends”, among other customizable group 
preferences.&amp;nbsp; All networking sites also consider certain pieces
of basic information publicly available, without privacy controls.&amp;nbsp; On 
most sites, this includes name,
photograph, gender and location, and list of friends.&amp;nbsp; Okrut, however, 
considers far more
information to public—leaving the political views and religions of its’ 
members
public.&amp;nbsp; This openness leaves the
individual with little knowledge or control over how their information 
is
viewed, and subsequently used.&lt;/p&gt;
&lt;p&gt;Search functionality has also increased the visibility of
individuals outside their immediate social network. &amp;nbsp;For example, sites 
such Facebook and LinkedIn
index user profiles through Google search.&amp;nbsp;
Furthermore, all social network sites index their users, effectively
allowing profiles to be searched by other users through basic 
registration data,
such as first and last name or registered email address.&amp;nbsp; While most 
services allow users to remove
their profiles from external search engines, they are often not able to
effectively control internal searches.&amp;nbsp; Orkut,
for example, does not allow users to disable internal searches according
 to
their first and last names.&amp;nbsp; LinkedIn and
MySpace also maintains that users be searchable by their email 
addresses.&lt;/p&gt;
&lt;p&gt;Through this open architecture and search functionality, social
network sites have rendered individuals more “visible” vis-à-vis one
another.&amp;nbsp; The social web has effectively
altered the spatial dimensions of our social lives as grounded, embodied
experience becomes ubiquitous and multiply experienced.&amp;nbsp; Privacy, in the
 online social milieu, assumes
greater fluidity and varied meaning—transcending spatially
 constructed
understandings of the notion.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the architecture of social networking sites encourages
users to be more “public”, heightened control, or “more privacy” is 
generally
suggested as the panacea to privacy concerns.&amp;nbsp;
However, the public/private binary of privacy talk often fails to
capture the complex nexus which exists between privacy and power in the
networked ecosystem.&amp;nbsp; Privacy preferences
on social networks, and the consequences thereof, are effectively shaped
 and
influenced by structures of power.&amp;nbsp; In
this entry, I will argue that the interplay between privacy and power 
works
ultimately to expose individuals to the subjective gaze of others, or to
 render
them invisible.&amp;nbsp; In this respect,
individual choices concerning privacy preferences must be informed by 
the
intrinsic relationship between notions of publicness/privateness and
subjectivity/obscurity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Power and
Subjectivity &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The searchable nature of the social profile allows others to
quickly and easily aggregate information on one another.&amp;nbsp; As privacy 
scholar Daniel Solve &lt;a href="http://docs.law.gwu.edu/facweb/dsolove/Future-of-Reputation/text.htm"&gt;notes&lt;/a&gt;,
 social searching may be of genuine intent – individuals
use social networking services to locate old friends, and to connect 
with current
colleagues.&amp;nbsp; However, curiosity does not
always assume such innocence, as fishing expeditions for personal 
information
may serve the purpose of judging individuals based perception of the 
social
profile.&amp;nbsp; The relatively power of search
and open information can be harnessed to weed out potential job 
applicants, or
to rank college applicants.&amp;nbsp; Made
possible through the architecture of the web and social constructions of
 power,
individuals may be subjected to the deconstructive gaze of superiors.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The architecture of social networking sites significantly compliments
this nexus between privacy and power.&amp;nbsp; As
individual behavior and preferences become more transparent, the act of
surveillance is masked behind the ubiquity and anonymity of online 
browsing. Drawing
on Foucault’s panopticism, social networks make for the 
“containerization” of social
space –allowing the powerful to subjectively hierarchize and classify
individuals in relation to one another&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn1" name="_ftnref1"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
 [1].&amp;nbsp; This practice becomes particularly
troublesome online, as individuals are often unable to control how they 
are constructed
by others in cyberspace.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Perfect control is difficult to guarantee in an ecosystem
where personal information is easily searched, stored, copied, indexed, 
and
shared.&amp;nbsp; In this respect, the privacy
controls of social networking sites are greatly illusory.&amp;nbsp; Googling an 
individual’s name, for example,
may not reveal the full social profile of an individual, but may unveil
dialogue involving the individual in a public discussion group.&amp;nbsp; The 
searchable nature of personal information
on the web has both complicated and undesirable consequences for privacy
 of the
person for, what I believe, to be two main reasons.&lt;/p&gt;
&lt;p&gt;The first point refers to what Daniel J. Solve describes as
the “&lt;a href="http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID440200_code249137.pdf?abstractid=440200&amp;amp;rulid=39703&amp;amp;mirid=1"&gt;virtue
 of knowing less&lt;/a&gt;”.&amp;nbsp;
Individuals may be gaining more “information” on others through the
internet, but this information is often insufficient for judging one’s
character as it only communicates one dimension of an individual.&amp;nbsp; In &lt;a href="http://heinonlinebackup.com/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/washlr79&amp;amp;section=16"&gt;her
 work&lt;/a&gt;, Helen Nissenbaum emphasizes the importance contextual
integrity holds for personal information.&amp;nbsp;
When used outside its intended context, information gathered online may
not be useful for accurately assessing an individual.&amp;nbsp; In addition, the 
virtual gaze is void of the
essential components of human interaction necessary to effectively 
understand
and situate each other.&amp;nbsp; As Solve notes,
certain information may distort judgment of another person, rather than 
increasing
its accuracy.&lt;/p&gt;
&lt;p&gt;Secondly, the act of surveillance through social networks work
to undermine privacy and personhood, as individuals seek to situate 
others as
“fixed texts” &lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn2" name="_ftnref2"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[2].&amp;nbsp;
 Due to the complex nature of the social self, such practice is undesirable.&amp;nbsp; Online
social networks are socially constructed spaces, with diverse meanings
 assigned
by varied users.&amp;nbsp; One may utilize a social
network service to build and maintain professional relationships, while 
another
may use it as an intimate space to share with close friends and family.&amp;nbsp;
 James Rachels’ &lt;a href="http://www.scribd.com/doc/6152658/Why-Privacy-is-Important-James-Rachels"&gt;theory
of
 privacy&lt;/a&gt; notes that privacy is important, as it allows individuals 
to
selectively disclose information and to engage in behaviors appropriate 
and
necessary for maintaining diverse personal relationships.&amp;nbsp; Drawing on 
the work of performance theorists
such as &lt;a href="http://books.google.co.in/books?id=gyWuhD3Q3IcC&amp;amp;dq=judith+butler+gender+trouble&amp;amp;printsec=frontcover&amp;amp;source=bn&amp;amp;hl=en&amp;amp;ei=5W56S_aTL4vo7APq4YmfCA&amp;amp;sa=X&amp;amp;oi=book_result&amp;amp;ct=result&amp;amp;resnum=5&amp;amp;ved=0CBgQ6AEwBA#v=onepage&amp;amp;q=&amp;amp;f=false"&gt;Judith
Butler&lt;/a&gt;, we can assert that identity is not fixed or unitary, but is
constituted by performances that are directed at different audiences&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn3" name="_ftnref3"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
 [3].&amp;nbsp; Sociologist Erving Goffman also notes that we
“live our lives as performers…&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T17:54"&gt; &lt;/ins&gt;&lt;/span&gt;[and]
 play many different roles and
wear many different masks”&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn4" name="_ftnref4"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
 [4].&amp;nbsp; Individuals, therefore, are inclined to
perform themselves online according to their perceived audiences.&amp;nbsp; It is
 the audience, or the social graph,
which constructs the context that, in turn, informs individual behavior.&lt;/p&gt;
&lt;p&gt;Any attempt to situate and categorize the individual becomes
particularly problematic in the context of social networks, where 
information
is often not intended for the purpose for which it is being used.&amp;nbsp; Due 
to the complex nature of human behavior, judgments
of character based on online observation only effectively capture one 
side of
the “complicated self”&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn5" name="_ftnref5"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&amp;nbsp;
 As Julie Cohen &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1012068"&gt;writes&lt;/a&gt;,
 the “law often fails to capture the mutually
constitutive interactions between self and culture, the social 
constructions of
systems of knowledge, and the interplay between systems of knowledge and
systems of power”.&amp;nbsp; Because the panoptic
gaze is decentralized and anonymous in the networked ecosystem, 
individuals will
often bear little knowledge on how their identities are being digitally
deconstructed and rewired.&amp;nbsp; Most importantly,
much of this judgment will occur without individual consent or
knowledge—emphasizing the transparent nature of the digital self.&amp;nbsp; &lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Power and
(in)visibility&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In response to the notion that the architecture of the
social web may render individuals transparent to the gaze of others, the
 need
for more “control” over privacy on social network sites has captured the
 public
imagination.&amp;nbsp; Facebook’s abrupt &lt;a href="http://www.readwriteweb.com/archives/facebook_pushes_people_to_go_public.php"&gt;privacy
 changes&lt;/a&gt;, for example, have&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T17:58"&gt; &lt;/ins&gt;&lt;/span&gt;received
widespread
 attention in the &lt;a href="http://www.readwriteweb.com/archives/why_facebook_is_wrong_about_privacy.php"&gt;blogosphere&lt;/a&gt;
 and even by &lt;a href="http://www.guardian.co.uk/technology/blog/2009/dec/17/facebook-privacy-ftc-complaint"&gt;governments&lt;/a&gt;.&amp;nbsp;
 While
popular privacy discourse often continues to fixate on the 
public/private
binary—Facebook’s questionable move towards privacy decontrol has raised
important questions of power and privilege.&lt;/p&gt;
&lt;p&gt;A recent &lt;a href="http://www.zephoria.org/thoughts/archives/2010/01/16/facebooks_move.html"&gt;blog
 post&lt;/a&gt; by danah boyd nicely touches upon the dynamics of
power, public-ness, and privilege in the context of online social networking.&amp;nbsp; 
As she notes, “Public-ness has always been a
privilege…&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T18:00"&gt; &lt;/ins&gt;&lt;/span&gt;but now we've changed the 
equation
and anyone can theoretically be public…&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T18:00"&gt; &lt;/ins&gt;&lt;/span&gt;and
 seen
by millions.&amp;nbsp; However, there are still
huge social costs to being public…the privileged don’t have to worry 
about the
powerful observing them online…but most everyone else does –forcing 
people into
the public eye doesn’t &lt;em&gt;dismantle the
structures of privilege and power&lt;/em&gt;, but only works to &lt;em&gt;reinforce 
them&lt;/em&gt;” (emphasis added).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This point touches upon an important idea —that publicity has value.&amp;nbsp;
 This nexus between visibility and power is
one which unfolds quite clearly in the social media ecosystem.&amp;nbsp; One’s 
relevance or significance could,
arguably, be measured relative to online visibility.&amp;nbsp; Many individuals 
who are seen as “leaders”
within their own professional or social circles often maintain public 
blogs, maintain
a herd of followers on Twitter, and often manage large numbers of 
connections
on social network sites.&amp;nbsp; The more
information written by or on an individual online, arguably, the more 
relevant
they appear to in the eyes of their peers and superiors alike.&lt;/p&gt;
&lt;p&gt;Power and privilege, however experienced, will be mirrored
in the online context.&amp;nbsp; While the participatory
and decentralized nature of Web 2.0 arguably works challenge traditional
structures of power, systemic hierarchies and are often reinforced 
online –as Facebook’s
privacy blunders clearly illustrates. The privileged need not worry 
about the
subjective gaze of their superiors, as boyd notes.&amp;nbsp; Those who may be 
compromised due to the lack
of privateness, however, do.&amp;nbsp; As boyd
goes on to argue, “the privileged get more privileged, gaining from 
being
exposed…&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T18:04"&gt; &lt;/ins&gt;&lt;/span&gt;and those struggling to keep 
their
lives together are forced to create walls that are constantly torn down 
around
them”.&amp;nbsp; As public exposure may over often
equate to power, we must &lt;span class="msoDel"&gt;&lt;del cite="mailto:lynda%20spark" datetime="2010-02-15T18:04"&gt;&amp;nbsp;&lt;/del&gt;&lt;/span&gt;critically
challenge
 the assumption that the move towards more privacy control on social
networks will best empower its members.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;If publicity can
potentially have great value for the individual, the opposite also rings
true.&amp;nbsp; Privacy, as polemic to publicness,
alternatively works to diminish the presence of the individual, 
rendering them
invisible or irrelevant within hyper-linked networks.&amp;nbsp; With 
greater personal protectionism online,
an individual may go unnoticed or unrecognized, fizzling out dully 
behind their
more public peers.&amp;nbsp; Drawing on social
network theory, powerful people can be understood as “supernodes” as 
they
connect more peripheral members of a network.&amp;nbsp;
As &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=629283"&gt;Lior
 Strahilevitz notes&lt;/a&gt;, supernodes tend to be better
informed than the peripherals, and are most likely to be perceived as 
“leaders”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As the power of the supernode relates to privacy, Strahilevitz
states that that “supernodes
maintain their privileged status by&lt;strong&gt; &lt;/strong&gt;continuing
to serve as information clearinghouses….and, in certain contexts, become
supernodes based in part on their willingness to share previously 
private
information about themselves”.&amp;nbsp; It is within
the context of visibility and power that the idea of (in)visibility and
powerlessness online unfold.&amp;nbsp; Those who
have most at risk by going public, may chose not to do so. Those with in
comfortable positions with considerably less to lose by going public may
 be
inclined to “open up”.&amp;nbsp; Heightened privacy
controls on social network services, therefore, can work to reinforce 
the very structures
of power they seek to dismantle.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This is
not to argue, however, that more privacy is necessarily bad, and that 
less
privacy is good, or that users shouldn’t be selective in their 
disclosures –&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T18:08"&gt; &lt;/ins&gt;&lt;/span&gt;to
the contrary.&amp;nbsp; As personal information
has become ubiquitous and tools for aggregating information improve, 
maintaining
privacy online becomes more pertinent than ever. However, the concept of
 privacy
will only continue to become increasingly complex as digital networks 
continue
to deconstruct and reconfigure the spatial dimensions of the public and 
private.&amp;nbsp; How are we to effectively understand privacy
in a social environment which values openness and publicity?&amp;nbsp; Can the 
fluid and dynamic self gain
visibility online without becoming subject to the gaze of superiors?&amp;nbsp; 
Will those who selectively choose
friends and carefully disclose personal information fizzle out, while the powerful
and less inhibited continue to reassert privilege?&amp;nbsp; The interplay 
between power and privacy on
the social web is a multiply constitutive and reinforcing synergy 
–understanding
how to effectively strike balance between the right to privacy and 
self-determination
is the challenge ahead.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftnref1" name="_ftn1"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class="footnotereference"&gt;&lt;span class="footnotereference"&gt;&lt;/span&gt;&lt;/span&gt;
 1. see “Foucault in Cyberspace” by James Boyle&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftnref2" name="_ftn2"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftnref3" name="_ftn3"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class="footnotereference"&gt;&lt;span class="footnotereference"&gt;&lt;/span&gt;&lt;/span&gt;2.
 Julie Cohen&lt;/p&gt;
&lt;p&gt;3. Cohen citing Butler&lt;/p&gt;
&lt;p&gt;4. Solve citing Goffman&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-social-bookmarks"&gt;
&lt;div id="shareit" class="hidden"&gt;
&lt;div id="exit"&gt;
&lt;h4&gt;Bookmark &amp;amp; Share:&lt;/h4&gt;
&lt;ul id="viewlet_bookmarks"&gt;&lt;li&gt;
            &lt;a href="http://del.icio.us/post?url=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;amp;title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/delicious.png" alt="Del.icio.us" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://www.facebook.com/share.php?u=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1"&gt;
                &lt;img src="../../../../++resource++sb_images/facebook.jpg" alt="Facebook" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/google.jpg" alt="Google Bookmarks" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://twitter.com/home?status=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1"&gt;
                &lt;img src="../../../../++resource++sb_images/twitter.gif" alt="Twitter" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://www.myspace.com/Modules/PostTo/Pages/?c=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;amp;t=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/myspace.png" alt="MySpace" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://digg.com/submit?phase=2&amp;amp;amp;url=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;amp;title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/digg.png" alt="Digg" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://reddit.com/submit?url=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;amp;title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/reddit.png" alt="Reddit" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://slashdot.org/bookmark.pl?title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking&amp;amp;amp;url=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1"&gt;
                &lt;img src="../../../../++resource++sb_images/slashdot.png" alt="Slashdot" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;h5 class="hiddenStructure"&gt;Document Actions&lt;/h5&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking'&gt;https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Networking</dc:subject>
    
    
        <dc:subject>Attention Economy</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-18T05:06:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/wwrep">
    <title>WikiWars - A report</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/wwrep</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Bangalore and the Institute of Network Cultures, Amsterdam, hosted  WikiWars – an international event that brought together scholars, researchers, academics, artists and practitioners from various disciplines, to discuss the emergence and growth of Wikipedia and what it means for the information societies we inhabit. With participants from 15 countries making presentations about Wikipedia and the knowledge ecology within which it exists, the event saw a vigorous set of debates and discussions as questions about education, pedagogy, language, access, geography, resistance, art and subversion were raised by the presenters. The 2 day event marked the beginning of the process that hopes to produce the first critical reader – Critical Point of View (CPOV) - that collects key resources for research and inquiry around Wikipedia.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The
debates around Wikipedia, the de facto dynamic knowledge production system
online, are very fairly divided into two competing camps. There is a group of
people who swear by Wikipedia – celebrating its democratic processes of
knowledge production, ease of access, and the de-canonisation of knowledge to
produce the ‘WikiWay’; And then there is a group of people who swear at
Wikipedia – raising concerns over authenticity, reliability, vulgarisation of
knowledge and the de-hierarchisation of knowledge systems that Wikipedia seems
to embody. The debates between the two groups are often passionate and situated
in wildly speculative and often personal interests and investments in Wikipedia
and the Web 2.0 Information Revolution that it seems to be a symptom of. The
debates also play out in various international locations, most of them relying
on personal anecdotes, experiences and half hearted data that does not stand
the tests of rigour.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;WikiWars,
then, concentrated on things which are about Wikipedia but also not about Wikipedia.
In many ways, as Geert Lovink, the Director of INC suggested, WikiWars was a
recognition of the fact that Wikipedia has come of age and can now be
systematically and philosophically examined as a work in progress that has
long-term implications about our future. It was the ambition of the Editorial
team (consisting of Geert Lovink, Sabine Nerdeer, Nathaniel Tkacz, Johanna
Niyesito, Sunil Abraham and Nishant Shah) to veer away from the recognised
battle-lines drawn in, around and about Wikipedia, and instead examine the
fault-lines that run under many of our assumptions, prejudices and imaginations
of Wikipedia. And Wikiwars, through careful screening and invested interests,
became one of the first platforms in the world to initiate a critical discourse
on Wikipedia, seeking to engage with its histories, it contemporary
manifestations and practices, and the futures that it seeks to inhabit.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The
different presentations brought in located debates, theoretical and
philosophical concepts and personal experiences to build frameworks that
explain and contextualise Wikipedia as one of the most contested spaces online.
The eight panels across two days dealt with four major thematic areas which
need to be summarised in brief:&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpFirst"&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;&lt;u&gt;Education, Pedagogy and
Knowledge:&lt;/u&gt;&lt;/strong&gt; At the very basis of Wikipedia (and
other structures like it) is the question of knowledge production, the
possibility of using it as an educational tool and the potentials it has for
introducing new pedagogies and learning practices in and outside of institutionalised
education. Presenters from various disciplines engaged with these questions in
interesting ways.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpFirst"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;Usha
Raman from Teacher Plus in Hyderabad, brought in the question of primary
education, the need for teacher training programmes and the ways by which
infrastructure development needs to be thought through when talking of
Wikipedia and education in the Indian context. The
necessity of locating Wikipedia in a much larger debates on learning were also
echoed by Noopur Rawal and Srikeit Tadepalli, students from Christ University
who brought their experience of Wikipedia and the expectations from classroom
education and learning in their presentation.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;In
the same field, but from a different approach, a panel&amp;nbsp; examined Wikipedia as a site to critique
Western Knowledge production systems. Stian Haklev and Johanna Niyesito
concentrated on the questions of language and knowledge production. Haklev made
an impassioned argument deconstructing the utopian idea of Wikipedia’s
multilingual dreams and instead made a call for recognising the black-holes
when it comes to non-English production and consumption of knowledge on
Wikipedia. He further explored the implications that linguistic imbalance has
on the very governance structure of Wikipedia and its communities. Niyesito
challenged the ‘global’ and ‘cosmopolitan’ image that Wikipedia has built for
itself and posited the idea of Wikipedia as a translingual space where
different languages and cultures negotiate common understandings and processes
of producing knowledge. HanTeng
Liao explored knowledge production through the market economy of key-words to
see how the linguistic biases of search engines that harvest these keywords,
determines the access and visibility of different Wikipedia pages.&lt;/p&gt;
&lt;strong&gt;&lt;u&gt;Resistance, Diversity
and Representation:&lt;/u&gt;&lt;/strong&gt; &amp;nbsp;While these questions were present as
undercurrents to most of the presentations at WikWars, they were perhaps most
fiercely present in the debates that followed the presentations by Eric Ilya
Lee (Academia Sinica, Taiwan), YiPing Tsou (National Central University,
Taiwan), William Beutler and Eric Zimmerman (IDC, Israel).
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;For
Lee and Tsou, the responses to the Chinese language Wikipedia from popular
media and personal experiences, were demonstrative of the fact that the lack of
diverse means of representation and participation lead to a strong resistance
of Wikipedia in Taiwan. Beutler
looked at the heavily contested editorial space and policies of Wikipedia to
make a point about how lack of effective governance systems based on
mutual&amp;nbsp; tolerance and diversity lead to
stressful and often traumatic experiences for users who might not be
represented through the mainstream ideas and&amp;nbsp;
ideologies of an English speaking populace.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;Zimmerman
took a startling position, calling for a regime of attribution and dissolving
the pseudonymous structures of knowledge production in Wikipedia in order to
build designs of trust and verification into the system, thus leading to better
and more credible research tools and representations.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;The
tone of debates was altered with presentations by Mark Graham (Oxford Research
Institute) and the team of artists Nathaniel Stern and Scott Kildal, the team
responsible for the Wikipedia Art Project. Graham
showed the complexity of visualising space and how the production of space (or
physical geography) on Wikipedia often reflects the virtual density of access
and presence online. Showing a nuanced set of images that help mapping these
new geographies for a richer diversity and representation, Graham showed how
systems like Wikipedia ‘cannot know what they cannot know’ despite the reliance
on the wisdom of crowds.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;Stern
and Kildall, in giving an account of their project which used Wikipedia’s
policies to undermine and challenge it, show how the institutionalisation of a
space and its ‘canonisation’ can quickly lead to a new set of problems where
the space becomes the very thing it had set itself against.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;&lt;u&gt;Politics of Free, Open
and Exclusion:&lt;/u&gt;&lt;/strong&gt; The rhetoric of free and open have been
built into all popular discourses around Wikipedia. However, the presentations
at WikiWars showed that these need to be taken with at least a pinch of salt
and further examined for what they signify. Alok
Nandi of Architempo made a dramatic and creative revisit of these guiding
principles of Wikipedia. He showed how an inquiry into rituals of
participation, distortion and access on Wikipedia can promote, not merely
looking at the politics of exclusion but also at the politics of inclusion and
the problems therein.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;Dror
Kamir’s evocative narrative of ‘Your side, my side and Wikipedia’ illustrated
how the question of boundaries, of knowledges, of facts and truths get
distorted as language, community, nationality, etc. come into play in recording
and documenting knowledge on Wikipedia. Concentrating on conflict zones in the
Middle East, he talked about the lack and perhaps the impossibility of
producing neutrality the way in which Wikipedia demands of its users. These
ideas resonated with the propositions that ShunLing Chen from Harvard had
floated in the opening panel to explore the ‘boundary work’ of Wikipedia and
how it defines and produces itself in relation to external forces and
controversies. These
discussions on the politics of presence, absence, inclusion and exclusion were
further layered by presentations by Linda Gross, Elad Weider, Heather Ford and
Nathaniel Tkacz who produced a critique of the Free and Open, taking a
cautionary step away from accepting these as inherently good.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;While
Gross explored the structure of egalitarianism that Wikipedia builds for
itself, Ford presented an analysis of the licensing regimes of the knowledge
produced within Wikipedia and the problems they pose to traditional knowledges
and non-mainstream information. Weider,
trained as a lawyer, critiqued the neo-liberal discourse around Wikipedia and
tried to correlate the communities with markets. Tkacz’s historical overview of
Free and Open, resulted in a compelling inquiry into the very structures that
inform the shape and functioning of objects like Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Twitter:
#WikiWars &lt;a href="http://twitter.com/wikiwars"&gt;http://twitter.com/wikiwars&lt;/a&gt;
and &lt;a href="http://www.twitter.com/jackerhack/wikiwars"&gt;www.&lt;strong&gt;twitter&lt;/strong&gt;.com/jackerhack/&lt;strong&gt;wikiwars&lt;/strong&gt;&lt;/a&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Flickr:
&lt;a href="http://www.flickr.com/photos/30479432@N03/sets/72157623193288710/"&gt;http://www.flickr.com/photos/30479432@N03/sets/72157623193288710/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;

CPOV blog : &lt;a href="http://networkcultures.org/wpmu/cpov/"&gt;http://networkcultures.org/wpmu/cpov/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The videos fom the Wikiwars event are embedded below:&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHM_HIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHM_QoA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHM_RgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHM_z4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN2T4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN2gMA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN2iUA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN2z0A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN3C4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN3QYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN3QYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOgCwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOgGgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOgiUA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOqA4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOqxYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOrhIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOrm4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOrycA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOzEoA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHQoxAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHQo3MA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHSrGAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHSsTcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHToz8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUuGIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUuTIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUugsA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUvW8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUvk8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHVuwwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHdpxMA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHdz3IA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHd0DMA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHd0iYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf4nkA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf404A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf43AA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf5EIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf5zYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHghjkA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgh0EA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgiAIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgiFcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgiUMA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgijUA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgjjIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgjyAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgjzwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgj1QA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgkCQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgkE8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgkHEA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgkTcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg3n8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg3zgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg4GIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg5ykA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg52gA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHhjUEA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHhr04A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHhsAcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh10oA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh114A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh%2B0AA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh%2B2EA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh_AcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh_A8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh_lQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh_w4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjmiIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjnHEA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjuxkA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjuzwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjvRUA"&gt;&lt;/embed&gt;

&lt;embed height="270" width="320" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHj4kEA"&gt;&lt;/embed&gt;



        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/wwrep'&gt;https://cis-india.org/research/conferences/conference-blogs/wwrep&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>CPOV</dc:subject>
    

   <dc:date>2010-10-06T11:21:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/arguments-against-software-patents">
    <title>Arguments Against Software Patents in India</title>
    <link>https://cis-india.org/a2k/blogs/arguments-against-software-patents</link>
    <description>
        &lt;b&gt;CIS believes that software patents are harmful for the software industry and for consumers.  In this post, Pranesh Prakash looks at the philosophical, legal and practical reasons for holding such a position in India.  This is a slightly modified version of a presentation made by Pranesh Prakash at the iTechLaw conference in Bangalore on February 5, 2010, as part of a panel discussing software patents in India, the United States, and the European Union.&lt;/b&gt;
        
&lt;p&gt;This blog post is based on a presentation made at the &lt;a href="http://www.itechlaw-india.com/"&gt;iTechLaw conference&lt;/a&gt; held on February 5, 2010.  The audience consisted of lawyers from various corporations and corporate law firms.  As is their wont, most lawyers when dealing with software patents get straight to an analysis of law governing the patenting of computer programmes in India and elsewhere, and seeing whether any loopholes exist and can be exploited to patent software.  It was refreshing to see at least some lawyers actually going into questions of the need for patents to cover computer programs.  In my presentation, I made a multi-pronged case against software patents: (1) philosophical justification against software patents based on the nature of software; (2) legal case against software patents; (3) practical reasons against software patents.&lt;/p&gt;
&lt;h2&gt;Preamble&lt;/h2&gt;
&lt;p&gt;Through these arguments, it is sought to be shown that patentability of software is not some arcane, technical question of law, but is a real issue that affect the continued production of new software and the everyday life of the coder/hacker/software programmer/engineer as well as consumers of software (which is, I may remind you, everywhere from your pacemaker to your phone).  A preamble to the arguments would note that the main question to ask is: &lt;strong&gt;why should we allow for patenting of software&lt;/strong&gt;?  Answering this question will lead us to ask: &lt;strong&gt;who benefits from patenting of software&lt;/strong&gt;.  The conclusion that I come to is that patenting of software helps three categories of people: (1) those large software corporations that already have a large number of software patents; (2) those corporations that do not create software, but only trade in patents / sue on the basis of patents ("patent trolls"); (3) patent lawyers.  How they don't help small and medium enterprises nor society at large (since they deter, rather than further invention) will be borne out by the rest of these arguments, especially the section on practical reasons against software patents.&lt;/p&gt;
&lt;h2&gt;What are Patents?&lt;/h2&gt;
&lt;p&gt;Patents are a twenty-year monopoly granted by the State on any invention.  An invention has to have at least four characteristics: (0) patentable subject matter; (1) novelty (it has to be new); (2) inventive step / non-obviousness (even if new, it should not be obvious); (3) application to industry.  A monopoly over that invention, thus means that if person X has invented something, then I may not use the core parts of that invention ("the essential claims") in my own invention.  This prohibition applies even if I have come upon my invention without having known about X's invention.  (Thus, independent creation is not a defence to patent infringement.  This distinguishes it, for instance, from copyright law in which two people who created the same work independently of each other can both assert copyright.)  Patents cover non-abstract ideas/functionality while copyright covers specific expressions of ideas.  To clarify: imagine I make a drawing of a particular machine and describe the procedure of making it.  Under patent law, no one else can make that particular machine, while under copyright law, no one can copy that drawing.&lt;/p&gt;
&lt;h2&gt;Philosophical Justification Against Software Patents&lt;/h2&gt;
&lt;p&gt;Even without going into the case against patents &lt;em&gt;per se&lt;/em&gt; (lack of independent creation as a defence; lack of 'harm' as a criterion leading to internalization of all positive externalities; lack of effective disclosure and publication; etc.), which has been done much more ably by others like &lt;a href="http://www.researchoninnovation.org/"&gt;Bessen &amp;amp; Meurer&lt;/a&gt; (especially in their book &lt;a href="http://researchoninnovation.org/dopatentswork/"&gt;Patent Failure&lt;/a&gt;) and &lt;a href="http://www.againstmonopoly.org/"&gt;Boldrin &amp;amp; Levine&lt;/a&gt; (in their book &lt;a href="http://levine.sscnet.ucla.edu/general/intellectual/againstnew.htm"&gt;Against Intellectual Monopoly&lt;/a&gt;, the full text of which is available online).&lt;/p&gt;
&lt;p&gt;But there is one essentially philosophical argument against software as subject matter of a patent.  Software/computer programs ("instructions for a computer"), as any software engineer would tell you, are merely &lt;a href="http://en.wikipedia.org/wiki/Algorithm"&gt;algorithms&lt;/a&gt; ("an effective method for solving a problem using a finite sequence of instructions") that are meant to be understood by a computer or a human who knows how to read that code.&lt;/p&gt;
&lt;p&gt;Algorithms are not patentable subject matter, as they are mere expressions of abstract ideas, and not inventions in themselves.  Computer programs, similarly, are abstract ideas.  They only stop being abstract ideas when embodied in a machine or a process in which it is the machine/process that is the essential claim and not the software.  That machine or process being patented would not grant protection to the software itself, but to the whole machine or process.  Thus the abstract part of that machine/process (i.e., the computer program) could be used in any other machine/process, as it it is not the subject matter of the patent.  Importantly, just because software is required to operate some machine would then not mean that the machine itself is not patentable, just that the software cannot be patented in guise of patenting a machine.&lt;/p&gt;
&lt;h2&gt;Legal Case Against Software Patents&lt;/h2&gt;
&lt;p&gt;In India, section 3(k) of the Patent Act reads:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;(3) The following are not inventions within the meaning of this Act: (k) a mathematical or business method or computer programme (&lt;em&gt;sic&lt;/em&gt;) &lt;em&gt;per se&lt;/em&gt; or algorithms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As one can see, computer programs are place in the same category as "mathematical methods", "algorithms", and "business methods", hence giving legal validity to the idea propounded in the previous section that computer programs are a kind of algorithms (just as algorithms are a kind of mathematical method).&lt;/p&gt;
&lt;p&gt;Be that as it may, the best legal minds in India have had to work hard at understanding what exactly "computer programme &lt;em&gt;per se&lt;/em&gt;" means.  They have cited U.S. case law, U.K. case law, E.U. precedents, and sought to arrive at an understanding of how &lt;em&gt;per se&lt;/em&gt; should be understood.  While understanding what &lt;em&gt;per se&lt;/em&gt; means might be a difficult job, it is much easier to see what it does &lt;em&gt;not&lt;/em&gt; mean.  For that, we can look at the 2004 Patent Ordinance that Parliament rejected in 2005.  In that ordinance, sections 3(k) and (ka) read as follows:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;(3) The following are not inventions within the meaning of this Act: (k) a computer programme &lt;em&gt;per se&lt;/em&gt; other than its technical application to industry or a combination with hardware; (ka) a mathematical method or a business method or algorithms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Thus, it is clear that the interpretation that "computer programme &lt;em&gt;per se&lt;/em&gt;" excludes "a computer programme that has technical application to industry" and "a computer programme in combination with hardware" is wrong.  By rejecting the 2004 Ordinance wording, Parliament has clearly shown that "technical application to industry" and "combination with hardware" do not make a computer programme patentable subject matter.&lt;/p&gt;
&lt;p&gt;Indeed, what exactly is "technical application to industry"?  &lt;a href="http://wordnetweb.princeton.edu/perl/webwn?s=technical"&gt;"Technical"&lt;/a&gt; has various definitions, and a perusal through those definitions would show that barely any computer program can be said not to relate to a technique, not involve "specialized knowledge of applied arts and sciences" (it is code, after all; not everyone can write good algorithms), or not relate to "a practical subject that is organized according to scientific principles" or is "technological".  Similarly, all software is, &lt;a href="http://wordnetweb.princeton.edu/perl/webwn?s=software"&gt;by definition&lt;/a&gt;, meant to be used in combination with hardware.  Thus, it being used in combination with hardware must not, as argued above, give rise to patentability of otherwise unpatentable subject matter category.&lt;/p&gt;
&lt;p&gt;In 2008, the Patent Office published a new 'Draft Manual Of Patent Practice And Procedure' in which it sought to allow patenting of certain method claims for software inventions (while earlier the Patent Office objected to method claims, allowing only device claims with hardware components).  This Draft Manual was withdrawn from circulation, with Shri N.N. Prasad (then Joint Secretary of DIPP, the department administering the Patent Office) noting that the parts of the Manual on sections 3(d) and 3(k) had generated a lot of controversy, and were &lt;em&gt;ultra vires&lt;/em&gt; the scope of the Manual (which could not override the Patent Act).  He promised that those parts would be dropped and the Manual would be re-written.  A revised draft of the Manual has not yet been released.  Thus the interpretation provided in the Draft Manual (which was based heavily on the interpretation of the U.K. courts) cannot not be relied upon as a basis for arguments in favour of the patentability of software in India.&lt;/p&gt;
&lt;p&gt;In October 2008, CIS helped organize a &lt;a href="https://cis-india.org/advocacy/openness/blog/the-national-public-meeting-on-software-patents"&gt;National Public Meeting on Software Patents&lt;/a&gt; in which Indian academics, industry, scientists, and FOSS enthusiasts all came to the conclusion that software patents are harmful for &lt;a href="https://cis-india.org/openness/software-patents/software-patenting-will-harm-industry-consumer"&gt;both the industry as well as consumers&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Practical Reasons Against Software Patents&lt;/h2&gt;
&lt;p&gt;This is going to be an attempt at distilling and simplifying some of the main practical arguments against patenting of software.&lt;/p&gt;
&lt;p&gt;There are traditionally &lt;a href="http://www.patenthawk.com/blog/2005/04/patent_economics_part_4_incent.html"&gt;four incentives that the patent system caters to&lt;/a&gt;: (1) incentive to invent; (2) incentive to disclose; (3) incentive to commercialize; and (4) incentive to invent substitutes.  Apart from the last, patenting of software does not really aid any of them.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;h3&gt;Patent Landmines / Submarine Patents / Patent Gridlocks / No Exception for Independent Creation&lt;/h3&gt;
&lt;p&gt;Given that computer programs are algorithms, having monopolies over such abstract ideas is detrimental to innovation.  Just the metaphors say a lot about software patents: landmines (they cannot be seen/predicted); submarines (they surface out of the blue); gridlocks (because there are so many software patents around the same area of computing, they prevent further innovation in that area, since no program can be written without violating one patent or the other).&lt;/p&gt;
&lt;p&gt;Imagine the madness that would have ensued had patents been granted when computer programming was in its infancy.  Imagine different methods of sorting (quick sort, bubble sort) that are part of Computer Science 101 had been patented.  While those particular instances aren't, similar algorithms, such as data compression algorithms (including the infamous &lt;a href="http://en.wikipedia.org/wiki/LZW"&gt;LZW compression method&lt;/a&gt;), have been granted patents.  Most importantly, even if one codes certain functionality into software independently of the patent holder, that is still violative of the patent.  Computer programs being granted patents makes it extremely difficult to create other computer programs that are based on the same abstract ideas.  Thus incentives # (1) and (3) are not fulfilled, and indeed, they are harmed.  There is no incentive to invent, as one would always be violating one patent or the other.  Given that, there is no incentive to commercialize what one has invented, because of fear of patent infringement suits.&lt;/p&gt;
&lt;p&gt;An apt illustration of this is the current difficulty of choosing a royalty-free video format for HTML 5, as it shows, in practical terms, how difficult it is to create a video format without violating one patent or the other.  While the PNG image format was created to side-step the patent over the LZW compression method used in the GIF image format, bringing Ogg Theora or Dirac (both patent-free video format) to surpass the levels of H.264/MPEG-4 AVC or VC-1 will be very difficult without infringing dozens if not hundreds of software patents.   Chris DiBona of Google, while talking about &lt;a href="http://www.mail-archive.com/whatwg@lists.whatwg.org/msg15476.html"&gt;improving Ogg Theora&lt;/a&gt; as part of its inclusion in HTML 5 specifications said, "Here’s the challenge: Can Theora move forward without infringing on the other video compression patents?"  Just &lt;a href="http://74.125.153.132/search?q=cache:jRnXmHcZCMsJ:www.mpegla.com/Lists/MPEG%2520LA%2520News%2520List/Attachments/140/n_03-11-17_avc.html+http://www.mpegla.com/news/n_03-11-17_avc.html&amp;amp;cd=2&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in"&gt;the number of companies and organization that hold patents over H.264&lt;/a&gt; is astounding, and includes: Columbia University, Electronics and Telecommunications Research Institute of Korea (ETRI), France Télécom, Fujitsu, LG Electronics, Matsushita, Mitsubishi, Microsoft, Motorola, Nokia, Philips, Robert Bosch GmbH, Samsung, Sharp, Sony, Toshiba, and Victor Company of Japan (JVC).  As is the amount of royalties to be paid ("[t]he maximum royalty for these rights payable by an Enterprise (company and greater than 50% owned subsidiaries) is $3.5 million per year in 2005-2006, $4.25 million per year in 2007-08 and $5 million per year in 2009-10"; with royalty per unit of a decoder-encoder costing upto USD 0.20.)&lt;/p&gt;
&lt;p&gt;Indeed, even the most diligent companies cannot guard themselves against software patents.  FFII estimates that a very simple online shopping website &lt;a href="http://webshop.ffii.org"&gt;would violate twenty different patents at the very least&lt;/a&gt;. Microsoft recently lost a case against i4i when i4i surfaced with a patent covering custom XML as implemented in MS Office 2003 and MS Office 2007.  As a result Microsoft had to ship patches to its millions of customers, to disable the functionality and bypass that patent.  The manufacturers of BlackBerry, the Canadian company Research in Motion, had to shell out &lt;a href="http://en.wikipedia.org/wiki/NTP,_Inc.#RIM_patent_infringement_litigation"&gt;USD 617 million as settlement&lt;/a&gt; to NTP over wireless push e-mail, as it was otherwise faced with the possibility of the court shutting down the BlackBerry service in the U.S.  This happened despite there being a well-known method of doing so pre-dating the NTP patents.  NTP has also filed cases against AT&amp;amp;T, Sprint Nextel, T-Mobile, Verizon Wireless, and Palm Inc.  &lt;a href="http://copyfight.corante.com/archives/2005/12/15/rimntp_mud_splashes_microsoft.php"&gt;Microsoft was also hit by Visto Corporation&lt;/a&gt; over those same NTP patents, which had been licensed to Visto (a startup).&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;h4&gt;Don't These Cases Show How Software Patents Help Small Companies?&lt;/h4&gt;
&lt;p&gt;The astute reader might be tempted to ask: are not all of these examples of small companies getting their dues from larger companies?  Doesn't all of this show that software patents actually help small and medium enterprises (SMEs)?  The answer to that is: no.  To see why, we need to note the common thread binding i4i, NTP, and Visto.  None of them were, at the time of their lawsuits, actually creating new software, and NTP was an out-and-out "non-practising entity"/"patent holding company" AKA, patent troll.  i4i was in the process of closing shop, and Visto had just started up.  None of these were actually practising the patent.  None of these were producing any other software.  Thus, none of these companies had anything to lose by going after big companies.  In other words, the likes of Microsoft, RIM, Verizon, AT&amp;amp;T, etc., could not file counter-suits of patent infringement, which is normally what happens when SMEs try to assert patent rights against larger corporations.  For every patent that the large corporation violates of the smaller corporation, the smaler corporation would be violating at least ten of the larger corporation's.  Software patents are more helpful for software companies as a tool for cross-licensing rather than as a way of earning royalties.  Even this does not work as a strategy against patent trolls.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Thus, the assertion that was made at the beginning is borne out: software patents help only patent trolls, large corporations that already have large software patent portfolios, and the lawyers who draft these patents and later argue them out in court.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;h3&gt;Term of Patents&lt;/h3&gt;
&lt;p&gt;Twenty years of monopoly rights is outright ludicrous in an industry where the rate of turnover of technology is much faster -- anywhere between two years and five months.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Software Industry Progressed Greatly Without Patents&lt;/h3&gt;
&lt;p&gt;In India, software patents have never been asserted in courts (even though many have been &lt;a href="https://cis-india.org/advocacy/openness/blog/the-national-public-meeting-on-software-patents"&gt;illegally granted&lt;/a&gt;), yet the software industry in India is growing in leaps and bounds.  Similarly, most of the big (American) giants of the software industry today grew to their stature by using copyright to "protect" their software, and not patents.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Copyright Exists for Software&lt;/h3&gt;
&lt;p&gt;As noted above, the code/expression of any software is internationally protected by copyright law.  There is no reason to protect the ideas/functionality of that software as well.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Insufficient Disclosure&lt;/h3&gt;
&lt;p&gt;When ordinary computer programmers cannot understand what a particular software patent covers (which is the overwhelming case), then the patent is of no use.  One of the main incentives of the patent system is to encourage gifted inventors to share their genius with the world.  It is not about gifted inventors paying equally gifted lawyers to obfuscate their inventions into gobbledygook so that other gifted inventors can at best hazard a guess as to precisely what is and is not covered by that patent.  Thus, this incentive (#2) is not fulfilled by the current system of patents either -- not unless there is a major overhaul of the system.  This ties in with the impossibility of ensuring that one is not violating a software patent.  If a reasonably smart software developer (who are often working as individuals, and as part of SMEs) cannot quickly ascertain whether one is violating patents, then there is a huge disincentive against developing software in that area at all.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Software Patents Work Against Free/Libre/Open Source Software&lt;/h3&gt;
&lt;p&gt;Software patents hinder the development of software and FOSS licences, as the licensee is not allowed to restrict the rights of the sub-licensees over and above the restrictions that the licensee has to observe.  Thus, all patent clearances obtained by the licensee must be passed on to the sub-licensees.  Thus, patented software, though most countries around the world do not recognize them, are generally not included in the default builds of many FOSS operating systems.  This inhabits the general adoption of FOSS, since many of the software patents, even though not enforceable in India, are paid heed to by the software that Indians download, and the MP3 and DivX formats are not enabled by default in standard installations of a Linux OS such as Ubuntu.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Currently, the U.S. patent system is being reviewed at the administrative level, the legislative level, as well as the judicial level.  At the judicial level, the question of business method patents (and, by extension, software patents) is before the Supreme Court of the United States of America in the form of &lt;a href="http://en.wikipedia.org/wiki/Bilski_v._Kappos"&gt;&lt;em&gt;Bilski v. Kappos&lt;/em&gt;&lt;/a&gt;.  Judge Mayer of the Court of Appeals for the Federal Circuit (CAFC, which heard &lt;em&gt;In re Bilksi&lt;/em&gt;) noted that "the patent system has run amok".  The Free Software Foundation submitted a most extensive &lt;a href="http://endsoftpatents.org/amicus-bilski-2009"&gt;&lt;em&gt;amicus curiae&lt;/em&gt; brief&lt;/a&gt; to the U.S. Supreme Court, filled with brilliant analysis of software patents and arguments against the patentability of software that is well worth a read.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/arguments-against-software-patents'&gt;https://cis-india.org/a2k/blogs/arguments-against-software-patents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    

   <dc:date>2012-03-13T10:43:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
