<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1751 to 1765.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/cpov"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/wwrep"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/arguments-against-software-patents"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/print-impaired-millions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/de-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-fourth-IGF"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/year-ahead-copyright-2010"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/right-to-read-campaign"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/emerging-issues-social-networks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/wiki-worth-different-turf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/whistle-blowers-unite"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/time-out-software-patenting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/world-day-against-software-patents"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/cpov">
    <title>CPOV : Wikipedia Research Initiative</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/cpov</link>
    <description>
        &lt;b&gt;The Second event, towards building the Critical Point of View Reader on Wikipedia, brings a range of scholars, practitioners, theorists and activists to critically reflect on the state of Wikipedia in our contemporary Information Societies. Organised in Amsterdam, Netherlands, by the Institute of Network Cultures, in collaboration with the Centre for Internet and Society, Bangalore, the event builds on the debates and discussions initiated at the WikiWars that launched off the knowledge network in Bangalore in January 2010. Follow the Live Tweets at #CPOV&lt;/b&gt;
        
&lt;p&gt;Second international conference of the &lt;em&gt;CPOV Wikipedia Research 
Initiative&lt;/em&gt; :: March 26-27, 2010 :: OBA (Public Library Amsterdam, 
next to Amsterdam central station), Oosterdokskade 143, Amsterdam.&lt;/p&gt;
&lt;p&gt;Wikipedia is at the brink of becoming the de facto global reference 
of dynamic knowledge. The heated debates over its accuracy, anonymity, 
trust, vandalism and expertise only seem to fuel further growth of 
Wikipedia and its user base. Apart from leaving its modern counterparts 
Britannica and Encarta in the dust, such scale and breadth places 
Wikipedia on par with such historical milestones as Pliny the Elder’s 
Naturalis Historia, the Ming Dynasty’s Wen-hsien ta- ch’ eng, and the 
key work of French Enlightenment, the Encyclopedie. &lt;span id="more-10604"&gt;&lt;/span&gt;The multilingual Wikipedia as digital 
collaborative and fluid knowledge production platform might be said to 
be the most visible and successful example of the migration of FLOSS 
(Free/ Libre/ Open Source Software) principles into mainstream culture. 
However, such celebration should contain critical insights, informed by 
the changing realities of the Internet at large and the Wikipedia 
project in particular.&lt;/p&gt;
&lt;p&gt;The CPOV Research Initiative was founded from the urge to stimulate 
critical Wikipedia research: quantitative and qualitative research that 
could benefit both the wide user-base and the active Wikipedia community
 itself. On top of this, Wikipedia offers critical insights into the 
contemporary status of knowledge, its organizing principles, function, 
and impact; its production styles, mechanisms for conflict resolution 
and power (re-)constitution. The overarching research agenda is at once a
 philosophical, epistemological and theoretical investigation of 
knowledge artifacts, cultural production and social relations, and an 
empirical investigation of the specific phenomenon of the Wikipedia.&lt;/p&gt;
&lt;p&gt;Conference Themes: Wiki Theory, Encyclopedia Histories, Wiki Art, 
Wikipedia Analytics, Designing Debate and Global Issues and Outlooks.&lt;/p&gt;
&lt;p&gt;Follow the live tweets on http://twitter.com/#search?q=%23CPOV&lt;/p&gt;
&lt;p&gt;Confirmed speakers: Florian Cramer (DE/NL), Andrew Famiglietti (UK), 
Stuart Geiger (USA), Hendrik-Jan Grievink (NL), Charles van den Heuvel 
(NL), Jeanette Hofmann (DE), Athina Karatzogianni (UK), Scott Kildall 
(USA), Patrick Lichty (USA), Hans Varghese Mathews (IN), Teemu Mikkonen 
(FI), Mayo Fuster Morell (IT), Mathieu O’Neil (AU), Felipe Ortega (ES), 
Dan O’Sullivan (UK), Joseph Reagle (USA), Ramón Reichert (AU), Richard 
Rogers (USA/NL), Alan Shapiro (USA/DE), Maja van der Velden (NL/NO), 
Gérard Wormser (FR).&lt;/p&gt;
&lt;p&gt;Editorial team: Sabine Niederer and Geert Lovink (Amsterdam), Nishant
 Shah and Sunil Abraham (Bangalore), Johanna Niesyto (Siegen), Nathaniel
 Tkacz (Melbourne). Project manager CPOV Amsterdam: Margreet Riphagen. 
Research intern: Juliana Brunello. Production intern: Serena Westra.&lt;/p&gt;
&lt;p&gt;The CPOV conference in Amsterdam will be the second conference of the
 CPOV Wikipedia Research Initiative. The launch of the initiative took 
place in Bangalore India, with the conference WikiWars in January  2010.
 After the first two events, the CPOV organization will work on  
producing a reader, to be launched early 2011. For more information or 
submitting a &lt;a href="http://networkcultures.org/wpmu/cpov/reader"&gt;reader&lt;/a&gt;
 contribution.&lt;/p&gt;
&lt;p&gt;Buy your ticket &lt;a href="http://networkcultures.org/wpmu/cpov/practical-info/tickets/"&gt;online&lt;/a&gt;
 (with iDeal), or register by sending an email to: info (at) 
networkcultures.org. One day ticket: €25, students and OBA members: 
€12,50. Full conference pass (2 days): €40, students and OBA members:  
25.&lt;/p&gt;
&lt;p&gt;Organized by the Institute of Network Cultures Amsterdam, in 
cooperation with the Centre for Internet and Society in Bangalore, 
India.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/cpov'&gt;https://cis-india.org/research/conferences/conference-blogs/cpov&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2011-08-23T02:52:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly">
    <title>Does the Social Web need a Googopoly?</title>
    <link>https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly</link>
    <description>
        &lt;b&gt;While the utility of the new social tool Buzz is still under question, the bold move into social space taken last week by the Google Buzz team has Gmail users questioning privacy implications of the new feature.  In this post, I posit that Buzz highlights two  privacy challenges of the social web.  First, the application has sidestepped the consensual and contextual qualities desirable of social spaces.  Secondly, Google’s move highlights the increasingly competitive and convergent nature of the social media landscape.  &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Last week, and for many a surprise, Google launched its new
social networking platform, Buzz.&amp;nbsp; The
new service is Google’s effort to amplify the “social nature” of their services
by integrating them under one platform, and adding some extra social utility.&amp;nbsp;&amp;nbsp; The social application runs from the Gmail
interface, but also links other Google accounts a user may have, including
albums on Picasa, and Google Reader.&amp;nbsp; &amp;nbsp;The service also allows for the sharing from
external sources, such as photos on Flickr, and videos from YouTube.&amp;nbsp; The service also allows users to post, like,
or dislike the status updates of others which may be publicly searchable if the
user opts.&amp;nbsp; Before a Gmail user may fully
participate in Google Buzz service, a unique Google Personal Profile must be
created.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;User Consent&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Much of the buzz surrounding the new social networking
service last week wasn’t paying much lip service to the new application.&amp;nbsp; Instead, an uproar of privacy concerns continued
to dominate the Buzz scene, with many critics quickly labeling Buzz a “&lt;a href="http://news.cnet.com/8301-31322_3-10451428-256.html"&gt;privacy nightmare&lt;/a&gt;”.&amp;nbsp; A &lt;a href="http://digitaldaily.allthingsd.com/20100216/epic-files-ftc-complaint-over-google-buzz/?mod=ATD_rss"&gt;formal
complaint&lt;/a&gt; has been already filed with the US Federal Trade Commission in
response to Google’s new privacy violating service.&amp;nbsp; &amp;nbsp;A
second-year Harvard Law student has also filed a &lt;a href="http://abcnews.go.com/Technology/google-buzz-draws-class-action-suit-harvard-student/story?id=9875095&amp;amp;page=1"&gt;class-action
suit&lt;/a&gt; against the company for its privacy malpractices.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Much of the privacy talk thus far has focused on issues of
consent, or lack thereof, in this case.&amp;nbsp; Upon
Buzz’s launch, Gmail users were automatically subscribed as “opting in” for the
service.&amp;nbsp; Google has used the private
address books of millions of Gmail accounts to build social networks from the
contacts users email and chat with most.&amp;nbsp;
To entice users into using the service, Gmail users were set to
auto-follow all of their contacts, and in turn, to be followed by them,
too.&amp;nbsp; Furthermore, all new Buzz users had
been set to automatically share all public Picasa albums and Google Reader items
with their new social graph.&amp;nbsp; It is
argued that social network services should be &lt;a href="http://jonoscript.wordpress.com/2010/02/20/buzz-off-google-social-networks-should-always-be-opt-in-not-opt-out/"&gt;opt-in,
rather than opt-out&lt;/a&gt;, and that Buzz has violated the consensual nature of
the social web.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Illuminating the complications of building a social graph
from ones inbox is the story of an Australian women, who remains anonymous.&amp;nbsp; As she claims, most of the emails currently received
through her Gmail account, are those from her abusive ex-boyfriend.&amp;nbsp; Due to Google’s assumption that Gmail users
would like to be “auto-followed” by their Gmail contacts (mirroring Twitters friendship
protocol), items shared between herself and new boyfriend through her Google
reader account had become public to her broader social graph, including her
ex-boyfriend and his harassing friends.&lt;/p&gt;
&lt;p&gt;In a &lt;a href="http://www.gizmodo.com.au/2010/02/fck-you-google/"&gt;blog response&lt;/a&gt;
directed to Google’s Buzz team, the woman scornfully wrote- “&lt;em&gt;F*ck you, Google. My privacy concerns are
not trite. They are linked to my actual physical safety, and I will now have to
spend the next few days maintaining that safety by continually knocking down
followers as they pop up. A few days is how long I expect it will take before
you either knock this shit off, or I delete every Google account I have ever
had and use Bing out of f*cking spite&lt;/em&gt;”.&amp;nbsp;
As this case demonstrates, the people we mail most often may not be our
closest friends. &amp;nbsp;&amp;nbsp;As email has replaced
the telephone for many as the dominate mode of communication--some contacts may
be friends, however, many others may not be. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;In response to the uproar, tweaks to Buzz’s privacy features
have since been made.&amp;nbsp; Todd Jackson,
Buzz’s product manager, has also posted a &lt;a href="http://gmailblog.blogspot.com/2010/02/millions-of-buzz-users-and-improvements.html"&gt;public
apology&lt;/a&gt; to the official Gmail Blog late last week for not “getting
everything quite right”.&amp;nbsp; The service will
now assume the more user-centric “auto-suggest” model, allowing users to selectively
choose the contacts they wish to follow, and will also no longer auto-link Picasa
and Reader content.&amp;nbsp; However, as the &lt;a href="http://digitaldaily.allthingsd.com/20100216/epic-files-ftc-complaint-over-google-buzz/?mod=ATD_rss"&gt;EPIC’s
complaint notes&lt;/a&gt;, many are still unsatisfied with the opt-out nature of the
service, arguing that users should be able to opt-into the service if they so
choose, rather than having to delist themselves for a service they didn’t necessarily
sign up.&amp;nbsp; Ethical quandaries also still
loom over Google’s misuse of the users’ private contact lists to jumpstart
their new service.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contextual Integrity &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacks on personal privacy resulting from Google’s model
are vast.&amp;nbsp; As the case of the Australian
woman illuminates, the concept of the “online friend” has completely taken out
of context with Buzz’s initial auto-follow model.&amp;nbsp; Many of the contacts we make on a daily basis
need not be made public through the Google profile.&amp;nbsp; For most, this Buzz’s privacy breach may be
benign or annoying at most. However, those who are engaged in sensitive social
or political relationships via their Gmail chat or email accounts, the revelation
of common contact could have been potentially damaging for many. &amp;nbsp;A reporter from CNET has cleverly labeled
Buzz’ as a “&lt;a href="http://news.cnet.com/8301-17939_109-10451703-2.html"&gt;socially
awkward networking&lt;/a&gt;”, as bringing diverse contacts under one umbrella
doesn’t exactly make the most social sense. In response, Gmail users are
required to sort through and filter their Buzz followers according, or choose
to disable the service all together.&lt;/p&gt;
&lt;p&gt;Besides questions of who is stalking whom, the assumptive
and public nature of Google’s&amp;nbsp; new move
has cast a shadow of doubt among Gmail users regarding the ability of Google to
maintain the privacy and contextual integrity of the Gmail account.&amp;nbsp; Should one account be the place to socialize,
and&amp;nbsp; “do business”?&amp;nbsp; Gmail is, and should remain, an email
service.&amp;nbsp; However, Buzz takes the email
experience into new and questionable grounds.&amp;nbsp;
Do Gmail users feel entirely comfortable having their personal email,
social graph, and chat functions all coming under the auspices of one platform?
&amp;nbsp;&amp;nbsp;Many users felt they had been lured
into using a social networking service that they didn’t sign up for in the
first place. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Social Media Competition&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In addition to Google’s attempt to integrate their various
service offerings, Buzz is seen as an obvious attempt to bolster
competitiveness in the social media market.&amp;nbsp;
In 2004, Google released Orkut. While the service has become big in
countries such as Brazil and India, it has been overshadowed by sites such as
Facebook in other jurisdictions, and has not been able to prove itself as a mainstream
space for networking.&amp;nbsp; In the past year, Google
had also launched Google Wave, a tool that mixes e-mail, with instant messaging
and the ability for several people to collaborate on documents.&amp;nbsp; However, the application failed to completely
win over audiences, and was considered one of the &lt;a href="http://www.readwriteweb.com/archives/top_10_failures_of_2009.php"&gt;top
failures of 2009&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With Google unable to effectively saturate the social media
ecosystem, Buzz is an attempt to compete with the searchable and real time
experiences provided by social media giants, Facebook and Twitter.&amp;nbsp; Increased competition within the social media
market could be a positive development for privacy, as social media companies
could arguably be compete on their ability to provide users with preferable privacy
architectures.&amp;nbsp; To the contrary, however,
such competition has thus far had negative ramifications for user privacy, as
the recent Buzz and Facebook moves illustrates.&amp;nbsp;
Facebook’s loosened privacy settings were a &lt;a href="http://www.economist.com/specialreports/displaystory.cfm?story_id=15350984"&gt;competitive
knee-jerk&lt;/a&gt; to Twitters searchable and real time experience.&amp;nbsp; Through a Twitter search, individuals can
come to know what people are saying about a certain topic, event, or product,
and as a result, the service has received a great deal attention from users,
and non-users such as advertisers, alike.&amp;nbsp;
&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In an attempt to one-up, their competition, the “Twitterization”
of Facebook followed in two distinct stages.&amp;nbsp;
First was with the implementation of the Facebook News Feed, which gave
users a real time account of actions their friends on the site.&amp;nbsp; Many argued that this feature invaded user
privacy.&amp;nbsp; However, it was argued by
Facebook that they only were making available information that was already
accessible through individual profile pages.&amp;nbsp;
The News Feed, as it happens, effectively took user information and
actions on the site out of original context by streaming this information live
for others easy viewing.&amp;nbsp; Information
users once had to rummage for had become accessible in real time on the
homepage of the service.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Secondly, Facebooks’ recent &lt;a href="http://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changes-good-bad-and-ugly"&gt;privacy
scandal&lt;/a&gt; was a step towards making profile information more searchable and accessible
to third parties, as is most often the case with the more public feeds on Twitter.&amp;nbsp; As &lt;a href="https://cis-india.org/openness/blog-old/•%09http:/www.simplyzesty.com/twitter/unrelenting-twitterization-facebook-continues/"&gt;one
commentator notes&lt;/a&gt;, &amp;nbsp;&amp;nbsp;“&lt;em&gt;Facebook used to be very private but private
is not great for search, to have great search you need all of the data to be
publicly available as it mostly is on Twitter. Facebook have not quite nailed
real time search yet but they are getting there and it will soon be a great way
of examining sentiment across different demographics&lt;/em&gt;”. &amp;nbsp;As a result, information on Facebook, such as
name, profile picture, friends list, location and fan pages have become open
access information.&amp;nbsp; In addition, users
on Facebook have been subjected to new privacy regime without notice, leaving
their profile pages generally more open, and searchable through Google.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Converging the Online
Self&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The impact Buzz alone can make on the social media landscape
remains questionable (Gmail heralds only 140 million accounts, which is a deficient
cry from Facebooks’ 400+ million dedicated users).&amp;nbsp; However, despite Googles’ in/ability to
become claim hegemony over the social web landscape, the abuse of private information
to launch a new service has raised serious debate over the privacy and the
future of social networking.&amp;nbsp; The Buzz
service marks more than yet another new social networking service that brushes
aside the privacy of users.&amp;nbsp; As user control
and privacy becomes an increasingly peripheral concern, Google’s shift toward privacy
decontrol also signifies a worrisome supply-side shift towards the
“convergence” of online identity.&lt;/p&gt;
&lt;p&gt;Within this new dominant paradigm, privacy concerns are
often interpreted as antithetical to competitiveness in the social media
marketplace.&amp;nbsp; Instead of an imagined ecosystem
based on user control and privacy preference, it can now be inferred that the
competiveness of social networking services will continue to disrupt the
delicate balance between the public and private online. Regardless that greater
visibility and searchability of the social profile may not be in the public
interest, Google’s recent move works to reinforcement of the new status quo of
“openness”.&amp;nbsp; Furthermore, it is
questionable as to how concentrated and integrated a user may want their online
activities to become.&amp;nbsp; A critical
discourse of online privacy must, therefore, take into account the ways in
which the social web has renders the user increasingly transparent through networks
of networking services.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Google’s Buzz illustrates this point quite well.&amp;nbsp;&amp;nbsp; Initially, Gmail was a straightforward email
service.&amp;nbsp; Next, the AdWords advertising service
and Gmail chat had become integrated into the Gmail experience.&amp;nbsp; Because Google was using the confidential
emails of its Gmail users, privacy concerns began to mount upon the launch of
the the AdWords service.&amp;nbsp; However,
turmoil surrounding AdWords died down, notably as Google continues to reassert
that is is bots, not humans, that are scanning the emails in order to provide
the AdWords service.&amp;nbsp; Next, there gradually
occurred a convergence of Google services under the single social profile, or
“email address”.&amp;nbsp; A single Gmail account
potentially includes use of with Google reader, calendar, chat, groups and an Orkut
account.&amp;nbsp; In terms of behavioral targeted
advertising, Google has recently announced that they will be providing
personalized search results even to users who have not signed up for Google
services.&amp;nbsp; This will be done through the
placement a cookie on all machines to provide targeted advertising seamlessly
through each Google search and browsing session.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While many argue that the collection of non-personally
identifiable information poses no privacy harm, this assumption needs
reassessment.&amp;nbsp; As Google comes to offer
us more, they also come to learn more, and Buzz signifies this trend towards a Googopolized
social web.&amp;nbsp; To add another layer of
complexity to Googles hegemony, users of the Buzz service are also required to create
a “Google Profile”, which is searchable online and displays real time status
updates, comments, and connections from other social network services, such as
Facebook and Twitter.&amp;nbsp; As Google recently
launched the beta version of the new &lt;a href="http://googleblog.blogspot.com/2009/10/introducing-google-social-search-i.html"&gt;Social
Search&lt;/a&gt;, Buzz was just the service required to increase the relevance to the
new service by encouraging Gmail users to publish even more personal
information.&amp;nbsp; The creation of a personal
Google profile, which is indexed and searchable, raises many concerns about
privacy and identity, and doubts are continually raised over &lt;a href="http://www.businessinsider.com/hey-google-thi-i-why-privacy-matter-2010-2"&gt;how
much Google should come to know&lt;/a&gt; about us.&lt;/p&gt;
&lt;p&gt;While Google’s services have arguably made the online social
experience more seamless and tailored, it is questionable as to how relevant,
or even desirable, such a shift may be.&amp;nbsp;
At present, it may appear that Google is wearing far too many hats, and
users should be wary of placing all eggs into one basket.&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;As
the launch of Buzz has shown us, user consent and the contextual integrity of
private personal information can be compromised when a diverse number of online
services are integrated and given a social spin.&amp;nbsp;&amp;nbsp;&amp;nbsp; When competition among social web providers
drives users to lose control of the private information which is inherently theirs,
critical questions surrounding competition, convergence and privacy require
critical exploration.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly'&gt;https://cis-india.org/openness/blog-old/does-the-social-web-need-a-googopoly&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    
    
        <dc:subject>Competition</dc:subject>
    
    
        <dc:subject>Google Buzz</dc:subject>
    

   <dc:date>2011-08-18T05:06:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking">
    <title>The (in)Visible Subject: Power, Privacy and Social Networking</title>
    <link>https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking</link>
    <description>
        &lt;b&gt;In this entry, I will argue that the interplay between privacy and power on social network sites works ultimately to subject individuals to the gaze of others, or to alternatively render them invisible. Individual choices concerning privacy preferences must, therefore, be informed by the intrinsic relationship which exists between publicness/privateness and subjectivity/obscurity. &lt;/b&gt;
        &lt;strong&gt;&lt;br /&gt;The Architecture of Openness&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;div id="parent-fieldname-text"&gt;
&lt;p&gt;Through a Google search or a quick scan of Facebook, people
today are able to gain “knowledge” on others in a way never once 
possible.&amp;nbsp; The ability to search and collect information
on individuals online only continues to improve as online social networks grow 
and
search engines become more comprehensive.&amp;nbsp;
Social networks, and the social web more broadly, has worked to
fundamentally alter the nature of personal information made available 
online.&amp;nbsp; Social &amp;nbsp;networking services today enable the average person, with web access, to publish information through a “social 
profile”.&amp;nbsp; &amp;nbsp;Personal
information made available online is now communicative, narrative and 
biographic.&amp;nbsp; Consequentially, social profiles have become
rich containers of personal information that can be searched, indexed 
and
analyzed.&lt;/p&gt;
&lt;p&gt;The architecture of the social web further encourages users
to enclose volumes of personally identifiable information.&amp;nbsp; Most social 
network sites embrace the “ethos
of openness” as, by default, most have relaxed privacy settings.&amp;nbsp; While 
most sites give users relative control
over the disclosure of personal information, services such as MySpace, 
Facebook
and Live Journal are far ahead of the black and white public/private 
privacy
models of sites such as Bebo and Orkut.&amp;nbsp; Bebo,
for example, only allows users to disclose information to “friends” or
“everyone”, granting little granularity for diverse privacy 
preferences.&amp;nbsp; MySpace and Facebook, on the other hand, have
made room for “friends of friends”, among other customizable group 
preferences.&amp;nbsp; All networking sites also consider certain pieces
of basic information publicly available, without privacy controls.&amp;nbsp; On 
most sites, this includes name,
photograph, gender and location, and list of friends.&amp;nbsp; Okrut, however, 
considers far more
information to public—leaving the political views and religions of its’ 
members
public.&amp;nbsp; This openness leaves the
individual with little knowledge or control over how their information 
is
viewed, and subsequently used.&lt;/p&gt;
&lt;p&gt;Search functionality has also increased the visibility of
individuals outside their immediate social network. &amp;nbsp;For example, sites 
such Facebook and LinkedIn
index user profiles through Google search.&amp;nbsp;
Furthermore, all social network sites index their users, effectively
allowing profiles to be searched by other users through basic 
registration data,
such as first and last name or registered email address.&amp;nbsp; While most 
services allow users to remove
their profiles from external search engines, they are often not able to
effectively control internal searches.&amp;nbsp; Orkut,
for example, does not allow users to disable internal searches according
 to
their first and last names.&amp;nbsp; LinkedIn and
MySpace also maintains that users be searchable by their email 
addresses.&lt;/p&gt;
&lt;p&gt;Through this open architecture and search functionality, social
network sites have rendered individuals more “visible” vis-à-vis one
another.&amp;nbsp; The social web has effectively
altered the spatial dimensions of our social lives as grounded, embodied
experience becomes ubiquitous and multiply experienced.&amp;nbsp; Privacy, in the
 online social milieu, assumes
greater fluidity and varied meaning—transcending spatially
 constructed
understandings of the notion.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the architecture of social networking sites encourages
users to be more “public”, heightened control, or “more privacy” is 
generally
suggested as the panacea to privacy concerns.&amp;nbsp;
However, the public/private binary of privacy talk often fails to
capture the complex nexus which exists between privacy and power in the
networked ecosystem.&amp;nbsp; Privacy preferences
on social networks, and the consequences thereof, are effectively shaped
 and
influenced by structures of power.&amp;nbsp; In
this entry, I will argue that the interplay between privacy and power 
works
ultimately to expose individuals to the subjective gaze of others, or to
 render
them invisible.&amp;nbsp; In this respect,
individual choices concerning privacy preferences must be informed by 
the
intrinsic relationship between notions of publicness/privateness and
subjectivity/obscurity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Power and
Subjectivity &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The searchable nature of the social profile allows others to
quickly and easily aggregate information on one another.&amp;nbsp; As privacy 
scholar Daniel Solve &lt;a href="http://docs.law.gwu.edu/facweb/dsolove/Future-of-Reputation/text.htm"&gt;notes&lt;/a&gt;,
 social searching may be of genuine intent – individuals
use social networking services to locate old friends, and to connect 
with current
colleagues.&amp;nbsp; However, curiosity does not
always assume such innocence, as fishing expeditions for personal 
information
may serve the purpose of judging individuals based perception of the 
social
profile.&amp;nbsp; The relatively power of search
and open information can be harnessed to weed out potential job 
applicants, or
to rank college applicants.&amp;nbsp; Made
possible through the architecture of the web and social constructions of
 power,
individuals may be subjected to the deconstructive gaze of superiors.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The architecture of social networking sites significantly compliments
this nexus between privacy and power.&amp;nbsp; As
individual behavior and preferences become more transparent, the act of
surveillance is masked behind the ubiquity and anonymity of online 
browsing. Drawing
on Foucault’s panopticism, social networks make for the 
“containerization” of social
space –allowing the powerful to subjectively hierarchize and classify
individuals in relation to one another&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn1" name="_ftnref1"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
 [1].&amp;nbsp; This practice becomes particularly
troublesome online, as individuals are often unable to control how they 
are constructed
by others in cyberspace.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Perfect control is difficult to guarantee in an ecosystem
where personal information is easily searched, stored, copied, indexed, 
and
shared.&amp;nbsp; In this respect, the privacy
controls of social networking sites are greatly illusory.&amp;nbsp; Googling an 
individual’s name, for example,
may not reveal the full social profile of an individual, but may unveil
dialogue involving the individual in a public discussion group.&amp;nbsp; The 
searchable nature of personal information
on the web has both complicated and undesirable consequences for privacy
 of the
person for, what I believe, to be two main reasons.&lt;/p&gt;
&lt;p&gt;The first point refers to what Daniel J. Solve describes as
the “&lt;a href="http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID440200_code249137.pdf?abstractid=440200&amp;amp;rulid=39703&amp;amp;mirid=1"&gt;virtue
 of knowing less&lt;/a&gt;”.&amp;nbsp;
Individuals may be gaining more “information” on others through the
internet, but this information is often insufficient for judging one’s
character as it only communicates one dimension of an individual.&amp;nbsp; In &lt;a href="http://heinonlinebackup.com/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/washlr79&amp;amp;section=16"&gt;her
 work&lt;/a&gt;, Helen Nissenbaum emphasizes the importance contextual
integrity holds for personal information.&amp;nbsp;
When used outside its intended context, information gathered online may
not be useful for accurately assessing an individual.&amp;nbsp; In addition, the 
virtual gaze is void of the
essential components of human interaction necessary to effectively 
understand
and situate each other.&amp;nbsp; As Solve notes,
certain information may distort judgment of another person, rather than 
increasing
its accuracy.&lt;/p&gt;
&lt;p&gt;Secondly, the act of surveillance through social networks work
to undermine privacy and personhood, as individuals seek to situate 
others as
“fixed texts” &lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn2" name="_ftnref2"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[2].&amp;nbsp;
 Due to the complex nature of the social self, such practice is undesirable.&amp;nbsp; Online
social networks are socially constructed spaces, with diverse meanings
 assigned
by varied users.&amp;nbsp; One may utilize a social
network service to build and maintain professional relationships, while 
another
may use it as an intimate space to share with close friends and family.&amp;nbsp;
 James Rachels’ &lt;a href="http://www.scribd.com/doc/6152658/Why-Privacy-is-Important-James-Rachels"&gt;theory
of
 privacy&lt;/a&gt; notes that privacy is important, as it allows individuals 
to
selectively disclose information and to engage in behaviors appropriate 
and
necessary for maintaining diverse personal relationships.&amp;nbsp; Drawing on 
the work of performance theorists
such as &lt;a href="http://books.google.co.in/books?id=gyWuhD3Q3IcC&amp;amp;dq=judith+butler+gender+trouble&amp;amp;printsec=frontcover&amp;amp;source=bn&amp;amp;hl=en&amp;amp;ei=5W56S_aTL4vo7APq4YmfCA&amp;amp;sa=X&amp;amp;oi=book_result&amp;amp;ct=result&amp;amp;resnum=5&amp;amp;ved=0CBgQ6AEwBA#v=onepage&amp;amp;q=&amp;amp;f=false"&gt;Judith
Butler&lt;/a&gt;, we can assert that identity is not fixed or unitary, but is
constituted by performances that are directed at different audiences&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn3" name="_ftnref3"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
 [3].&amp;nbsp; Sociologist Erving Goffman also notes that we
“live our lives as performers…&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T17:54"&gt; &lt;/ins&gt;&lt;/span&gt;[and]
 play many different roles and
wear many different masks”&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn4" name="_ftnref4"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
 [4].&amp;nbsp; Individuals, therefore, are inclined to
perform themselves online according to their perceived audiences.&amp;nbsp; It is
 the audience, or the social graph,
which constructs the context that, in turn, informs individual behavior.&lt;/p&gt;
&lt;p&gt;Any attempt to situate and categorize the individual becomes
particularly problematic in the context of social networks, where 
information
is often not intended for the purpose for which it is being used.&amp;nbsp; Due 
to the complex nature of human behavior, judgments
of character based on online observation only effectively capture one 
side of
the “complicated self”&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftn5" name="_ftnref5"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&amp;nbsp;
 As Julie Cohen &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1012068"&gt;writes&lt;/a&gt;,
 the “law often fails to capture the mutually
constitutive interactions between self and culture, the social 
constructions of
systems of knowledge, and the interplay between systems of knowledge and
systems of power”.&amp;nbsp; Because the panoptic
gaze is decentralized and anonymous in the networked ecosystem, 
individuals will
often bear little knowledge on how their identities are being digitally
deconstructed and rewired.&amp;nbsp; Most importantly,
much of this judgment will occur without individual consent or
knowledge—emphasizing the transparent nature of the digital self.&amp;nbsp; &lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Power and
(in)visibility&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In response to the notion that the architecture of the
social web may render individuals transparent to the gaze of others, the
 need
for more “control” over privacy on social network sites has captured the
 public
imagination.&amp;nbsp; Facebook’s abrupt &lt;a href="http://www.readwriteweb.com/archives/facebook_pushes_people_to_go_public.php"&gt;privacy
 changes&lt;/a&gt;, for example, have&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T17:58"&gt; &lt;/ins&gt;&lt;/span&gt;received
widespread
 attention in the &lt;a href="http://www.readwriteweb.com/archives/why_facebook_is_wrong_about_privacy.php"&gt;blogosphere&lt;/a&gt;
 and even by &lt;a href="http://www.guardian.co.uk/technology/blog/2009/dec/17/facebook-privacy-ftc-complaint"&gt;governments&lt;/a&gt;.&amp;nbsp;
 While
popular privacy discourse often continues to fixate on the 
public/private
binary—Facebook’s questionable move towards privacy decontrol has raised
important questions of power and privilege.&lt;/p&gt;
&lt;p&gt;A recent &lt;a href="http://www.zephoria.org/thoughts/archives/2010/01/16/facebooks_move.html"&gt;blog
 post&lt;/a&gt; by danah boyd nicely touches upon the dynamics of
power, public-ness, and privilege in the context of online social networking.&amp;nbsp; 
As she notes, “Public-ness has always been a
privilege…&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T18:00"&gt; &lt;/ins&gt;&lt;/span&gt;but now we've changed the 
equation
and anyone can theoretically be public…&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T18:00"&gt; &lt;/ins&gt;&lt;/span&gt;and
 seen
by millions.&amp;nbsp; However, there are still
huge social costs to being public…the privileged don’t have to worry 
about the
powerful observing them online…but most everyone else does –forcing 
people into
the public eye doesn’t &lt;em&gt;dismantle the
structures of privilege and power&lt;/em&gt;, but only works to &lt;em&gt;reinforce 
them&lt;/em&gt;” (emphasis added).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This point touches upon an important idea —that publicity has value.&amp;nbsp;
 This nexus between visibility and power is
one which unfolds quite clearly in the social media ecosystem.&amp;nbsp; One’s 
relevance or significance could,
arguably, be measured relative to online visibility.&amp;nbsp; Many individuals 
who are seen as “leaders”
within their own professional or social circles often maintain public 
blogs, maintain
a herd of followers on Twitter, and often manage large numbers of 
connections
on social network sites.&amp;nbsp; The more
information written by or on an individual online, arguably, the more 
relevant
they appear to in the eyes of their peers and superiors alike.&lt;/p&gt;
&lt;p&gt;Power and privilege, however experienced, will be mirrored
in the online context.&amp;nbsp; While the participatory
and decentralized nature of Web 2.0 arguably works challenge traditional
structures of power, systemic hierarchies and are often reinforced 
online –as Facebook’s
privacy blunders clearly illustrates. The privileged need not worry 
about the
subjective gaze of their superiors, as boyd notes.&amp;nbsp; Those who may be 
compromised due to the lack
of privateness, however, do.&amp;nbsp; As boyd
goes on to argue, “the privileged get more privileged, gaining from 
being
exposed…&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T18:04"&gt; &lt;/ins&gt;&lt;/span&gt;and those struggling to keep 
their
lives together are forced to create walls that are constantly torn down 
around
them”.&amp;nbsp; As public exposure may over often
equate to power, we must &lt;span class="msoDel"&gt;&lt;del cite="mailto:lynda%20spark" datetime="2010-02-15T18:04"&gt;&amp;nbsp;&lt;/del&gt;&lt;/span&gt;critically
challenge
 the assumption that the move towards more privacy control on social
networks will best empower its members.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;If publicity can
potentially have great value for the individual, the opposite also rings
true.&amp;nbsp; Privacy, as polemic to publicness,
alternatively works to diminish the presence of the individual, 
rendering them
invisible or irrelevant within hyper-linked networks.&amp;nbsp; With 
greater personal protectionism online,
an individual may go unnoticed or unrecognized, fizzling out dully 
behind their
more public peers.&amp;nbsp; Drawing on social
network theory, powerful people can be understood as “supernodes” as 
they
connect more peripheral members of a network.&amp;nbsp;
As &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=629283"&gt;Lior
 Strahilevitz notes&lt;/a&gt;, supernodes tend to be better
informed than the peripherals, and are most likely to be perceived as 
“leaders”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As the power of the supernode relates to privacy, Strahilevitz
states that that “supernodes
maintain their privileged status by&lt;strong&gt; &lt;/strong&gt;continuing
to serve as information clearinghouses….and, in certain contexts, become
supernodes based in part on their willingness to share previously 
private
information about themselves”.&amp;nbsp; It is within
the context of visibility and power that the idea of (in)visibility and
powerlessness online unfold.&amp;nbsp; Those who
have most at risk by going public, may chose not to do so. Those with in
comfortable positions with considerably less to lose by going public may
 be
inclined to “open up”.&amp;nbsp; Heightened privacy
controls on social network services, therefore, can work to reinforce 
the very structures
of power they seek to dismantle.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This is
not to argue, however, that more privacy is necessarily bad, and that 
less
privacy is good, or that users shouldn’t be selective in their 
disclosures –&lt;span class="msoIns"&gt;&lt;ins cite="mailto:lynda%20spark" datetime="2010-02-15T18:08"&gt; &lt;/ins&gt;&lt;/span&gt;to
the contrary.&amp;nbsp; As personal information
has become ubiquitous and tools for aggregating information improve, 
maintaining
privacy online becomes more pertinent than ever. However, the concept of
 privacy
will only continue to become increasingly complex as digital networks 
continue
to deconstruct and reconfigure the spatial dimensions of the public and 
private.&amp;nbsp; How are we to effectively understand privacy
in a social environment which values openness and publicity?&amp;nbsp; Can the 
fluid and dynamic self gain
visibility online without becoming subject to the gaze of superiors?&amp;nbsp; 
Will those who selectively choose
friends and carefully disclose personal information fizzle out, while the powerful
and less inhibited continue to reassert privilege?&amp;nbsp; The interplay 
between power and privacy on
the social web is a multiply constitutive and reinforcing synergy 
–understanding
how to effectively strike balance between the right to privacy and 
self-determination
is the challenge ahead.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftnref1" name="_ftn1"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class="footnotereference"&gt;&lt;span class="footnotereference"&gt;&lt;/span&gt;&lt;/span&gt;
 1. see “Foucault in Cyberspace” by James Boyle&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftnref2" name="_ftn2"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/../others/the-in-visible-subject-power-privacy-and-social-networking-1#_ftnref3" name="_ftn3"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class="footnotereference"&gt;&lt;span class="footnotereference"&gt;&lt;/span&gt;&lt;/span&gt;2.
 Julie Cohen&lt;/p&gt;
&lt;p&gt;3. Cohen citing Butler&lt;/p&gt;
&lt;p&gt;4. Solve citing Goffman&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-social-bookmarks"&gt;
&lt;div id="shareit" class="hidden"&gt;
&lt;div id="exit"&gt;
&lt;h4&gt;Bookmark &amp;amp; Share:&lt;/h4&gt;
&lt;ul id="viewlet_bookmarks"&gt;&lt;li&gt;
            &lt;a href="http://del.icio.us/post?url=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;amp;title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/delicious.png" alt="Del.icio.us" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://www.facebook.com/share.php?u=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1"&gt;
                &lt;img src="../../../../++resource++sb_images/facebook.jpg" alt="Facebook" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/google.jpg" alt="Google Bookmarks" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://twitter.com/home?status=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1"&gt;
                &lt;img src="../../../../++resource++sb_images/twitter.gif" alt="Twitter" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://www.myspace.com/Modules/PostTo/Pages/?c=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;amp;t=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/myspace.png" alt="MySpace" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://digg.com/submit?phase=2&amp;amp;amp;url=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;amp;title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/digg.png" alt="Digg" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://reddit.com/submit?url=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1&amp;amp;amp;title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking"&gt;
                &lt;img src="../../../../++resource++sb_images/reddit.png" alt="Reddit" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;li&gt;
            &lt;a href="http://slashdot.org/bookmark.pl?title=The%20%28in%29Visible%20Subject:%20Power,%20Privacy%20and%20Social%20Networking&amp;amp;amp;url=http://www.cis-india.org/advocacy/others/the-in-visible-subject-power-privacy-and-social-networking-1"&gt;
                &lt;img src="../../../../++resource++sb_images/slashdot.png" alt="Slashdot" /&gt;
                &amp;nbsp;
                
            &lt;/a&gt;
        &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;h5 class="hiddenStructure"&gt;Document Actions&lt;/h5&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking'&gt;https://cis-india.org/openness/blog-old/the-in-visible-subject-power-privacy-and-social-networking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Networking</dc:subject>
    
    
        <dc:subject>Attention Economy</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-18T05:06:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/wwrep">
    <title>WikiWars - A report</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/wwrep</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Bangalore and the Institute of Network Cultures, Amsterdam, hosted  WikiWars – an international event that brought together scholars, researchers, academics, artists and practitioners from various disciplines, to discuss the emergence and growth of Wikipedia and what it means for the information societies we inhabit. With participants from 15 countries making presentations about Wikipedia and the knowledge ecology within which it exists, the event saw a vigorous set of debates and discussions as questions about education, pedagogy, language, access, geography, resistance, art and subversion were raised by the presenters. The 2 day event marked the beginning of the process that hopes to produce the first critical reader – Critical Point of View (CPOV) - that collects key resources for research and inquiry around Wikipedia.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The
debates around Wikipedia, the de facto dynamic knowledge production system
online, are very fairly divided into two competing camps. There is a group of
people who swear by Wikipedia – celebrating its democratic processes of
knowledge production, ease of access, and the de-canonisation of knowledge to
produce the ‘WikiWay’; And then there is a group of people who swear at
Wikipedia – raising concerns over authenticity, reliability, vulgarisation of
knowledge and the de-hierarchisation of knowledge systems that Wikipedia seems
to embody. The debates between the two groups are often passionate and situated
in wildly speculative and often personal interests and investments in Wikipedia
and the Web 2.0 Information Revolution that it seems to be a symptom of. The
debates also play out in various international locations, most of them relying
on personal anecdotes, experiences and half hearted data that does not stand
the tests of rigour.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;WikiWars,
then, concentrated on things which are about Wikipedia but also not about Wikipedia.
In many ways, as Geert Lovink, the Director of INC suggested, WikiWars was a
recognition of the fact that Wikipedia has come of age and can now be
systematically and philosophically examined as a work in progress that has
long-term implications about our future. It was the ambition of the Editorial
team (consisting of Geert Lovink, Sabine Nerdeer, Nathaniel Tkacz, Johanna
Niyesito, Sunil Abraham and Nishant Shah) to veer away from the recognised
battle-lines drawn in, around and about Wikipedia, and instead examine the
fault-lines that run under many of our assumptions, prejudices and imaginations
of Wikipedia. And Wikiwars, through careful screening and invested interests,
became one of the first platforms in the world to initiate a critical discourse
on Wikipedia, seeking to engage with its histories, it contemporary
manifestations and practices, and the futures that it seeks to inhabit.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The
different presentations brought in located debates, theoretical and
philosophical concepts and personal experiences to build frameworks that
explain and contextualise Wikipedia as one of the most contested spaces online.
The eight panels across two days dealt with four major thematic areas which
need to be summarised in brief:&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpFirst"&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;&lt;u&gt;Education, Pedagogy and
Knowledge:&lt;/u&gt;&lt;/strong&gt; At the very basis of Wikipedia (and
other structures like it) is the question of knowledge production, the
possibility of using it as an educational tool and the potentials it has for
introducing new pedagogies and learning practices in and outside of institutionalised
education. Presenters from various disciplines engaged with these questions in
interesting ways.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpFirst"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;Usha
Raman from Teacher Plus in Hyderabad, brought in the question of primary
education, the need for teacher training programmes and the ways by which
infrastructure development needs to be thought through when talking of
Wikipedia and education in the Indian context. The
necessity of locating Wikipedia in a much larger debates on learning were also
echoed by Noopur Rawal and Srikeit Tadepalli, students from Christ University
who brought their experience of Wikipedia and the expectations from classroom
education and learning in their presentation.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;In
the same field, but from a different approach, a panel&amp;nbsp; examined Wikipedia as a site to critique
Western Knowledge production systems. Stian Haklev and Johanna Niyesito
concentrated on the questions of language and knowledge production. Haklev made
an impassioned argument deconstructing the utopian idea of Wikipedia’s
multilingual dreams and instead made a call for recognising the black-holes
when it comes to non-English production and consumption of knowledge on
Wikipedia. He further explored the implications that linguistic imbalance has
on the very governance structure of Wikipedia and its communities. Niyesito
challenged the ‘global’ and ‘cosmopolitan’ image that Wikipedia has built for
itself and posited the idea of Wikipedia as a translingual space where
different languages and cultures negotiate common understandings and processes
of producing knowledge. HanTeng
Liao explored knowledge production through the market economy of key-words to
see how the linguistic biases of search engines that harvest these keywords,
determines the access and visibility of different Wikipedia pages.&lt;/p&gt;
&lt;strong&gt;&lt;u&gt;Resistance, Diversity
and Representation:&lt;/u&gt;&lt;/strong&gt; &amp;nbsp;While these questions were present as
undercurrents to most of the presentations at WikWars, they were perhaps most
fiercely present in the debates that followed the presentations by Eric Ilya
Lee (Academia Sinica, Taiwan), YiPing Tsou (National Central University,
Taiwan), William Beutler and Eric Zimmerman (IDC, Israel).
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;For
Lee and Tsou, the responses to the Chinese language Wikipedia from popular
media and personal experiences, were demonstrative of the fact that the lack of
diverse means of representation and participation lead to a strong resistance
of Wikipedia in Taiwan. Beutler
looked at the heavily contested editorial space and policies of Wikipedia to
make a point about how lack of effective governance systems based on
mutual&amp;nbsp; tolerance and diversity lead to
stressful and often traumatic experiences for users who might not be
represented through the mainstream ideas and&amp;nbsp;
ideologies of an English speaking populace.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;Zimmerman
took a startling position, calling for a regime of attribution and dissolving
the pseudonymous structures of knowledge production in Wikipedia in order to
build designs of trust and verification into the system, thus leading to better
and more credible research tools and representations.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;The
tone of debates was altered with presentations by Mark Graham (Oxford Research
Institute) and the team of artists Nathaniel Stern and Scott Kildal, the team
responsible for the Wikipedia Art Project. Graham
showed the complexity of visualising space and how the production of space (or
physical geography) on Wikipedia often reflects the virtual density of access
and presence online. Showing a nuanced set of images that help mapping these
new geographies for a richer diversity and representation, Graham showed how
systems like Wikipedia ‘cannot know what they cannot know’ despite the reliance
on the wisdom of crowds.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;Stern
and Kildall, in giving an account of their project which used Wikipedia’s
policies to undermine and challenge it, show how the institutionalisation of a
space and its ‘canonisation’ can quickly lead to a new set of problems where
the space becomes the very thing it had set itself against.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;&lt;u&gt;Politics of Free, Open
and Exclusion:&lt;/u&gt;&lt;/strong&gt; The rhetoric of free and open have been
built into all popular discourses around Wikipedia. However, the presentations
at WikiWars showed that these need to be taken with at least a pinch of salt
and further examined for what they signify. Alok
Nandi of Architempo made a dramatic and creative revisit of these guiding
principles of Wikipedia. He showed how an inquiry into rituals of
participation, distortion and access on Wikipedia can promote, not merely
looking at the politics of exclusion but also at the politics of inclusion and
the problems therein.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;Dror
Kamir’s evocative narrative of ‘Your side, my side and Wikipedia’ illustrated
how the question of boundaries, of knowledges, of facts and truths get
distorted as language, community, nationality, etc. come into play in recording
and documenting knowledge on Wikipedia. Concentrating on conflict zones in the
Middle East, he talked about the lack and perhaps the impossibility of
producing neutrality the way in which Wikipedia demands of its users. These
ideas resonated with the propositions that ShunLing Chen from Harvard had
floated in the opening panel to explore the ‘boundary work’ of Wikipedia and
how it defines and produces itself in relation to external forces and
controversies. These
discussions on the politics of presence, absence, inclusion and exclusion were
further layered by presentations by Linda Gross, Elad Weider, Heather Ford and
Nathaniel Tkacz who produced a critique of the Free and Open, taking a
cautionary step away from accepting these as inherently good.&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoListParagraphCxSpMiddle"&gt;While
Gross explored the structure of egalitarianism that Wikipedia builds for
itself, Ford presented an analysis of the licensing regimes of the knowledge
produced within Wikipedia and the problems they pose to traditional knowledges
and non-mainstream information. Weider,
trained as a lawyer, critiqued the neo-liberal discourse around Wikipedia and
tried to correlate the communities with markets. Tkacz’s historical overview of
Free and Open, resulted in a compelling inquiry into the very structures that
inform the shape and functioning of objects like Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Twitter:
#WikiWars &lt;a href="http://twitter.com/wikiwars"&gt;http://twitter.com/wikiwars&lt;/a&gt;
and &lt;a href="http://www.twitter.com/jackerhack/wikiwars"&gt;www.&lt;strong&gt;twitter&lt;/strong&gt;.com/jackerhack/&lt;strong&gt;wikiwars&lt;/strong&gt;&lt;/a&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Flickr:
&lt;a href="http://www.flickr.com/photos/30479432@N03/sets/72157623193288710/"&gt;http://www.flickr.com/photos/30479432@N03/sets/72157623193288710/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;

CPOV blog : &lt;a href="http://networkcultures.org/wpmu/cpov/"&gt;http://networkcultures.org/wpmu/cpov/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The videos fom the Wikiwars event are embedded below:&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHM_HIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHM_QoA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHM_RgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHM_z4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN2T4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN2gMA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN2iUA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN2z0A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN3C4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN3QYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHN3QYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOgCwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOgGgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOgiUA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOqA4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOqxYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOrhIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOrm4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOrycA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHOzEoA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHQoxAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHQo3MA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHSrGAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHSsTcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHToz8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUuGIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUuTIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUugsA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUvW8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHUvk8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHVuwwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHdpxMA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHdz3IA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHd0DMA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHd0iYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf4nkA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf404A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf43AA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf5EIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHf5zYA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHghjkA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgh0EA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgiAIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgiFcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgiUMA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgijUA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgjjIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgjyAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgjzwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgj1QA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgkCQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgkE8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgkHEA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHgkTcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg3n8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg3zgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg4GIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg5ykA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHg52gA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHhjUEA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHhr04A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHhsAcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh10oA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh114A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh%2B0AA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh%2B2EA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh_AcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh_A8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh_lQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHh_w4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjmiIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjnHEA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjuxkA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjuzwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHjvRUA"&gt;&lt;/embed&gt;

&lt;embed height="270" width="320" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYHj4kEA"&gt;&lt;/embed&gt;



        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/wwrep'&gt;https://cis-india.org/research/conferences/conference-blogs/wwrep&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>CPOV</dc:subject>
    

   <dc:date>2010-10-06T11:21:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/arguments-against-software-patents">
    <title>Arguments Against Software Patents in India</title>
    <link>https://cis-india.org/a2k/blogs/arguments-against-software-patents</link>
    <description>
        &lt;b&gt;CIS believes that software patents are harmful for the software industry and for consumers.  In this post, Pranesh Prakash looks at the philosophical, legal and practical reasons for holding such a position in India.  This is a slightly modified version of a presentation made by Pranesh Prakash at the iTechLaw conference in Bangalore on February 5, 2010, as part of a panel discussing software patents in India, the United States, and the European Union.&lt;/b&gt;
        
&lt;p&gt;This blog post is based on a presentation made at the &lt;a href="http://www.itechlaw-india.com/"&gt;iTechLaw conference&lt;/a&gt; held on February 5, 2010.  The audience consisted of lawyers from various corporations and corporate law firms.  As is their wont, most lawyers when dealing with software patents get straight to an analysis of law governing the patenting of computer programmes in India and elsewhere, and seeing whether any loopholes exist and can be exploited to patent software.  It was refreshing to see at least some lawyers actually going into questions of the need for patents to cover computer programs.  In my presentation, I made a multi-pronged case against software patents: (1) philosophical justification against software patents based on the nature of software; (2) legal case against software patents; (3) practical reasons against software patents.&lt;/p&gt;
&lt;h2&gt;Preamble&lt;/h2&gt;
&lt;p&gt;Through these arguments, it is sought to be shown that patentability of software is not some arcane, technical question of law, but is a real issue that affect the continued production of new software and the everyday life of the coder/hacker/software programmer/engineer as well as consumers of software (which is, I may remind you, everywhere from your pacemaker to your phone).  A preamble to the arguments would note that the main question to ask is: &lt;strong&gt;why should we allow for patenting of software&lt;/strong&gt;?  Answering this question will lead us to ask: &lt;strong&gt;who benefits from patenting of software&lt;/strong&gt;.  The conclusion that I come to is that patenting of software helps three categories of people: (1) those large software corporations that already have a large number of software patents; (2) those corporations that do not create software, but only trade in patents / sue on the basis of patents ("patent trolls"); (3) patent lawyers.  How they don't help small and medium enterprises nor society at large (since they deter, rather than further invention) will be borne out by the rest of these arguments, especially the section on practical reasons against software patents.&lt;/p&gt;
&lt;h2&gt;What are Patents?&lt;/h2&gt;
&lt;p&gt;Patents are a twenty-year monopoly granted by the State on any invention.  An invention has to have at least four characteristics: (0) patentable subject matter; (1) novelty (it has to be new); (2) inventive step / non-obviousness (even if new, it should not be obvious); (3) application to industry.  A monopoly over that invention, thus means that if person X has invented something, then I may not use the core parts of that invention ("the essential claims") in my own invention.  This prohibition applies even if I have come upon my invention without having known about X's invention.  (Thus, independent creation is not a defence to patent infringement.  This distinguishes it, for instance, from copyright law in which two people who created the same work independently of each other can both assert copyright.)  Patents cover non-abstract ideas/functionality while copyright covers specific expressions of ideas.  To clarify: imagine I make a drawing of a particular machine and describe the procedure of making it.  Under patent law, no one else can make that particular machine, while under copyright law, no one can copy that drawing.&lt;/p&gt;
&lt;h2&gt;Philosophical Justification Against Software Patents&lt;/h2&gt;
&lt;p&gt;Even without going into the case against patents &lt;em&gt;per se&lt;/em&gt; (lack of independent creation as a defence; lack of 'harm' as a criterion leading to internalization of all positive externalities; lack of effective disclosure and publication; etc.), which has been done much more ably by others like &lt;a href="http://www.researchoninnovation.org/"&gt;Bessen &amp;amp; Meurer&lt;/a&gt; (especially in their book &lt;a href="http://researchoninnovation.org/dopatentswork/"&gt;Patent Failure&lt;/a&gt;) and &lt;a href="http://www.againstmonopoly.org/"&gt;Boldrin &amp;amp; Levine&lt;/a&gt; (in their book &lt;a href="http://levine.sscnet.ucla.edu/general/intellectual/againstnew.htm"&gt;Against Intellectual Monopoly&lt;/a&gt;, the full text of which is available online).&lt;/p&gt;
&lt;p&gt;But there is one essentially philosophical argument against software as subject matter of a patent.  Software/computer programs ("instructions for a computer"), as any software engineer would tell you, are merely &lt;a href="http://en.wikipedia.org/wiki/Algorithm"&gt;algorithms&lt;/a&gt; ("an effective method for solving a problem using a finite sequence of instructions") that are meant to be understood by a computer or a human who knows how to read that code.&lt;/p&gt;
&lt;p&gt;Algorithms are not patentable subject matter, as they are mere expressions of abstract ideas, and not inventions in themselves.  Computer programs, similarly, are abstract ideas.  They only stop being abstract ideas when embodied in a machine or a process in which it is the machine/process that is the essential claim and not the software.  That machine or process being patented would not grant protection to the software itself, but to the whole machine or process.  Thus the abstract part of that machine/process (i.e., the computer program) could be used in any other machine/process, as it it is not the subject matter of the patent.  Importantly, just because software is required to operate some machine would then not mean that the machine itself is not patentable, just that the software cannot be patented in guise of patenting a machine.&lt;/p&gt;
&lt;h2&gt;Legal Case Against Software Patents&lt;/h2&gt;
&lt;p&gt;In India, section 3(k) of the Patent Act reads:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;(3) The following are not inventions within the meaning of this Act: (k) a mathematical or business method or computer programme (&lt;em&gt;sic&lt;/em&gt;) &lt;em&gt;per se&lt;/em&gt; or algorithms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As one can see, computer programs are place in the same category as "mathematical methods", "algorithms", and "business methods", hence giving legal validity to the idea propounded in the previous section that computer programs are a kind of algorithms (just as algorithms are a kind of mathematical method).&lt;/p&gt;
&lt;p&gt;Be that as it may, the best legal minds in India have had to work hard at understanding what exactly "computer programme &lt;em&gt;per se&lt;/em&gt;" means.  They have cited U.S. case law, U.K. case law, E.U. precedents, and sought to arrive at an understanding of how &lt;em&gt;per se&lt;/em&gt; should be understood.  While understanding what &lt;em&gt;per se&lt;/em&gt; means might be a difficult job, it is much easier to see what it does &lt;em&gt;not&lt;/em&gt; mean.  For that, we can look at the 2004 Patent Ordinance that Parliament rejected in 2005.  In that ordinance, sections 3(k) and (ka) read as follows:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;(3) The following are not inventions within the meaning of this Act: (k) a computer programme &lt;em&gt;per se&lt;/em&gt; other than its technical application to industry or a combination with hardware; (ka) a mathematical method or a business method or algorithms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Thus, it is clear that the interpretation that "computer programme &lt;em&gt;per se&lt;/em&gt;" excludes "a computer programme that has technical application to industry" and "a computer programme in combination with hardware" is wrong.  By rejecting the 2004 Ordinance wording, Parliament has clearly shown that "technical application to industry" and "combination with hardware" do not make a computer programme patentable subject matter.&lt;/p&gt;
&lt;p&gt;Indeed, what exactly is "technical application to industry"?  &lt;a href="http://wordnetweb.princeton.edu/perl/webwn?s=technical"&gt;"Technical"&lt;/a&gt; has various definitions, and a perusal through those definitions would show that barely any computer program can be said not to relate to a technique, not involve "specialized knowledge of applied arts and sciences" (it is code, after all; not everyone can write good algorithms), or not relate to "a practical subject that is organized according to scientific principles" or is "technological".  Similarly, all software is, &lt;a href="http://wordnetweb.princeton.edu/perl/webwn?s=software"&gt;by definition&lt;/a&gt;, meant to be used in combination with hardware.  Thus, it being used in combination with hardware must not, as argued above, give rise to patentability of otherwise unpatentable subject matter category.&lt;/p&gt;
&lt;p&gt;In 2008, the Patent Office published a new 'Draft Manual Of Patent Practice And Procedure' in which it sought to allow patenting of certain method claims for software inventions (while earlier the Patent Office objected to method claims, allowing only device claims with hardware components).  This Draft Manual was withdrawn from circulation, with Shri N.N. Prasad (then Joint Secretary of DIPP, the department administering the Patent Office) noting that the parts of the Manual on sections 3(d) and 3(k) had generated a lot of controversy, and were &lt;em&gt;ultra vires&lt;/em&gt; the scope of the Manual (which could not override the Patent Act).  He promised that those parts would be dropped and the Manual would be re-written.  A revised draft of the Manual has not yet been released.  Thus the interpretation provided in the Draft Manual (which was based heavily on the interpretation of the U.K. courts) cannot not be relied upon as a basis for arguments in favour of the patentability of software in India.&lt;/p&gt;
&lt;p&gt;In October 2008, CIS helped organize a &lt;a href="https://cis-india.org/advocacy/openness/blog/the-national-public-meeting-on-software-patents"&gt;National Public Meeting on Software Patents&lt;/a&gt; in which Indian academics, industry, scientists, and FOSS enthusiasts all came to the conclusion that software patents are harmful for &lt;a href="https://cis-india.org/openness/software-patents/software-patenting-will-harm-industry-consumer"&gt;both the industry as well as consumers&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Practical Reasons Against Software Patents&lt;/h2&gt;
&lt;p&gt;This is going to be an attempt at distilling and simplifying some of the main practical arguments against patenting of software.&lt;/p&gt;
&lt;p&gt;There are traditionally &lt;a href="http://www.patenthawk.com/blog/2005/04/patent_economics_part_4_incent.html"&gt;four incentives that the patent system caters to&lt;/a&gt;: (1) incentive to invent; (2) incentive to disclose; (3) incentive to commercialize; and (4) incentive to invent substitutes.  Apart from the last, patenting of software does not really aid any of them.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;h3&gt;Patent Landmines / Submarine Patents / Patent Gridlocks / No Exception for Independent Creation&lt;/h3&gt;
&lt;p&gt;Given that computer programs are algorithms, having monopolies over such abstract ideas is detrimental to innovation.  Just the metaphors say a lot about software patents: landmines (they cannot be seen/predicted); submarines (they surface out of the blue); gridlocks (because there are so many software patents around the same area of computing, they prevent further innovation in that area, since no program can be written without violating one patent or the other).&lt;/p&gt;
&lt;p&gt;Imagine the madness that would have ensued had patents been granted when computer programming was in its infancy.  Imagine different methods of sorting (quick sort, bubble sort) that are part of Computer Science 101 had been patented.  While those particular instances aren't, similar algorithms, such as data compression algorithms (including the infamous &lt;a href="http://en.wikipedia.org/wiki/LZW"&gt;LZW compression method&lt;/a&gt;), have been granted patents.  Most importantly, even if one codes certain functionality into software independently of the patent holder, that is still violative of the patent.  Computer programs being granted patents makes it extremely difficult to create other computer programs that are based on the same abstract ideas.  Thus incentives # (1) and (3) are not fulfilled, and indeed, they are harmed.  There is no incentive to invent, as one would always be violating one patent or the other.  Given that, there is no incentive to commercialize what one has invented, because of fear of patent infringement suits.&lt;/p&gt;
&lt;p&gt;An apt illustration of this is the current difficulty of choosing a royalty-free video format for HTML 5, as it shows, in practical terms, how difficult it is to create a video format without violating one patent or the other.  While the PNG image format was created to side-step the patent over the LZW compression method used in the GIF image format, bringing Ogg Theora or Dirac (both patent-free video format) to surpass the levels of H.264/MPEG-4 AVC or VC-1 will be very difficult without infringing dozens if not hundreds of software patents.   Chris DiBona of Google, while talking about &lt;a href="http://www.mail-archive.com/whatwg@lists.whatwg.org/msg15476.html"&gt;improving Ogg Theora&lt;/a&gt; as part of its inclusion in HTML 5 specifications said, "Here’s the challenge: Can Theora move forward without infringing on the other video compression patents?"  Just &lt;a href="http://74.125.153.132/search?q=cache:jRnXmHcZCMsJ:www.mpegla.com/Lists/MPEG%2520LA%2520News%2520List/Attachments/140/n_03-11-17_avc.html+http://www.mpegla.com/news/n_03-11-17_avc.html&amp;amp;cd=2&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in"&gt;the number of companies and organization that hold patents over H.264&lt;/a&gt; is astounding, and includes: Columbia University, Electronics and Telecommunications Research Institute of Korea (ETRI), France Télécom, Fujitsu, LG Electronics, Matsushita, Mitsubishi, Microsoft, Motorola, Nokia, Philips, Robert Bosch GmbH, Samsung, Sharp, Sony, Toshiba, and Victor Company of Japan (JVC).  As is the amount of royalties to be paid ("[t]he maximum royalty for these rights payable by an Enterprise (company and greater than 50% owned subsidiaries) is $3.5 million per year in 2005-2006, $4.25 million per year in 2007-08 and $5 million per year in 2009-10"; with royalty per unit of a decoder-encoder costing upto USD 0.20.)&lt;/p&gt;
&lt;p&gt;Indeed, even the most diligent companies cannot guard themselves against software patents.  FFII estimates that a very simple online shopping website &lt;a href="http://webshop.ffii.org"&gt;would violate twenty different patents at the very least&lt;/a&gt;. Microsoft recently lost a case against i4i when i4i surfaced with a patent covering custom XML as implemented in MS Office 2003 and MS Office 2007.  As a result Microsoft had to ship patches to its millions of customers, to disable the functionality and bypass that patent.  The manufacturers of BlackBerry, the Canadian company Research in Motion, had to shell out &lt;a href="http://en.wikipedia.org/wiki/NTP,_Inc.#RIM_patent_infringement_litigation"&gt;USD 617 million as settlement&lt;/a&gt; to NTP over wireless push e-mail, as it was otherwise faced with the possibility of the court shutting down the BlackBerry service in the U.S.  This happened despite there being a well-known method of doing so pre-dating the NTP patents.  NTP has also filed cases against AT&amp;amp;T, Sprint Nextel, T-Mobile, Verizon Wireless, and Palm Inc.  &lt;a href="http://copyfight.corante.com/archives/2005/12/15/rimntp_mud_splashes_microsoft.php"&gt;Microsoft was also hit by Visto Corporation&lt;/a&gt; over those same NTP patents, which had been licensed to Visto (a startup).&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;h4&gt;Don't These Cases Show How Software Patents Help Small Companies?&lt;/h4&gt;
&lt;p&gt;The astute reader might be tempted to ask: are not all of these examples of small companies getting their dues from larger companies?  Doesn't all of this show that software patents actually help small and medium enterprises (SMEs)?  The answer to that is: no.  To see why, we need to note the common thread binding i4i, NTP, and Visto.  None of them were, at the time of their lawsuits, actually creating new software, and NTP was an out-and-out "non-practising entity"/"patent holding company" AKA, patent troll.  i4i was in the process of closing shop, and Visto had just started up.  None of these were actually practising the patent.  None of these were producing any other software.  Thus, none of these companies had anything to lose by going after big companies.  In other words, the likes of Microsoft, RIM, Verizon, AT&amp;amp;T, etc., could not file counter-suits of patent infringement, which is normally what happens when SMEs try to assert patent rights against larger corporations.  For every patent that the large corporation violates of the smaller corporation, the smaler corporation would be violating at least ten of the larger corporation's.  Software patents are more helpful for software companies as a tool for cross-licensing rather than as a way of earning royalties.  Even this does not work as a strategy against patent trolls.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Thus, the assertion that was made at the beginning is borne out: software patents help only patent trolls, large corporations that already have large software patent portfolios, and the lawyers who draft these patents and later argue them out in court.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;h3&gt;Term of Patents&lt;/h3&gt;
&lt;p&gt;Twenty years of monopoly rights is outright ludicrous in an industry where the rate of turnover of technology is much faster -- anywhere between two years and five months.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Software Industry Progressed Greatly Without Patents&lt;/h3&gt;
&lt;p&gt;In India, software patents have never been asserted in courts (even though many have been &lt;a href="https://cis-india.org/advocacy/openness/blog/the-national-public-meeting-on-software-patents"&gt;illegally granted&lt;/a&gt;), yet the software industry in India is growing in leaps and bounds.  Similarly, most of the big (American) giants of the software industry today grew to their stature by using copyright to "protect" their software, and not patents.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Copyright Exists for Software&lt;/h3&gt;
&lt;p&gt;As noted above, the code/expression of any software is internationally protected by copyright law.  There is no reason to protect the ideas/functionality of that software as well.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Insufficient Disclosure&lt;/h3&gt;
&lt;p&gt;When ordinary computer programmers cannot understand what a particular software patent covers (which is the overwhelming case), then the patent is of no use.  One of the main incentives of the patent system is to encourage gifted inventors to share their genius with the world.  It is not about gifted inventors paying equally gifted lawyers to obfuscate their inventions into gobbledygook so that other gifted inventors can at best hazard a guess as to precisely what is and is not covered by that patent.  Thus, this incentive (#2) is not fulfilled by the current system of patents either -- not unless there is a major overhaul of the system.  This ties in with the impossibility of ensuring that one is not violating a software patent.  If a reasonably smart software developer (who are often working as individuals, and as part of SMEs) cannot quickly ascertain whether one is violating patents, then there is a huge disincentive against developing software in that area at all.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3&gt;Software Patents Work Against Free/Libre/Open Source Software&lt;/h3&gt;
&lt;p&gt;Software patents hinder the development of software and FOSS licences, as the licensee is not allowed to restrict the rights of the sub-licensees over and above the restrictions that the licensee has to observe.  Thus, all patent clearances obtained by the licensee must be passed on to the sub-licensees.  Thus, patented software, though most countries around the world do not recognize them, are generally not included in the default builds of many FOSS operating systems.  This inhabits the general adoption of FOSS, since many of the software patents, even though not enforceable in India, are paid heed to by the software that Indians download, and the MP3 and DivX formats are not enabled by default in standard installations of a Linux OS such as Ubuntu.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Currently, the U.S. patent system is being reviewed at the administrative level, the legislative level, as well as the judicial level.  At the judicial level, the question of business method patents (and, by extension, software patents) is before the Supreme Court of the United States of America in the form of &lt;a href="http://en.wikipedia.org/wiki/Bilski_v._Kappos"&gt;&lt;em&gt;Bilski v. Kappos&lt;/em&gt;&lt;/a&gt;.  Judge Mayer of the Court of Appeals for the Federal Circuit (CAFC, which heard &lt;em&gt;In re Bilksi&lt;/em&gt;) noted that "the patent system has run amok".  The Free Software Foundation submitted a most extensive &lt;a href="http://endsoftpatents.org/amicus-bilski-2009"&gt;&lt;em&gt;amicus curiae&lt;/em&gt; brief&lt;/a&gt; to the U.S. Supreme Court, filled with brilliant analysis of software patents and arguments against the patentability of software that is well worth a read.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/arguments-against-software-patents'&gt;https://cis-india.org/a2k/blogs/arguments-against-software-patents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    

   <dc:date>2012-03-13T10:43:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/print-impaired-millions">
    <title>The print-impaired millions and their right to read</title>
    <link>https://cis-india.org/news/print-impaired-millions</link>
    <description>
        &lt;b&gt;Books, books everywhere, but not a word to read. This is the scenario for the approximately 70 million print-impaired in India, a sizeable population that includes the visually-impaired young people as well the elderly — whose vision depletes with advancing age.&lt;/b&gt;
        
&lt;p&gt;If you are visually impaired and want to read the latest bestseller, the chances are that you would be staring at a blank, almost-impenetrable wall. The reason: hardly about 500 to 700 of the approximately one lakh titles that are published in India every year are converted to formats like Braille, audio books and e-books for the benefit of this population, as well as versions with large prints for those with weak vision.&lt;/p&gt;
&lt;p&gt;Now, as the Budget Session of parliament is likely to consider amendments to the Copyright Act, those advocating a ‘right to read’ for the print-impaired are hoping that among the changes would be a permission to convert books to various accessible formats like Bookshare or Daisy Book Forum for this population that want to travel into the magic world of words but are forced to be out of it.&lt;/p&gt;
&lt;p&gt;A National Right to Read Campaign, backed by the Global Right to Read Campaign (GRRC), is already on the job, creating public awareness against what activists call the ‘exclusion’ of millions of Indians from the ‘fundamental right’ to read books.&lt;/p&gt;
&lt;p&gt;While there are technologies and software that have enabled this population to access print materials in electronic formats that are read aloud by the machine, it is still illegal for the print-impaired people to, say, scan a book and read it using a screen reader software (such as Adobe Read Aloud) or share it with others. The matters are complicated even more by lack of international laws that allow cross-border sharing of accessible-format books between libraries in India and other countries.&lt;/p&gt;
&lt;p&gt;“Even though the International Publishers Association is looking for a licensing system, specifically for conversion of books to accessible formats for the visually impaired, publishers are not publishing in these versions,” says Chris Friend, chair of the GRRC and World Blind Union (WBU) representative.&lt;/p&gt;
&lt;p&gt;However, 600 authors — including Arun Shourie, Tarun Tejpal, Meghnad Desai and Girish Karnad — and publishing houses like Harper Collins, Marg Publications, etc have pledged support to the campaign.&lt;/p&gt;
&lt;p&gt;Persons who cannot read print are not only the blind, as is the popular perception. A print impaired person can be either visually impaired or those who have other physical, cognitive or sensory disabilities such as dyslexia, autism, learning disabilities, etc, point out Sam Taraporevala and Nirmita Narasimhan of the Centre for Internet and Society, which is spearheading the Right to Read Campaign along with the Daisy Forum.&lt;/p&gt;
&lt;h3&gt;Dismal scene&lt;/h3&gt;
&lt;p&gt;In developed countries, according to WBU estimates, only about five per cent of published books are available to print-impaired persons. In developing countries like India, the percentage is reduced to a dismal 0.5 per cent. There is increasing global attention on the issue in the form of a Treaty for the Blind, Visually Impaired and other Reading Disabled Persons, which is being discussed at the World Intellectual Property Organisation (WIPO) of the UN, and for which India has expressed its support.&lt;/p&gt;
&lt;p&gt;Disabled rights activists like Javed Abidi are for faster availability of books in other formats, and say that it’s a ‘matter of shame’ that it has not been the norm despite India moving fast along the information highway.&lt;/p&gt;
&lt;p&gt;Publishers like Cambridge University Press and Sage, while joining the movement for making books accessible for the print impaired, are a little apprehensive about the potential of abuse of the converted formats by book pirates as well as violation of rights of authors, whose permissions are necessary to convert any book to another format under the law.&lt;/p&gt;
&lt;p&gt;“Publishers fear leakage of accessible formats into the open market,” says Manas Saikia of CUP. Something that Friend completely pooh poohs. “It’s a myth that we visually impaired are going to rob authors’ rights or leak the books into the open market. The Daisy format watermarks every converted production, and any leakage can be traced back to the source. Also, some publishers are opposing the WBU treaty at WIPO saying we want free books. That is another myth. We are ready to pay, just give us books to read,” he says.&lt;/p&gt;
&lt;p&gt;But the debate in public space seems to be creating some impact. Even as publishers and authors are coming out in large numbers to support access of books to the print impaired, the human resource development ministry is working on providing an exception for conversion to various formats if it is for the print impaired.&lt;/p&gt;
&lt;p&gt;In fact, G R Raghavendra, registrar for copyrights at the ministry, confirms that such a move is afoot to remove this ‘unfortunate’ lacuna in the law. Quite naturally, everyone who loves the printed word is hoping that the print-impaired book worms will sooner than latter witness sunnier days.&lt;/p&gt;
&lt;p&gt;For the original article in the &lt;a class="external-link" href="http://www.deccanherald.com/content/50620/print-impaired-millions-their-right.html"&gt;Deccan Herald&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/print-impaired-millions'&gt;https://cis-india.org/news/print-impaired-millions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-04-02T13:10:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/de-facebook">
    <title>De facebook</title>
    <link>https://cis-india.org/news/de-facebook</link>
    <description>
        &lt;b&gt;Facebook used to be our playground but privacy concerns are now souring that fantasy. Why do we trust a clutch of new corporations with such phenomenal amounts of personal data?&lt;/b&gt;
        
&lt;p&gt;The age of privacy is over, Facebook’s fresh-faced founder and CEO Mark Zuckerberg declared a couple of months back. Social norms have shifted. We are now used to living out loud. “When I got started in my dorm room at Harvard, the question a lot of people asked was, ‘Why would I want to put any information on the internet at all? Why would I want to have a website?’” he said.&lt;/p&gt;
&lt;p&gt;That paranoid past is behind us, claimed Zuckerberg, justifying Facebook’s controversial new decision to fling open the curtains and make maximum visibility the new normal. “In the last five or six years, blogging has taken off in a huge way, and (there are) just all these different services that have people sharing all this information,” he said.&lt;/p&gt;
&lt;p&gt;In other words, get over the stage fright. Everyone else is out there over-sharing, arguing, preening, and generally acting out online.&lt;/p&gt;
&lt;p&gt;In June last year, Facebook sneaked in a feature called the Everyone update. This makes it much like Twitter, and also allows it to share with and sell information to search engines like Google, Bing or Yahoo. “Facebook’s privacy changes are relevant as it tries to compete with real-time search on platforms like Twitter. It does give you an option to work around that though I am certain the whole process of setting privacy preferences could be a lot more intuitive,” says Sidharth Rao, digital industry watcher and CEO of internet marketing firm Webchutney.&lt;/p&gt;
&lt;p&gt;On the surface, the new Facebook settings are better and much more malleable, if you can figure out how to work them — you can now choose, per post, what you want different sets of people to see. They have eliminated regional networks which would unwittingly expose you to an entire city sometimes (meaning that not everyone who is on the Delhi network, say, has automatic access to your information if you are in Delhi). But on the other hand, the default setting that Facebook recommends is deeply problematic. You, your profile picture, current city, gender, networks, and the pages that you are a “fan” of are all “publicly available information”. Earlier, you could make sure only your friends saw the rest of your friends — now, that option no longer exists as a setting.&lt;/p&gt;
&lt;p&gt;Wasn’t privacy once a Facebook fundamental? Unlike the seedier environments of Orkut or Myspace, Facebook grew out of a small Harvard community, expanded to cover other East Coast schools, then conquered companies and countries. In September 2006, Facebook opened registration to anyone with an email address. But it was extremely cautious about how it engineered interaction. In essence, you were meant to socialise with people you already knew.&lt;/p&gt;
&lt;p&gt;“It felt safer. It wasn’t about random people sending you scraps and stalking you, like on Orkut or whatever. Facebook reflected my real world. It kept you loosely, comfortably connected to so many people”, says Nomita Sawhney, a young Delhi-based architect. Unlike the threat of cyberstalking, intimidation, and impersonation that stalk less selective networks, Facebook remained clear of what media scholar Danah Boyd calls ‘stranger danger’. Only two years back, Zuckerberg told tech blogger Marshall Kirkpatrick that privacy “is the vector around which Facebook operates”. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;I Like To Watch&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;Why are these changes such a big deal? Zuckerberg’s claim about privacy rings true for most unself-conscious Facebookers. After all, only recently, bra colour status updates were the big buzz on Facebook, ostensibly in support of breast cancer awareness. Now, it’s doppelganger week, where you tell the world what celebrity you most resemble. You can take dippy quizzes, remember birthdays, discuss the news, giggle over pictures. Grim warnings about corporate avarice and government spying sound faintly ridiculous in this pleasant context.&lt;/p&gt;
&lt;p&gt;Social networks and blogs have certainly reconfigured privacy. Anyone who’s spent time on Facebook knows the impulse to meander through the pages and pictures of people in that amorphous category called ‘friends of friends’. In just a few years, we have got used to the thought that our lives are externalised and sprawled out for near-strangers to see.&lt;/p&gt;
&lt;p&gt;In fact, Facebook is now the largest photo site in the world. When you join Facebook, under its Terms of Service, you give it a “license” (that is, legal permission) to use your content “on or in connection with the Facebook Service or the promotion thereof.” It takes some effort to realise how recent all this is, that it’s still a great unfolding experiment, and that we are granting these companies fabulous power. &lt;br /&gt;In his recent book, The Peep Diaries: How We’re Learning to Love Watching Ourselves and Our Neighbors, cultural critic Hal Niedzviecki describes the digital glasshouse: “Peep culture is reality TV, YouTube, Twitter, Flickr, MySpace and Facebook. It’s blogs, chat rooms, amateur porn sites, virally spread digital movies of a fat kid pretending to be a Jedi Knight, cell phone photos — posted online — of your drunk friend making out with her ex-boyfriend, and citizen surveillance. Peep is the backbone of Web 2.0 and the engine of corporate and government data mining.”&lt;/p&gt;
&lt;p&gt;Web 2.0 was the clunky name for a whole range of liberating personal expression platforms — from Flickr and Youtube to Livejournal and Facebook. These companies provide the space and you bring the party. They encourage you to feel right at home and treat these platforms like your lounge, confessional or salon. Meanwhile, they also collect and refine data about you, and often wield it without your awareness.&lt;br /&gt;In its over-eagerness, Facebook has blundered into several privacy minefields before this—when it first introduced Newsfeed, pushing a steady stream of your friends’ status updates at you, it embarrassed and annoyed many. Boyd compared it to the experience of shouting to be heard at a party, when the music abruptly stops and everyone else can suddenly hear your careless small talk. Of course, it turns out Zuckerberg was right when he told users to “calm down and breathe”, and Newsfeed has been naturalised into the Facebook experience. Another, more scarring experience was Beacon — its attempt to track what users in the US bought on partner sites — and tell on them to their friends. After an avalanche of protests, Facebook backed down and modified the ad platform. It even employs a chief privacy officer to address our fears.&lt;/p&gt;
&lt;p&gt;In the early days, Facebook generated awkwardness because it didn’t respect context — the fact that you wear and cast off selves depending on who you’re interacting with, your crazy roommate or your conservative grand-aunt who decided to befriend you online. “It is the problem that arises when worlds collide, when norms get caught in the crossfire between communities, when walls that separate social situations come crashing down,” writes Chris Peterson of the University of Massachusetts, who has studied Facebook’s privacy architecture.&lt;/p&gt;
&lt;p&gt;But now you can tweak settings and set up differential access. People have figured out how to work Facebook and not get burnt. “Profile pictures flatter, tagged pictures shatter,” says Priya Singh, a twenty-something law student, with a laugh. “You never know what someone’s going to put up and who’s going to see what. I don’t want everyone to see drunken party pictures, and so I’ve just learnt to place family on a new level of privacy settings.” And that’s the general pattern on Facebook: most people have learnt to adjust to the public glare, after some initial blinking and bemusement. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;Privacy from Whom?&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;You can segment your social world as minutely as you like, but that doesn’t mean your life is any more private. It’s not just the fact that potential employers can scan and dismiss you, or current employers keep tabs — though such stories abound. For instance, MIT’s Gaydar research project discovered that you can identify a person’s sexual preferences by studying who their friends are on Facebook, even if they have avoided sharing that information in their profile.&lt;/p&gt;
&lt;p&gt;But perhaps we have been gulled into thinking that the whole privacy fuss is about each other. “It’s very clever of Facebook to foreground this aspect of control. Your other friends, pictures, the games you play — that’s something we regularly give out anyway”, says Nishant Shah, director of the Bangalore-based Centre for Internet and Society. “But Facebook is not a single entity — it is a collection of third party apps (applications) that we have no control over. A simple birthday calendar can harvest all your data, all your online traces and you grant it access without knowing it,” he says. So Facebook makes a big show of protecting you from your acquaintances, even as it sells your information continuously.&lt;/p&gt;
&lt;p&gt;This becomes a much bigger possibility when it comes to search engine integration, which allows the open flow on Facebook to be harnessed for perfect reach and recall.&lt;/p&gt;
&lt;p&gt;To get a clearer sense of what’s at stake with these influential corporations, take a more powerful example: Google.com. Every day, we confide our trivial confusions, our deep doubts to one willing ear. And these billions of broken questions can add up to an eerily accurate picture of the world. But do you search Google or does Google search you? “Google can track you across applications: email, search, blogs, pictures and books read. That means they can profile you in a very detailed, exhaustive way, and they do,’ says Rahul Matthan. “They never delete information, and they’re getting progressively more intelligent about you, as they make search more relevant with features like Google Suggest.” As technology scholar Siva Vaidyanathan puts it, “we have to realise that we are not Google’s customers. We are its product. We are what Google sells to advertisers.” These behaviourially targeted ads are the most perfect, evolved form of advertising so far and in concept, the least annoying, because they are customised to you. Google has promised that its information is utterly secure and that search logs are anonymised after a certain period.&lt;/p&gt;
&lt;p&gt;It provides limited disclosure of outside ads, lets users manage the categories that Google has assigned to them and tinker with it for a more accurate picture and also provides an opt-out option. But Search 2.0 is a scary beast — it can also facilitate social control and surveillance. Your online activities are not scattered across applications any more, Google can hear what you tell Facebook.&lt;/p&gt;
&lt;p&gt;While selling us stuff more efficiently is probably a good thing, what happens when this intimate knowledge shades into active surveillance? Even if we live in countries where rights are respected, “we give out enough personal information in an innocuous way to a single repository. They are sitting on top of a very valuable resource, and all this information can easily be reverse-engineered to reveal specifics about you,” says Rahul Matthan, technology lawyer and founder-partner of Trilegal.&lt;/p&gt;
&lt;p&gt;In India, we are even more oblivious to such stealthy watching. “Privacy concerns here are lesser than in the West, where they’re so dependent on digital ID. There, if someone impersonates you or overdraws credit limits, it could affect your house, your job,” says Matthan.&lt;/p&gt;
&lt;p&gt;Privacy legislation doesn’t really exist in India — the right to keep personal information confidential has only been articulated as protection against state action. “There’s no easy legal recourse to being thoroughly spied on by a company,” says Matthan (Europe has enforced data protection directives since 1984 — you can control what information is gathered about you, and how it is used. While the US has somewhat diluted laws, personal information is still strongly guarded). While it’s tempting to think that you have nothing to hide, you are acceding to a set-up where outliers can be identified and dealt with. Privacy matters, no matter how unexceptionable your own life. So what’s to be done? “Holding Facebook and other companies to account is crucial. We must set up legislations by which people can look back, ask exactly what about their activity is being tracked. They have to treat consumers as peers,” says Shah. “If Facebook can gaze at us, we must be given the right to gaze back at its functioning — it has to be a peer-to-peer relationship.”&lt;/p&gt;
&lt;p&gt;So far, Facebook and the Googleverse and Twitter are still our friends and enablers. But as they amass more and more power, it is better to see them as fallible companies rather than confidantes, and to make sure that they account for our information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For original article on the &lt;a class="external-link" href="http://www.indianexpress.com/news/de-facebook/576119/0"&gt;Indian Express&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/de-facebook'&gt;https://cis-india.org/news/de-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T13:41:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-fourth-IGF">
    <title>Report on the Fourth Internet Governance Forum for Commonwealth IGF</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-fourth-IGF</link>
    <description>
        &lt;b&gt;This report by Pranesh Prakash reflects on the question of how useful the IGF is in the light of meetings on the themes of intellectual property, freedom of speech and privacy.&lt;/b&gt;
        &lt;p&gt;The first Internet Governance Forum was held in Athens in 2006, as a follow on to the 2005 Tunis World Summit on the Information Society, and to fulfil the principles drawn up at there. Its explicit objective is to “promote and assess, on an ongoing basis the embodiment of WSIS principles in Internet governance processes”. Those principles still form the basis of the talks that happen at the IGF, and are frequently referred to by the various groups that attend the IGF as the basis for their positions and claims. Sometimes, some of the values promoted by the principles are claimed by opposing groups (child safety vs. freedom of expression). Thus, in a way the negotiation of those principles were what really set the tone for the IGF, which in and of itself is a process by which those principles could be furthered. The one question that formed part of people’s conversations through the fourth Internet Governance Forum (IGF) at Sharm el Sheik, as it had in third IGF at Hyderabad, and no doubt ever since the first edition, was “How&lt;br /&gt;useful is the IGF?” This report shall reflect on that question, particularly based on the workshops and meetings that happened around the themes of intellectual property, freedom of speech, and privacy.&lt;/p&gt;
&lt;p&gt;There are not many meetings of the nature of the IGF. It is not a governmental meeting, though it is sponsored by the United Nations. It is not a meeting of civil society groups, nor of academics nor industry. It is a bit like the Internet: large and unwieldy, allowing for participation of all while privileging those with certain advantages (rich, English-speaking), and a place where a variety of interests (government, civil society, academia and industry) clash, and where no one really has the final word. While the transformational potential of the Internet and the World Wide Web have been felt by a great many, the potential of the Internet Governance Forum is still to be felt. This report, in part, seeks to present an apology of the IGF process, though it is the belief of this reporter that it could do with a few modifications.&lt;/p&gt;
&lt;h3&gt;DAY 0 (Saturday, November 14, 2009)&lt;/h3&gt;
&lt;p&gt;This reporter arrived with his colleagues at Sharm el Sheik late in the afternoon on Saturday, November 14, 2009, with the IGF set to begin the next day. Though we had been advised to register that evening itself, the fatigue of travel (in the case of my colleagues) and the requirement of purchasing new clothes to replace those in the suitcase that had been lost (in my case) kept us from doing so.&lt;/p&gt;
&lt;h3&gt;DAY 0 (Sunday, November 15, 2009)&lt;/h3&gt;
&lt;p&gt;The IGF began on Sunday, November 15, 2009, with a large delay. The registration desks seemed to have a bit of difficulty handling the number of people who were pouring in for registration that morning. By the time this reporter was done with registration, the first set of workshops were already under way, and nearing completion, leaving not much time before the commencement of Workshop 361 (Open Standards: A Rights-Based Framework), which was being organized by this reporter.&lt;/p&gt;
&lt;p&gt;That workshop had as speakers Sir Tim Berners-Lee (World Wide Web Consortium), Renu Budhiraja (Department of IT, Government of India), Steve Mutkoski (Microsoft), Rishab Ghosh (UNU-MERIT), and Sunil Abraham (Centre for Internet and Society), with Aslam Raffee (Sun Microsystems, formerly with the Government of South Africa) chairing the session thus representing government, industry, civil society, and academia. The theme of the workshop (rights-based framework for open standards) was explored in greatest depth by Tim Berners-Lee, Sunil Abraham, and Rishab Ghosh, while Renu Budhiraja and Steve Mutkoski decided to explore the fault-lines, and the practicalities of ensuring open standards (as well as the interoperability, e-governance, and other promises of open standards). Rishab Ghosh pointed out that while a government could not make it a requirement that your car be a Ford to be granted access to the parking lot of the municipality, it often made such arbitrary requirements when it came to software and electronic access to the government.&lt;/p&gt;
&lt;p&gt;Open standards, most of the panellists agreed, had to be royalty-free, and built openly with free participation by anyone who wished to. This model, Sir Tim pointed out, was what made the World Wide Web the success that it is today. This would ensure that different software manufacturers could ensure interoperability which would encourage competition amongst them; that all governments -- even the less developed ones -- would have equal access to digital infrastructure; that citizen-government and intragovernment interaction would be made much more equitable and efficient; and that present-day electronic information would be future-proofed and safeguard against software obsolescence.&lt;/p&gt;
&lt;p&gt;Renu Budhiraja in a very useful and practically-grounded presentation pointed out some of the difficulties that governments faced when deciding upon definitions of “open standards”, as well as the limited conditions under which governments may justify using proprietary standards. She spoke of the importance of governments not following the path laid out by market forces, but rather working to lead the market in the direction of openness. Governments, she reminded the audience, are amongst the foremost consumers of software and standards, and have to safeguard the interests of their citizens while making such decisions. Steve Mutkoski challenged the audience to not only think about the importance of open standards, but also think of the role it plays in ensuring efficient e-governance. Standards, he contended, are but one part of e-governance, and that often the reason that e-governance models fail are not because of standards but because of other organizational practices and policies. Pointing to academic studies, he showed that open standards by themselves were not sufficient to ensure&lt;/p&gt;
&lt;p&gt;Sunil Abraham pointed out examples of citizens’ rights being affected by lack of open standards, and pointed out the concerns made public by ‘right to information’ activists in India on the need they perceived for open standards. He also pointed out an example from South Africa where citizens wishing to make full use of the Election Commission’s website were required to use a particular browser, since it was made with non-standard proprietary elements that only company’s browser could understand. Since that browser was not a cross-platform browser like Firefox, users also had to use a particular operating system to interact with the government. The session ended with a healthy interaction with the audience.&lt;/p&gt;
&lt;p&gt;The importance of having this discussion at the IGF was underscored by Rishab Ghosh who noted that issues of defining and choosing technical standards are often left to technical experts, while they have ramifications much further than that field. That, he opined, is the reason that discussing open standards at a forum like the IGF is important. A more complete report of this workshop may be found at &amp;lt;http://cis-india.org/advocacy/openness/blog/dcos-workshop-09&amp;gt;.&lt;/p&gt;
&lt;p&gt;Post the workshop was the opening ceremony which had Mr. Sha Zukang, U.N. Under-Secretary General for Economic and Social Affairs, Tarek Kamel, the Egyptian Minister for Communications and Information Technology, Dr. Ahmed Nazif, the Prime Minister of Egypt, Tim Berners-Lee, and Jerry Yang. The theme of this year’s IGF was the rather unwieldy “access, diversity, openness, security, and critical Internet resources”. The spread of the Internet, as noted by Sha Zukang, is also quite revealing: In 2005, more than 50% of the people in developed regions were using the Internet, compared to 9% in developing regions, and only 1% in least developed countries. By the year 2009, the number of people connecting in developing countries had expanded by an impressive 475 million to 17.5%, and by 4 million in LDCs to 1.5%, while Internet penetration in developed regions increased to 64%. All in all (Jerry Yang pointed out), around 1.6 billion people, or about 25 per cent of the world, is online. Mr. Kamel noted that “the IGF has&lt;br /&gt;proved only over four years that it is not just another isolated parallel process but it has rather managed to bring on board all the relevant stakeholders and key players”.&lt;/p&gt;
&lt;p&gt;Of importance in many of the speeches were the accountability structures of the Internet due to the Affirmation of Commitment that the U.S. Department of Commerce signed with ICANN, and the growing internationalisation of the World Wide Web due to ICANN’s decision to allow for domain names in multiple languages. Tim Berners-Lee again pointed out the need to keep the Web universal, and in particular highlighted the role that royalty-free open standards play in building the foundations of the World Wide Web. Other than small remarks, privacy and freedom of expression did not really figure greatly in the opening ceremony. Jerry Yang, through his talk of the Global Net Initiative, was the one who most forcefully pointed out the need for both online. The Prime Minister of Egypt, in passing, pointed out the need to safeguard intellectual property rights online, but that note was (in a sense) countered by Sir Tim’s warning about the limiting effect of strong intellectual property would have on the very foundations of the World Wide Web and the Internet.&lt;/p&gt;
&lt;h3&gt;DAY 2 (Monday, November 16, 2009)&lt;/h3&gt;
&lt;p&gt;On the second day was begun by attending the Commonwealth IGF Open Forum. This open forum was most enlightening as in it one truly got to see Southern perspectives on display. Speakers (both on the dais as well as from the audience) were truly representative of the diversity of the Commonwealth, which presently includes 54 states and around 2.1 billion people (including 1.1 billion from India). Issues of concern included things such as the lack of voice of whole regions like East and West Africa in the international IG policy-making arena. Some of the participants noted that issues such as music piracy, which is a favourite topic of conversation in the West, is of no relevance to most in Africa where the pressing copyright- related issues those of education, translation rights, etc. One participant noted that “Intellectual property issues need developing countries to speak in one voice at international fora; the Commonwealth IGF might allow that.”&lt;/p&gt;
&lt;p&gt;A number of people also brought up the issue of youth, and pointing towards children as both the present and the future of the Internet. This attitude also showed up in the session that was held later that day at Workshop 277 (IGF: Activating and Listening to the Voice of Tweens) in which not only were youth and IG issues discussed, but the discussion was also by youth. The formation of the new Dynamic Coalition on Youth and Internet Governance with Rafik Dammak as the coordinator also underlines the importance of this issue which came up at the CIGF open forum.&lt;/p&gt;
&lt;p&gt;Other concerns were that of sharing ICT best practices and examples, and the need to urgently bridge the rural-urban divide that information and communication technologies often highlight, and sometimes end up precipitating. This divide is, in many ways, similar to the divide between developing and developed nations, and this point was also highlighted by many of the participants. One strength that the CIGF has as a platform, which the IGF possibly lacks, is the commonality of the legal systems of most of the Commonwealth countries, and hence the possibility that arises of joint policy-making. It was heartening to see that British Parliamentarians, apart from bureaucrats from many countries, were in attendance. This strong focus on developing countries and Southern perspective is, this reporter believes, one of the strengths of the CIGF, which needs to be pushed into the global IGF.&lt;/p&gt;
&lt;p&gt;The next workshop attended was Workshop 92: A Legal Survey of Internet Censorship and Filtering, which was organized by UNESCO. A large number of very interesting people presented here, and panellists included IFLA/Bibliotheca Alexandrina (whose Sohair Washtawi was surprisingly critical of the Egyptian government), UNESCO (Mogens Schmidt), Freedom House (Robert Guerra), and Frank La Rue, U.N. Special Rapporteur for Freedom of Opinion and Expression. What came of this workshop was the need to engage with to study the online state of freedom of expression as fully as “offline” state of press freedoms are studied, as an interesting fact that came out of this workshop was that there are currently more online journalists behind bars around the world than traditional journalists. A critique of the Freedom House’s online freedom report, which was not sufficiently voiced at the workshop itself, is that it represents a very Western, state-centric idea of freedom of speech and expression, and often looks at the more direct forms of censorship (state censorship) rather than private censorship (via advertising revenue, copyright law, and “manufactured consent”) and self-censorship. This reporter also intervened from the audience to point out that copyright is often a way of curbing freedom of speech (as was the case with the newspaper scholarly reprints of Nazi-era newspapers in Germany recently, or with the Church of Scientology wishing&lt;br /&gt;to silence its critics). The panellists, including Mogens Schmidt and Frank La Rue agreed, and responded by noting that this dimension of copyright requires greater reflection by those groups involved in promoting and safeguarding freedom of speech and expression both online and offline.&lt;/p&gt;
&lt;p&gt;The time before the meeting of the Dynamic Coalition on Open Standards was spent listening to Bruce Schneier, Marc Rotenberg, Frank La Rue, Namita Malhotra, and others at the Openness, Security and Privacy Session. Bruce Schneier, one of the most astute and insightful thinkers on issues of security and privacy, focussed on a topic that anyone who reads his blog/newsletters would be familiar with: that openness, security and privacy are not really, contrary to popular perception, values that are inimical to each other. Mr. Schneier instead sees them as values that complement each other, and argued that one cannot ensure security by invading privacy of citizens and users. He noted that “privacy, security, liberty, these aren’t salient. And usually whenever you have these sort of non-salient features, the way you get them in society is through legislation.” On the same note, he held the view that privacy should not be a saleable commodity, but an inalienable fundamental right of all human beings (a position that Frank La Rue agreed with).&lt;/p&gt;
&lt;p&gt;Apart from the traditional focus area of states, there was also a lot of focus on corporations and their accountability to their users. On the issue of corporations versus states, Frank La Rue made it clear that he believed the model that some corporations were advocating of first introducing technologies into particular markets, expanding, and then using that to push for human rights, was not a viable model. Human rights, he reiterated, were not alienable, and stated: “You [internet companies] strengthen democracy and democratic principles and then you bring up the technology. Otherwise, it will never work, and it is a self defeating point.”&lt;/p&gt;
&lt;p&gt;The meeting of the Dynamic Coalition on Open Standards was next. This meeting served as a ground to build a formal declaration from Sharm el Sheik for DCOS. The meeting was held in the room Luxor, the seating in which was rectangular, promoting a vibrant discussion rather than making some people “presenters” and the rest “audience”. Many of the members of the Dynamic Coalition on Accessibility and Disability were in attendance, seeing common purpose with the work carried out by DCOS. There was spirited discussion on how best to move from a formulation of open standards as “principles” to more citizen- centric “rights”. This shift, pointed out as an important one because they allow for claims to be made in a way that principles and concessions do not. One of the participants helped re-draft the entire statement, based on suggestions that came from him and the rest of the participants. This was, in a sense, the IGF’s multi-stakeholderism (to coin a phrase) at its best.&lt;/p&gt;
&lt;p&gt;Because of the late ending to the DCOS meeting, this reporter arrived late for the Commonwealth IGF follow-up meeting. It seemed that the meeting took its time in finding its raison d’être. It was, for a long while, unclear what direction the meeting was headed in because the suggestions from the audience members were of different types: programmatic actionable items, general thematic focus area suggestions, as well as general wishlists. However, in the end, this came together and became productive thanks to the focus that the chairperson and the rapporteur brought to the discussion. Furthermore, it was a great opportunity to connect with the various young people who had been brought together from various backgrounds to attend the IGF by the CIGF travel bursary. It will be interesting to see the shape that CIGF’s future work takes.&lt;/p&gt;
&lt;h3&gt;Day 3 (Tuesday, November 17, 2009)&lt;/h3&gt;
&lt;p&gt;The first session attended on the third day was the meeting on “Balancing the Need of Security with the Concerns for Civil Liberties”. The speakers included Alejandro Pisanty (Workshop Chair), Wolfgang Benedek, Steve Purser, Simon Davies, and Bruce Schneier. Once again, the one point that everyone agreed on is that those pitting security against privacy are creating a false dichotomy, and that for security to exist, privacy must be safeguarded. Steve Purser pointed out that common sense takes a long while to develop and that we, as a human collective, have not yet developed “electronic common sense”. Simon Davies’ main point was that accountability must necessarily be appended to all breaches of privacy in the name of security. Indeed, he lamented that oftentimes the situation is such that people have to justify their invocation of privacy, though the state’s invocation of security to trample privacy does not require any such justification. Security, he pointed out, is not something that is justified by the government, judged by the people, and to which the government is held accountable for its breaches of civil liberties.&lt;/p&gt;
&lt;p&gt;Bruce Schneier, as usual, was quite brunt about things. He noted that only identity-based security have anything to do with privacy, and that there are a great many ways of ensuring security (metal detectors in a building, locks in a hotel room) that do not affect privacy. At the meeting, this reporter made a comment noting that a lot of debate is happening at a theoretical level, and that while a lot of good ideas are coming out of that discussion, those ideas have to be translated into good systems of governance in countries like India. Some organizations internationally are trying to make human readable privacy signs such as the human readable copyright licences used by Creative Commons. Concerning citizens’ privacy, a lot of systems (such as key escrow) that have been discredited by knowledgeable people (such as Bruce Schneier) are still being considered or adopted by many countries such as India (where this blew up because of a perceived security threat due to RIM BlackBerry’s encryption). National ID schemes are also being considered in many countries, without their privacy implications being explored. In the name of combatting terrorism, unregistered open wireless networks are being made illegal in India. While there have been informed debates on these issues at places like the IGF, these debates need to find actual recognition in the governance systems. That translation is very important.&lt;/p&gt;
&lt;p&gt;The next session this reporter attended was the meeting of the Dynamic Coalition on Freedom of Expression of the Media on the Internet. Amongst the other items of discussion during the session, the site Global Voices Online was showcased, and many of the speakers gave their opinions on whether freedom of speech online required a new formulation of the rights, or just new applications of existing rights. The consensus seemed to be that tying up with the Internet Rights and Principles DC would be useful, but that the project need not be one of reformulation of existing rights, since the existing formulations (as found in a variety of international treaties, including the UDHR) were sufficient. One of the participants stressed though that it was important to extend freedom of press guarantees to online journalists (in matters such as defamation, or copyright violation, where news organizations might be granted protection over and above that which an ordinary citizen would receive). Citizen-led initiatives for circumventing censorship were also discussed.&lt;/p&gt;
&lt;p&gt;Two very important points were raised during the Openness main session on Day 2 when someone noted that the freedom of expression was not only an individual right but it also a collective right: the right of peoples to express not only ideas but to express their cultures, their traditions, their language and to reproduce those cultures and languages and traditions without any limitation or censorship. This aspect of the freedom of expression finds much resonance in many Southern countries where collective and cultural rights are regarded as being as important as individual and civil-political rights. Secondly, Frank La Rue pointed out that freedom of speech and expression went beyond just giving out information and opinion: it extended to the right to receive information and opinion. Excessively harsh copyright regimes harm this delicate balance, and impinge on the free speech.&lt;/p&gt;
&lt;p&gt;One of the issues that was not explored sufficiently was that of the changes wrought by the Internet on the issues raised by the participants. For instance, while there was much talk about defamation laws in many countries and their grave faults (criminal penalties, defamation of ideas and not just persons), there was no talk of issues such as forum-shopping that arises due to online defamation being viewable around the world with equal ease. Thankfully, the coordinators of the Dynamic Coalition urged people to register on the DC’s Ning site (http://dcexpression.ning.com) and keep the conversation alive there and on the DC’s mailing list.&lt;/p&gt;
&lt;p&gt;The session held on Research on Access to Knowledge and Development, organized by the A2K Global Academy was most informative. It brought together many recent surveys of copyright law systems from around the world and their provisions for access to knowledge, including the Africa Copyright and Access to Knowledge project with which this reporter is very familiar. The three main focus areas of discussion were Access to Education (A2E), Open Source Software (OSS) and Access to Medicines (A2M). The best presentation of the day was that made by Carlos Affonso of FGV (Brazil) who made an impassioned case for access to knowledge in the developing world, showcasing many practical examples from Brazil. He noted that many of the examples he was showing were plainly illegal under Brazilian laws, which had very limiting limitations and exceptions. He showcased the usage of Creative Commons licensing, Technobrega music, usage of common ICT infrastructure (such as cybercafes), which are often only semi-legal, and the general acceptance of commons-based peer production. The conclusion of the Egyptian study was that more work is needed to expand access to educational materials, including expansion of the limitations and&lt;br /&gt;exceptions to copyright law for educational purposes. The overall consensus of all the various studies was that open source software was playing a very useful and crucial role in promotion of access to knowledge, but pointed out that the main barrier that open source software was facing was that of anti-competitive practices and not something related to copyright law.&lt;/p&gt;
&lt;h3&gt;Day 4 (Wednesday, November 18, 2009)&lt;/h3&gt;
&lt;p&gt;On the last day, this reporter was a presenter in a workshop on the “Global State of Copyright and Access to Knowledge”. This session had the following panellists: Tobias Schonwetter, Faculty of Law, University of Cape Town; Bassem Awad, Chief Judge at the Egyptian Ministry of Justice and IP Expert; Perihan Abou Zeid, Faculty of Legal Studies and International Relations, Pharos University; Pranesh Prakash, Programme Manager, Centre for Internet and Society; Jeremy Malcolm, Project Coordinator, Consumers International; and Lea Shaver, Associate Research Scholar and Lecturer in Law at Yale Law School.&lt;/p&gt;
&lt;p&gt;This workshop was the result of the merger of workshops proposed by the African Copyright and Access to Knowledge project, and by Consumers International (to showcase their IP Watch List). Lea Shaver noted that the purpose of copyright law is to encourage creativity and the diffusion of creative works, and not as an industrial subsidy. If copyright law gets in the way of creativity and access to knowledge, then it is in fact going against its purpose. She asserted that copyright law should be assessed by touchstones of access, affordability and participation. “Copyright shapes affordability and access because as the scope of rights expands, the more control is centralised and the less competition. It also shapes participation, because under current law the amateur who wants to build upon existing works is at a disadvantage, and risks running afoul of others’ rights.” Rent-seeking behaviour is what is driving the expansion that we see globally in the coverage of copyright law, and not the costs of production and distribution (which are ever becoming cheaper).&lt;/p&gt;
&lt;p&gt;Dr. Abou Zeid noted that technology grants copyright holders (and even non-holders) great control over knowledge, and that strong safeguards are required against this control in the form of limitations to technological protection methods (TPMs). Further, copyright law must take advantage of the benefits offered by technology, such as distance education, granting access to the disabled, and must extend present day E&amp;amp;L to cover these as well. Tobias Schonwetter presented the findings of the ACA2K project, and noted that most countries granted greater protection to rights holders than international law required. Amongst the survey countries, none dealt with distance and e-learning, and only one (Uganda) dealt with the needs of the disabled. He hoped that the extended dissemination phase would assist other projects to build on ACA2K’s work. Thus, “legal systems worldwide are not meeting consumers’ needs for access to knowledge. A better legal system, the research suggests, would support non-commercial sharing and reuse of material, which in turn would drive down costs and increase sales of licensed material, and could also increase consumers’ respect for the law overall.”&lt;/p&gt;
&lt;p&gt;The present reporter started by asking why this abstract phrase “access to knowledge” is so important. A2K actually effects almost all areas of concern to citizens and consumers: education, industry, food security, health, amongst many more areas. Mark Getty notes that “IP is the oil of the 21st century”. By creating barriers through IP, there is less scope for expansion and utilization of knowledge, and this most affect “IP poor” nations of the South. In India, there is a new copyright amendment that will introduce DRMs, even though India is not bound by international law to do so. There is also a very worrisome movement to pass state-level criminal statutes that class video pirates in the same category as “slum lords, drug peddlers and goonda”, which includes measures for preventative detention without warrant.&lt;/p&gt;
&lt;p&gt;One tool to help change the mindsets of the public is the Consumers International IP Watch List, which can help policy makers and academics and advocates compare the best and worst practices of various countries. At an earlier session, Carlos Affonso of FGV had used the Watch List to demonstrate the weakness of Brazil’s copyright law on the educational front. Copyright is often characterised as a striking of balance between the interests of creators and consumers, but this rhetoric might be misplaced. In fact creators often benefit from freer sharing by users. Knowledge is an input into creation of works, not just an output from it. Given this, it is important to counter IP expansionism by using laws promoting freedom of speech, competition law, consumer law, privacy law, while framing them within the context of development (as appropriate in various countries), to eventually produce a change in mindsets of people.&lt;/p&gt;
&lt;h3&gt;Stock-Taking&lt;/h3&gt;
&lt;p&gt;As Jeremy Malcolm of Consumers International notes in his response to the formal stock-taking process, “the IGF is yet to develop from a simple discussion forum into a body that helps to develop public policy in tangible ways.” This reporter, writing for the Dynamic Coalition on Open Standards, also voted for the continuation of the IGF, “in order to ensure that the WSIS Declaration of Principles, specifically in the important area of open standards, be realised through a multi-stakeholder process.” The IGF is, in a sense, the least bureaucratic of the UN’s endeavours. But certain rules, evolved in inter-governmental settings, might require careful reconsiderations to suit the multi-stakeholder approach that the IGF embodies. The IGF also needs to reach out from being a conference for a few to becoming a place/process for the many.&lt;/p&gt;
&lt;h3&gt;General Reflections&lt;/h3&gt;
&lt;p&gt;While this year there were more remote participation hubs (13) than last (11), and the Remote Participation Working Group seems to have done much work and some serious reflection on that work, individual experiences sometimes did not match up with what was perceived as the collective experience (via RPWG’s feedback survey). As a workshop organizer, this reporter was not provided any information about the remote participation tools, nor was there any screening of remote participants’ comments. With the shift from a single (open-source) product DimDim, to two products, WebEx (sponsored by Cisco) and Elluminate, much confusion was created even amongst those in the know since there were two separate tools being used. It is this reporter’s perception that live captioning from the main sessions has been a great success, and will have to be used much more extensively, especially if places where the bandwidth to download streaming video does not exist. Further, they help create very useful quasi-official records of the various workshops and open fora that are held at the IGF. That apart, the suggestions offered by the&lt;br /&gt;RPWG (live video feedback from the remote hubs, dedicated remote participation chair in each workshop,&lt;br /&gt;etc.) should be worked upon this year to enable those who cannot travel to Vilnius to participate more effectively.&lt;/p&gt;
&lt;p&gt;All the sessions that happened around intellectual property rights were highly critical of the present state of IP laws around the world, and were calling for a reversal of the IP expansionism we see from various perspectives (access to knowledge, competition law, etc.) However, it was often felt by this reporter that these workshops were cases of the choir being preached to. Of course, many new people were being introduced to these ideas, but generally there was appreciation but not as much opposition as one is used to hearing outside the IGF. An exception (in the IP arena) was the workshop on open standards, in which there was much heat as well as illumination. Perhaps, a greater effort could be made to engage with people who are critical of the Access to Knowledge movement, those who are critical of privacy being regarded as a fundamental right, and those who believe that cultural relativism (for instance) must find a central place while talking about the right to free speech. After all, when one leaves the IGF, these voices&lt;br /&gt;are heard. Those voices must be engaged with at the IGF itself, and a way forward (in terms of concrete policy recommendations, whether at the local level or the international level) must be found. Of course, the problem with the above suggestion is that many of these values are embedded in the WSIS principles, and are taken as a granted. But, still, if such debate is not had at the IGF, it might become something much worse than a ‘talking shop’: a forum where not much meaningful talk happens.&lt;/p&gt;
&lt;h3&gt;Appendix I: Tweets and Dents During the IGF&lt;/h3&gt;
&lt;p&gt;This is list of some posts made by the reporter on the microblogging sites Twitter&lt;br /&gt;(http://twitter.com/pranesh_prakash) and Identi.ca (http://identi.ca/pranesh) during the IGF.&lt;br /&gt;# @leashaver: Recording of yesterday’s session by the Access to Knowledge ♺ Global Academy:&lt;br /&gt;http://trunc.it/3dldl #a2kga #IGF09 #yaleisp 8:55 PM Nov 18th, 2009&lt;br /&gt;# “Great possibilities of #foss, but a disabling, anti-competitive environment has stunted growth of&lt;br /&gt;open source software in #Egypt.” #igf09 6:47 PM Nov 17th, 2009&lt;br /&gt;# Excellent set of resources on Access to Knowledge, from @YaleISP: http://tr.im/F8At #igf09 6:37 PM&lt;br /&gt;Nov 17th, 2009&lt;br /&gt;# “Tecno brega in Brazil can only be bought from street vendors: good relationship between artists&lt;br /&gt;and street vendors.” #igf09 6:30 PM Nov 17th, 2009&lt;br /&gt;# “There is not even a private copying exception in Brazil”, but is still part of “axis of IP evil” for&lt;br /&gt;rightsholders #igf09 6:26 PM Nov 17th, 2009&lt;br /&gt;# Tobias: “Even though s/w patents are not allowed by SA law, some large MNC s/w comps found&lt;br /&gt;ways of bypassing that &amp;amp; getting patents” #igf09 6:19 PM Nov 17th, 2009&lt;br /&gt;# Case studies from SA: CommonSense project, Freedom to Innovate SA, OOXML v. ODF struggle #igf09&lt;br /&gt;6:18 PM Nov 17th, 2009&lt;br /&gt;# 2 new studies on #a2k from Brazil (http://tr.im/F8tI)and SA (http://tr.im/F8uJ). Also see ACA2K’s&lt;br /&gt;outputs: http://tr.im/F8uQ #igf09 6:13 PM Nov 17th, 2009&lt;br /&gt;# ♺ @sunil_abraham: RT @mathieuweill: #igf09 Dardailler : Internet standards are open standards&lt;br /&gt;and that makes a difference! 3:57 PM Nov 17th, 2009&lt;br /&gt;# Oops. Wrong URL. It should be: http://threatened.globalvoicesonline.org/ #igf09 3:46 PM Nov 17th,&lt;br /&gt;2009&lt;br /&gt;# Mogens Schmidt of UNESCO praises Global Voices Online. Says defamation &amp;amp; libel laws should not&lt;br /&gt;be *criminal* offences. #igf09 3:40 PM Nov 17th, 2009&lt;br /&gt;# http://threatened.globalvoices.org/ helps report on FoE issues with bloggers through crowdsourcing.&lt;br /&gt;#igf09 3:24 PM Nov 17th, 2009&lt;br /&gt;# “Along with the right to give out information and opinion is the right to receive information and&lt;br /&gt;opinion”: Frank La Reu #a2k #igf09 3:13 PM Nov 17th, 2009&lt;br /&gt;# Schneier: “Before we die, we will have a US President who’ll send a lolcat to the Russian PM” #igf09&lt;br /&gt;2:06 PM Nov 17th, 2009&lt;br /&gt;# Privacy vs. security is a false dichotomy. But any privacy that is taken away in name of security&lt;br /&gt;must be turned into accountability. #igf09 1:50 PM Nov 17th, 2009&lt;br /&gt;# All wireless networks now have to be registered in India, and we talk of privacy? @schneier #igf09&lt;br /&gt;1:47 PM Nov 17th, 2009&lt;br /&gt;# RT @rmack Free Expression Online dynamic coalition meeting at 11:30am Egypt time in Siwa Room.&lt;br /&gt;http://dcexpression.ning.com #igf09 1:36 PM Nov 17th, 2009&lt;br /&gt;# @OWD: E Daniel, (http://bit.ly/3oFYqu), takes on the myth of the Digital Native, ♺ reveals the shallowness&lt;br /&gt;of their native knowledge. #igf09 12:05 AM Nov 17th, 2009&lt;br /&gt;# Commonwealth IGF’s follow-up meeting took time to find out its raison d’etre, but ended on a productive&lt;br /&gt;note. #igf09 11:34 PM Nov 16th, 2009&lt;br /&gt;# #schneierfact : Bruce Schneier actually exists! I can see him! 6:53 PM Nov 16th, 2009&lt;br /&gt;# @timdavies: You might then be interested at a report by @cis_india on a different take at DNs:&lt;br /&gt;http://tr.im/F3tk 3:29 PM Nov 16th, 2009 from Gwibber in reply to timdavies&lt;br /&gt;# Estonia &amp;amp; Georgia DDoS are famous, but individual NGOs are also being targetted by DoSes. #igf09&lt;br /&gt;3:08 PM Nov 16th, 2009&lt;br /&gt;# Now more online journalists are behind bars than offline ones. #freespeech #igf09 3:07 PM Nov 16th,&lt;br /&gt;2009&lt;br /&gt;# ♺ @aslam: if you get an email from nigeria people will block it because they think that it is spam -&lt;br /&gt;reputation #fail #igf09 2:14 PM Nov 16th, 2009&lt;br /&gt;# Many are saying: listen to children; document and share best ICT practices and examples; bridge&lt;br /&gt;rural-urban divide as also devel’d-devel’g. 1:57 PM Nov 16th, 2009&lt;br /&gt;# Several British Parliamentarians in the room at the Commonwealth IGF event #igf09 1:56 PM Nov&lt;br /&gt;16th, 2009&lt;br /&gt;# CIGF should look at gaps at IGF and speak to them. Our common legal systems allow for focus on legislations&lt;br /&gt;(ie, on data protection) #igf09 1:36 PM Nov 16th, 2009&lt;br /&gt;# “We need to get to a point where access to the Internet is seen as a human right” #igf09 1:27 PM&lt;br /&gt;Nov 16th, 2009&lt;br /&gt;# “Intellectual property issues need developing countries to speak in one voice at intl fora. Commonwealth&lt;br /&gt;IGF might allow that.” #igf09 1:24 PM Nov 16th, 2009&lt;br /&gt;# “Music aspects of the Internet debates, which gets so much focus, doesn’t have as much relevance&lt;br /&gt;in W. Africa as education &amp;amp; health.” #igf09 1:21 PM Nov 16th, 2009&lt;br /&gt;# Commonwealth covers more than 2 billion people. Some whole regions, like E. &amp;amp; W. Africa “have no&lt;br /&gt;voice in Geneva &amp;amp; global IGF” #igf09 1:18 PM Nov 16th, 2009&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-fourth-IGF'&gt;https://cis-india.org/internet-governance/blog/report-on-fourth-IGF&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-02-29T05:42:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/year-ahead-copyright-2010">
    <title>Year Ahead Copyright 2010: Between An Enforcement “Gold Standard” And Stronger Limitations</title>
    <link>https://cis-india.org/news/year-ahead-copyright-2010</link>
    <description>
        &lt;b&gt;Whereas copyright is increasingly being exchanged for contractual relationships why all the debate and new efforts in national and international copyright legislation. Monika Ernet's article in the Intellectual Property Watch examines this in the wake of the Anti-Counterfeiting Trade Agreement and the international treaty on access to online books for the visually impaired. The article also carries Pranesh Prakash's views on introduction of technical protection measures and the protection of them by law.&lt;/b&gt;
        
&lt;p&gt;The secretly negotiated Anti-Counterfeiting Trade Agreement is now in centre stage in the global debates around copyright, as is a prospective new international treaty on access to online books for the visually impaired which comes as part of a broader push to clarify limitations and exceptions to copyright. But some are asking, why all the debate and new efforts in national and international copyright legislation when copyright is increasing being exchanged for contractual relationships?&lt;/p&gt;
&lt;p&gt;ACTA may bring with it the punishment of internet denial for infringement that has been fiercely discussed in several European countries and adopted in France, New Zealand, South Korea, and Taiwan. ACTA is seen by critics as another push by governments backing their rights holders in the eternal wars over copyright.&lt;/p&gt;
&lt;p&gt;But on the other side, there is much hope that a new treaty for the visually impaired will be negotiated at the World Intellectual Property Organization (WIPO). Open-ended consultations on outstanding issues were promised to be finalised over the early months of 2010 by the WIPO Standing Committee on Copyright and Related Rights.&lt;/p&gt;
&lt;h3&gt;ACTA and Enforcement&lt;/h3&gt;
&lt;p&gt;The seventh round of negotiations for ACTA ended after four days of talks in Guadalajara on 29 January. Round eight is expected for April in Wellington, New Zealand. If you ask the negotiators, they will tell you that they expect to get this done in 2010.&lt;/p&gt;
&lt;p&gt;There seems to be a sense of urgency to complete ACTA just at the moment when a growing list of members of national parliaments from the United States (Congress), the United Kingdom and Germany are asking for access to the ACTA documents and while the first small street protest was organised outside the meeting place in Guadalajara, Mexico. “Are the commitments of negotiators to transparency real or a strategic move?” asked New Zealand’s Labour Party politician Clare Curran before the meeting in Guadalajara.&lt;/p&gt;
&lt;p&gt;“We will have a hearing on ACTA presumably in March,” said EU Member of Parliament Alexander Alvaro, who has questioned the European Commission on the transparency, timeline and scope of the agreement. The Commissioner Designate for International Trade, Karel de Gucht, said clearly: “If there is confidentiality, I will respect it and I have to respect it.” It is impossible, he said, to change the terms during the negotiations.&lt;/p&gt;
&lt;p&gt;While he promised that he would make sure Parliament - which has now to agree to ACTA under the newly in effect Lisbon Treaty - would be “duly informed,” the Parliament which just engaged in its first fights over its new competencies with the European Council and Commission might not take that bite, said Alvaro.&lt;/p&gt;
&lt;p&gt;The Commission, meanwhile, is for 2010 preparing to put forward a follow-up to the IP enforcement directive (IPRED), as a draft text on IPRED II for criminal sanctions is expected to be put forward in May or June, immediately after the evaluation report on IPRED due in April.&lt;/p&gt;
&lt;h3&gt;Rethinking Limitations and Exceptions&lt;/h3&gt;
&lt;p&gt;While there is a big push for ACTA - which International Trademark Association President Richard Heath from Unilever said should be set as “gold standard” - there are growing concerns in academic circles. Annette Kur, IP law expert at the Max Planck Institute of Intellectual Property and Tax Law, said there is a feeling in the expert community that “we cannot go on and on tightening the screw.”&lt;/p&gt;
&lt;p&gt;Talks at WIPO about a treaty to grant exemptions for blind and visually impaired people have shown promise, but might also slow down other initiatives for a re-balancing of copyright that academics were hoping for. The implementation of other elements of the WIPO Development Agenda would be a good counterpoint against the current wave of maximal demands in rights protection, according to Kur.&lt;/p&gt;
&lt;p&gt;But proponents say there is gathering momentum for the visually impaired exception now - including a draft treaty text, which does not exist for any other issue in the committee - and to wait risks losing the chance and gambling on an uncertain and potentially very lengthy process.&lt;/p&gt;
&lt;h3&gt;National Copyright Reforms and FTAs&lt;/h3&gt;
&lt;p&gt;Some ongoing national copyright legislative reforms echo the demand for the re-balancing, with Brazil’s copyright reform the most far-reaching of these, as copyright law expert Volker Grassmuck recently wrote. The Brazilian law could be the first copyright law “balancing copyright with access and usage rights and consumer protection its declared goal,” Grassmuck wrote, but also said that the reform work might be stopped by the Brazilian election campaign in 2010. For several months, a final draft has been announced, Grassmuck told Intellectual Property Watch, yet every time publication has been postponed. “There certainly are concerns that the delay results from industry lobbying against the reform at the highest levels,” Grassmuck said.&lt;/p&gt;
&lt;p&gt;Indian copyright reform (that like the Brazilian effort started in 2005) also has made a reference to amendments to secure limitations and exceptions for the visually impaired, but is more conservative when it comes to other issues. It more closely follows the line of harmonising its regulation to the international treaties, namely the WIPO Copyright Treaty and WIPO Performances and Phonograms Treaty.&lt;/p&gt;
&lt;p&gt;The reform effort just got a new push when the Indian Copyright office published a final draft on 24 December. Pranesh Prakash, programme manager at the Center for Internet and Society in Delhi, said that the introduction of technical protection measures and the protection of these by law would bring a big change in India.&lt;/p&gt;
&lt;p&gt;Prakash said he is afraid that intermediary liability is on the political agenda of the Indian Copyright Office. This would make sense if one considers the negotiations for a free trade agreement between India and the EU that can be expected to include a lengthy section covering intellectual property, copyright and online service provider liability similar to the one in the EU-Korea FTA. The EU-Korea FTA was to be voted on by EU Parliament this week; the EU-India FTA is expected to be finalised in 2010.&lt;/p&gt;
&lt;p&gt;Copyright reforms are also under way in Canada, Hong Kong, Serbia, and in the United Kingdom the digital economy bill is under heavy discussion because of far-reaching regulatory power planned for UK communications regulator OFCOM. In Germany, a third round of copyright law reform is on the agenda with private broadcasting companies, publishers and the music industry asking for better copyright protection.&lt;/p&gt;
&lt;h3&gt;Contracts Instead of Copyright?&lt;/h3&gt;
&lt;p&gt;But while these reforms and treaty and FTA negotiations are ongoing, there is also another trend seen by experts and users of copyright, said Jeanette Hofmann, an internet governance expert. “Copyright, this moral beacon, more and more ceases to play a role in practical terms. As an author I have to live with a complete buy-out and as a copyright customer, let’s say in the library, I am often dependent on the contracts that the library has with private companies, too.”&lt;/p&gt;
&lt;p&gt;Benjamin White, head of the intellectual property at the British Library, has asked the question of whether copyright is still relevant in the digital age. “What I deal with is contracts,” he said, warning that “in most EU member states contracts effectively trump copyright laws. Limitations and exemptions are irrelevant, if there is a contract that says otherwise.” Libraries are contracting with private companies that could help them to fund digitisation projects, but would then regulate access to these objects.&lt;/p&gt;
&lt;p&gt;White said while he credits Google for getting the discussion started on how digitisation could be funded, he also wants to see a debate on whether people are comfortable with one private company having access to million of books. The Google book settlement and contracts with libraries in the US and other countries in effect could be seen as a monopoly being created around orphan works and a way to control access to millions of works for years. The EU Commissioner Designate for the Digital Agenda Neelie Kroes, when asked what she thought of Google’s book project, said she liked competition. Regulation for orphan works is on the EU Commission’s work agenda.&lt;/p&gt;
&lt;p&gt;Competition and more business offers were also said by Swiss IP lawyer Rolf Auf der Maur to be the focus of the music industry instead of enforcement. Auf der Maur, regular panellist at Midem (the largest annual conference of the music industry), said acknowledgement was trickling down in the music industry that collective licence models, for example licensing music to internet service providers, or even thoughts about flat-rates might be better than only focussing on enforcement.&lt;/p&gt;
&lt;p&gt;The major labels are interested in ventures like streaming service Spotify. Paul Brindley, co-Founder of digital music expert consultant Music Alley, said government funding for digital music service models could be expected from the British Technology Strategy Board.&lt;/p&gt;
&lt;p&gt;Yet this message could sound overly optimistic given that the music industry is the party heavily promoting a ‘three strikes and you’re out’ approach against copyright infringers.&lt;/p&gt;
&lt;p&gt;Or might there be rights owners that think what Joe McNamee, political expert for European Digital Rights (EDRI), predicts: “you can forget about enforcement of copyright, if you focus on copyright and do not get the right content in the right formats available to consumers then you will not solve the problem.“ Innovation would be blocked, he warned, and ever stronger enforcement regulation would finally lead to a lot of collateral damages in civil rights.&lt;/p&gt;
&lt;p&gt;For librarian White there also is an urgent need for a change. He said regulators need to create clear rules on access in the digital world like are set out in the Brazilian copyright reform proposal. White said he was hoping that WIPO, whose secretary general, Francis Gurry, had acknowledged the challenge of solving the relationship between private contracts and copyright, would act on the issue of access. Will that happen in 2010?&lt;/p&gt;
&lt;p&gt;Monika Ermert may be reached at &lt;a href="mailto:info@ip-watch.ch"&gt;info@ip-watch.ch&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For original article on IP Watch, &lt;a class="external-link" href="http://www.ip-watch.org/weblog/2010/02/02/copyright-2010-between-an-enforcement-gold-standard-and-stronger-limitations/"&gt;click here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/year-ahead-copyright-2010'&gt;https://cis-india.org/news/year-ahead-copyright-2010&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-02T13:43:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/right-to-read-campaign">
    <title>The Right to Read Campaign, now in Delhi</title>
    <link>https://cis-india.org/accessibility/blog/right-to-read-campaign</link>
    <description>
        &lt;b&gt;The Right to Read campaign, this time in Delhi, the national capital of the country has been announced. This is the third in the series. The previous two held in Calcutta and Chennai were highly successful and Delhi too promises quite a lot.  &lt;/b&gt;
        
&lt;p&gt;About 70 million Indians are unable to read printed material owing to various forms of disabilities. According to industry estimates, around 80,000-100,000 books get published every year in India of which only about 700 are made available for these persons. Technologies like screen readers make it possible for persons with disabilities to access knowledge in alternate formats like Braille, e-text, audio, large print, et cetera. Yet people are unable to convert books into accessible formats thanks to the provisions of the Indian Copyright Act, 1957.&lt;/p&gt;
&lt;p&gt;India needs to change the situation quickly and put an end to the shortage of books and enable these 70 million persons to participate in social life. For this we need to make use of the developments in technology which makes it possible for all persons to access knowledge and enable them to live a life of social inclusion and participation on par with the rest of society. People with disabilities too have a right to access information like other persons- let copyright laws recognize the diverse needs of persons with disabilities and open up the gates of knowledge to all.&lt;/p&gt;
&lt;h3&gt;Objectives of the Right to Read Campaign&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;To expedite copyright law reform by informing policy makers on the necessity and nature of amendment. This has to be made to the Indian Copyright Act 1957 to give effect to the rights of persons with disabilities.&amp;nbsp;&lt;/li&gt;&lt;li&gt;To raise awareness on the issue amongst the parliamentarians, members of the judiciary, educationalists, publishers and the public.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;The Campaign&lt;/h3&gt;
&lt;p&gt;The Indian campaign is a part of the global Right to Read campaign which was started by the World Blind Union in 2008. It is a nationwide campaign and seeks to:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Accelerate change in the copyright law;&lt;/li&gt;&lt;li&gt;Raise public awareness on the issue of access to reading for the print-impaired; and&lt;/li&gt;&lt;li&gt;Gather Indian support for the Treaty for the Blind proposed by the World Blind Union at the World Intellectual Property Organization (WIPO).&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/right-to-read-campaign'&gt;https://cis-india.org/accessibility/blog/right-to-read-campaign&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-08-17T08:45:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/emerging-issues-social-networks">
    <title>IGF 2009 - Main Session: Emerging Issues: Social Networks</title>
    <link>https://cis-india.org/news/emerging-issues-social-networks</link>
    <description>
        &lt;b&gt;Current laws don't seem to scale well to handle Web 2.0 issues&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;Session description:&lt;/strong&gt; Discussion was centered on the development of social media (social networks, user-generated content sites, micro-blogging, collaboration tools, etc.) in order to explore whether these developments require to new or modified policy approaches. Key issues explored include privacy and data protection, rules applicable to user-generated content and copyrighted material, and freedom of expression and illegal content. The session also addressed the importance of the “terms of service” of large platforms, how they are developed and their relationship with emerging business models that are based on behavioral analysis.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Participants in the discussion included:&lt;/strong&gt; Sunil Abraham, director of policy, Centre for Internet and Society, Bangalore; Rebecca MacKinnon, co-founder of the Global Network Initiative; Grace Bomu, manager,&amp;nbsp; Kenya-Heartstrings and Fanartics Theatre Company, Kenya; Sergio Suiama, prosecutor, State of São Paulo, Brazil; Rachel O'Connell, VP of people networks and chief safety officer, Bebo.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;November 18, 2009 - Sunil Abraham&lt;/strong&gt;, an Internet policy expert from Bangalore, was a key panelist in this session who introduced the primary concerns tied to social networks today.&lt;br /&gt;&lt;br /&gt;"I'm going to raise nine emerging issues about social media," he began, "and I categorize them into four categories: Intellectual property rights, morality laundering, the hegemony of the connected and the hegemony of text."&lt;br /&gt;&lt;br /&gt;He noted that intellectual property law is completely outdated and cannot be applied in today's communications environment, saying it is "irrelevant." He added, "To take some examples, the right of the consumer to review, the right of the consumer to privacy, the right of the entrepreneur or enthusiast to make interoperable, complementary or competing products. All these rights used to be protected under the right to reverse-engineer. Issue 2 under IPR: On some corporate-mediated social media platforms, copyright takedown notices from one political party are acted on much more swiftly when compared to similar takedown notices from an opposing party. Issue 3, under IPR: Some rights holders, and in particular news organizations, use copyright takedown notices selectively to purge social media Web sites of content that opposes their editorial viewpoint. Issue 4 under intellectual property rights: The increased use of automated enforcement of copyright by rights holders is seriously undermining freedom of expression on the Internet, as in the case of the baby dancing to Prince's 'Let's Go Crazy.'"&lt;br /&gt;&lt;br /&gt;He explained "morality laundering" - saying that, like policy laundering, it is "trying to impose a globally homogenized morality regime." He cited the example of breast-feeding photos on a social network being deleted because they were considered obscene. "Breast-feeding, I may remind you, is still a public activity in many southern countries," he said. "Photographs of public life on a beach in a country where nudism is the norm becomes child pornography in another country."&lt;br /&gt;&lt;br /&gt;He said that religious traditions can sometime be reduced to a monoculture on community-managed social media platforms that "depend on editors to determine the truth," adding "That is because upper-crust and upper-class populations have greater access to the Internet. Literate communities will try to maintain their hegemony on the Internet. Community-managed social media platforms that depend on textual citation often ignore the knowledge of the oral communities of the global south."&lt;br /&gt;&lt;br /&gt;Session moderator &lt;strong&gt;Simon Davies&lt;/strong&gt;, director of Privacy International, asked Abraham if automated enforcement of social network policies should be outlawed. "I don't think it is possible for us to completely take out machine involvement in moderating content online," Abraham said, "whether it is from a freedom-of-speech perspective or a hate-speech perspective or from an intellectual-property-rights perspective. But I think the process has to become more transparent, so that the public will know what happened and why it happened and that there is due process and the possibility of appeal."&lt;br /&gt;&lt;br /&gt;Davies had kicked off the session with a plea that participants try to think ahead in this discussion of social networks. "Our role today in this panel is to look to the future, and our mentors at the UN and at IGF have urged me to motivate, as much as possible, an imagining of the future," he said. "Our role, as we can see on the program, is to look at social networks and social spaces such as micro-blogging and Web 2.0, as we move through to the next - what are the issues that we're likely to confront. So our two goals, if I can suggest a focus, is: What have we brought out of this last few days that tells us something about the way the future will go? Particularly in terms of social interaction. And second, imagine that future."&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sergio Siuama&lt;/strong&gt;, prosecutor for the State of São Paulo, Brazil, was asked to describe the privacy problem that developed there on Google's social network Orkut. "Social networks are the fourth most popular online activity, ahead of personal e-mail," he said. "Eighty percent of Brazilian Intenet users interact through social network sites. In Brazil as well in India and Pakistan, the most popular social networking service is Google's Orkut. More than 30% of Brazilian users access regularly use Orkut and about 25% of them are children and teenagers." He said many social networks accessed by people globally are transnational. "The most-accessed services in Brazil are provided by companies physically located in the United States," he said.&lt;br /&gt;&lt;br /&gt;In 2005 Google set up a branch in São Paulo, but it was not enough to handle the business of 30 million users. Since 2004 Brazilian authorities have been receiving reports of cyberbullying, drug dealing, child pornogrphy and other human rights violations in Orkut's space. In 2006 the federal attorney's office started a collective lawsuit against Google. Google responded with a proactive plan. After two years of litigation, in July 2008, the parties settled on a collective agreement in which Google agreed, among other obligations, to comply with Brazilian legislation, to store traffic data for at least six months, to take down child-abuse images, to develop a proactive system of child-abuse images detection, removal and report to law enforcement, and to establish a customer-service office able to quickly respond to all users' complaints. Some of these obligations were adopted as standards for the whole of Latin America in a document - the memorandum of Montevideo.&lt;br /&gt;&lt;br /&gt;Siuama raised several governance issues that arise from this case: Which criteria should be used to define the ability of a country to legislate over and sanction conducts committed on the Internet? Is it legitimate to enforce rules at a local company's office regarding a service operated from another country? What are the basic standards we should expect from ISPs to help cope with human rights violations on the Internet? Is any national law enforcement agency equipped to cope with crimes committed on social networking sites? Will it be necessary to ensure minimum levels of transparency and social accountability of networking services?&lt;br /&gt;&lt;br /&gt;Panel member &lt;strong&gt;Rachel O'Connell&lt;/strong&gt;, vice president of people networks and chief safety officer for Bebo, chaired the &lt;a class="external-link" href="http://www.europeandigitalmedia.org/safer-social-networking"&gt;European Union's Safer Social Networking Cross-Industry Task Force&lt;/a&gt; - an effort by 18 social networking companies, including Facebook and Google, working with the European Commission and civil liberties, child welfare, law enforcement and parenting groups.&lt;br /&gt;&lt;br /&gt;"We came up with seven principles that relate to education and ensuring that we have prominent and easily accessible safety messages and also addressing reporting abuse and providing people with the technologies and capabilities so they can use the Internet safely," she said. "We are doing a lot of filtering on the back end. We have moderation teams in place. We have very strong links with law enforcement. We look at the legal issues in each of the countries and the markets in which we operate and see how that ties up with being a US-based company. We're also aware of treaties like the multinational legal assistance treaty, in terms of working with law enforcement and investigators."&lt;br /&gt;&lt;br /&gt;O'Connell said the industry has probably not been clear enough about how these procedures are implemented. She expects that the principles set out by the task force will make things more clear. "The number of signatories was 18 and now it's up to 23, and part of my role is to encourage companies to become signatories," she said. "It means you need to self-declare how you have implemented the principles and each of the substantive recommendations. These self-declarations are being reviewed by independent researchers, and their report will be released to coincide with Safer Internet Day in February."&lt;br /&gt;&lt;br /&gt;She added that U.S. attorneys general have asked social networking companies to begin being more transparent and accountable. "Facebook has an internal auditor to ensure that they are meeting the requirements outlined by the attorneys general, and similarly MySpace has an agreement, so there is an incredible amount of work going on," she said. "That said, there is still a log of work to do, as there always will be. For example, AOL has been working closely with the National Center for Missing and Exploited Children and are diligent about working with law enforcement in other countries to ensure we can facilitate the investigative process. We also have a filtering process we run on the back end."&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Grace Bomu&lt;/strong&gt;, manager for Kenya-Heartstrings and Fanartics Theatre Company, Kenya, was on hand to talk about the positive influence of social networks. Her creative troupe uses them to do marketing, research and concept development. "From our Facebook page," she explained, "we're able to tell which issues the youth in Kenya are facing, and from those issues, we are able to develop a concept and sell our plays. On our Facebook page, people propose lines, other people propose they be actors, and this has really changed the way we do business. It's the actors who write the script, and our friends help us in writing the script.&lt;br /&gt;&lt;br /&gt;"Another way the Internet helps us is using the mobile money payment systems. Our management uses a mobile phone to update the page, to make comments and so on. Friends came up with the idea that they could pay to attend plays using mobile money payment systems."&lt;br /&gt;&lt;br /&gt;She said there are some negatives. Anonymous respondents and competitors write negative comments on the troupe's page, politicians sometimes try to use the page to advance their goals, "and we have had&amp;nbsp; problem of balancing what some people call abusive language with what others say is artistic expression."&lt;br /&gt;&lt;br /&gt;"We'd say that these tools have really helped news opening up culture, in growth of urban language and also in the contribution of topical issues," she concluded. "Tools are helping us to expand freedom of expression rather than caging it. So what we have done as a company is that we are coming up with - slowly, we are coming up with a code within us that we shall follow in balancing the competing interests."&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Rebecca MacKinnon&lt;/strong&gt;, Open Society Institute fellow and co-founder of the Global Network Initiative, noted that throughout the sessions of IGF-2009 people have been speaking out about the power of social networks as spaces where individual citizens can speak truth to power. "Spaces that help to make governments and other institutions more accountable to individuals," she said. "This is happening all over the world, across a range of political systems. But there are trends that are counteracting the potential of social networks to be a force that can truly help citizens participate in public life. This may be contributing to social networks acting as more opaque extensions of incumbent power in some situations, rather than as transparent conduits between citizens and institutions."&lt;br /&gt;&lt;br /&gt;MacKinnon raised four key points. The first is the level of liability governments place on social networking services in regard to user-generated content.&lt;br /&gt;&lt;br /&gt;While it is part of the groundrules for IGF that participants are encouraged to avoid singling out people or nations when meting out criticism, it was clear that she was referring to China when she said, "In some jurisdictions, international social networking sites end up being blocked because the sovereign government is not happy with some of the content being posted on the sites. And in some of those jurisdictions, what then ends up happening is that a robust set of domestic social networking sites evolve. And the social networking sites that are hosted domestically are held liable for all the content that their users are posting on the site. And so in order to comply with government requirements and the particular government's definition of what constitutes legal speech, these social networking sites end up having to develop large departments of people whose job it is to police content. international social networking sites that want to act - want to operate in certain jurisdictions have to make a choice, either to be blocked to users in that country because users may post things that the local government objects to, or agree to develop a locally hosted site in the local language which would then be subject to greater local jurisdiction and agree to police it. And there have been some cases where certain - and I have again been asked not to name and shame - but where certain companies have chosen to host locally and comply with government requests for political censorship in that regard. And so this is one challenge that social networking companies around the world are facing, is how to deal with this."&lt;br /&gt;&lt;br /&gt;Other points she outlined were:&lt;br /&gt;&lt;br /&gt;- &lt;strong&gt;Social network users are often not allowed to be anonymous&lt;/strong&gt;. "There's at least one country where now anybody who uses a social networking site or Web service over a certain size has to register with their national ID number," she explained, "and many human rights groups have expressed concerns about some users who have been traced for political speech. At least one international social networking service decided to disable the local uploading of videos and comments onto its service, so&amp;nbsp; people in that country have to use the international version of the service rather than the local service - so that this particular social networking site would not be in the position of handing people over for speech that might arguably be political."&lt;br /&gt;&lt;br /&gt;- &lt;strong&gt;Administrators of social networking sites will sometimes perceive that something is going against the terms of service when the content has a much different intent&lt;/strong&gt;. "There are political activists from a range of countries who found their Facebook accounts frozen because their pattern of activity resembled spamming," she said, "and this had an impact on their ability to conduct political activities. And there have been situations where activists in various countries post images of abuse by authorities against citizens and these are quite graphic and are deemed to be against terms of service. And the people concerned feel that 'if these sites do not let me speak truth to power, then were can I go?' So that's another sort of human-rights issue."&lt;br /&gt;&lt;br /&gt;- &lt;strong&gt;A new multistakeholder group, the &lt;a class="external-link" href="http://www.globalnetworkinitiative.org/"&gt;Global Network Initiative&lt;/a&gt;, is being co-founded by MacKinnon&lt;/strong&gt; and others to protect and advance freedom of expression and privacy in ICTs. "Our approach recognizes that a lot of these issues are difficult to legislate for because they involve very nuanced contextual situations that differ greatly," she said. "Companies do feel there is a need to have some kind of assistance in doing the right thing. How can social networks fulfill their potential and serve their users so they feel they can use these services without becoming victims of oppression in various ways? The Global Network Initiative combines companies who have signed on as well as human rights groups, socially responsible investment funds and some academics to help companies proactively figure out how to anticipate free-expression issues in order to avoid problems and assist in making choices about how to structure businesses."&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Pavan Duggal&lt;/strong&gt; spoke from the floor of the session about the formation of a dynamic coalition on social networks, which came together after a session on legal issues and social media earlier in the day. "These issues not only relate to data protection and privacy," he said. "They also relate to the issue of jurisdiction and ownership, storage, retention and transmission of user-generated content. Do we have the right to be anonymous? Do we have a right to oblivion? Can there be a right to delete in the context of social media? Is there a right of purging children-generated content? Can there be a right to forget and to forgive in the context of information? We also discussed how the deadly cocktail mix of social media and cloud computing is venturing us into a wild, wild west as far as jurisprudential rules and principles are concerned. Which country, what data, which server, which law would apply, which would be effective remedy, which would be the relevant court and how would the ultimate adjudication be done?"&lt;br /&gt;&lt;br /&gt;He said it is expected that national governments will try to legislate in this area. "While the Internet has made geography history, the fact still remains that national governments will try to legislate," he said. "It is time that respective stakeholders must come together, not just the players, the users, but also the industry, the government, the lawmakers, law enforcement."&lt;/p&gt;
&lt;p&gt;For the UN video, &lt;a class="external-link" href="http://www.un.org/webcast/igf/ondemand.asp?mediaID=pl091118pm2"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For the UN transcript, &lt;a class="external-link" href="http://www.intgovforum.org/cms/2009/sharm_el_Sheikh/Transcripts/Sharm%20El%20Sheikh%2018%20November%202009%20Emerging%20Issues.pdf"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For the original article, &lt;a class="external-link" href="http://www.elon.edu/e-web/predictions/igf_egypt/social_networks.xhtml"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/emerging-issues-social-networks'&gt;https://cis-india.org/news/emerging-issues-social-networks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T13:46:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/wiki-worth-different-turf">
    <title>Wiki's worth, on a different turf</title>
    <link>https://cis-india.org/news/wiki-worth-different-turf</link>
    <description>
        &lt;b&gt;An Indian duo–a programmer and a mathematician–have developed a tool to expose anonymous writers and cleanse Wikipedia of rogue editors&lt;/b&gt;
        &lt;p&gt;Bangalore-based Kiran Jonnalagadda, a Web programming guru, and Hans Varghese Mathews, a mathematician, are the new entrants to the emerging field of Wikipedia research. The duo is credited with building Wiki Analysis, a tool that helps researchers understand the growing phenomenon of astroturfing, the practice of faking grass-roots support on Wikipedia and other websites. Wikipedia is the first Google result for most searches and this has made it a popular destination for those trying to manipulate public opinion on the Internet. Corporations, governments and even pop artists have been caught astroturfing in the past.&lt;/p&gt;
&lt;p&gt;Jonnalagadda and Mathews are among 34 researchers from 17 countries attending a two-day conference in Bangalore, WikiWars, which is concluding today. WikiWars is taking a fresh look at many different aspects of the world’s biggest encyclopaedia, the sixth most popular website on the Internet.&lt;/p&gt;
&lt;p&gt;The first generation of astroturfing on Wikipedia has been, thus far, largely unsophisticated, with little attention paid to covering up digital evidence. Remember the campaign Avril Lavigne’s fans launched last year that turned her music video Girlfriend into the most viewed clip on YouTube? Wal-Mart Stores Inc. contracted its public relations firm Edelman to maintain a fake website called “Working Families for Wal-Mart”. They pretended to be ordinary citizens who opposed the views of the firm’s labour union.&lt;/p&gt;
&lt;p&gt;It is well known that platforms such as Twitter and Facebook, with opaque management procedures, are susceptible to astroturf campaigns. Supporters of open licensing and peer production have always held that Wikipedia and other community-managed platforms are protected thanks to their transparency in policies and practices. But as far as Wikipedia researchers are concerned, the jury is still out.&lt;/p&gt;
&lt;p&gt;Microsoft tried to pay technology blogger Rick Jelliffe to work on Wikipedia connected to OOXML (Office Open XML) during the ISO (International Organization for Standardization) approval process in an attempt to influence the global vote. OOXML was the new file format for MS Office documents that urgently needed approval to check the growing popularity of Open Office. A user called “Ril_editor”, active between September 2007 and May 2008, who claimed to be working out of Reliance Industries Ltd’s chief Mukesh Ambani’s offices, tried to expunge pages connected to negative publicity about Reliance. Scientologists were blocked by Wikipedia’s arbitration committee when they were found trying to systematically undermine Wikipedia’s NPOV (neutral point of view) policy. NPOV is Wikipedia’s particular spin on non-partisanship, providing equal space to all opinions. However, some Wikipedia researchers such as Geert Lovink, head of the Institute of Network Cultures, Amsterdam, and co-organizer of the WikiWars conference, believes that the dominance of English and textual citation requirements has meant that NPOV is never translated into practice.&lt;/p&gt;
&lt;p&gt;An American team based out of the Santa Fe Institute, US, has developed WikiScanner, a public database of IP addresses that helps reveal the organizations behind anonymous edits on Wikipedia. WikiScanner has been used to expose the US Central Intelligence Agency’s manipulation of pages. WikiScanner doesn’t yet work for edits by authenticated users. The WikiScanner team has also developed another tool called Potential Sock Puppetry, which exposes those who use multiple user accounts from the same IP address. However, both tools could be circumvented by purchasing multiple data cards or getting people to work from public access points such as coffee shops and cyber cafés.&lt;/p&gt;
&lt;p&gt;It is this gap the Indian duo’s tool tries to plug. The first version of their Wiki Analysis tool clusters users into potential lobbies based on the pages they edit within a date range. The tool’s next version will cluster users into lobbies based on the words they consistently add and delete across pages. Says Jonnalagadda, “Wikipedia is now close to a decade old and has many articles that have existed since its earliest days and have been edited by thousands of individuals.” It is now the primary encyclopaedic destination for Internet users, and that makes it a ripe target for astroturfing. At no point in the history of human civilization have so many collaborated over so long to produce one canonical document on any article of human knowledge.&lt;/p&gt;
&lt;p&gt;“Wikipedia users rarely bother to check how a page was edited, but that information is all there, available to anyone who cares to look. We’re building the tools to help make sense of it,” Jonnalagadda says. Once Wiki Analysis is ready, you will be able to check if, for example, the editors of the climate change page on Wikipedia are more interested in ecology or energy.&lt;/p&gt;
&lt;p&gt;Original article on &lt;a class="external-link" href="http://www.livemint.com/2010/01/12210114/Wiki8217s-worth-on-a-diffe.html"&gt;Livemint&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/wiki-worth-different-turf'&gt;https://cis-india.org/news/wiki-worth-different-turf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-10-23T08:33:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/whistle-blowers-unite">
    <title>When Whistle Blowers Unite</title>
    <link>https://cis-india.org/internet-governance/blog/whistle-blowers-unite</link>
    <description>
        &lt;b&gt;Leaking corporate or government information in public interest through popular Web service providers is risky but Wikileaks.org is one option that you could try out.&lt;/b&gt;
        
&lt;p&gt;Leaking corporate or government information in public interest in the age of Satyam has new challenges. You couldn't just upload it to a blog, social networking website or even a document management system like &lt;a class="external-link" href="http://www.google.co.in/"&gt;Google&lt;/a&gt; documents. &lt;a class="external-link" href="http://www.google.co.in/"&gt;Google&lt;/a&gt;, &lt;a class="external-link" href="http://m.in.yahoo.com/?p=us"&gt;Yahoo&lt;/a&gt; and most other Web service providers nearly always comply with the national law and cooperate with enforcement agencies. In India there have been several arrests in connection with alleged illegal email messages and content on social networking websites. It did not take court order – just a request from the local police station. Furthermore, you would have to undertake additional risky activity online to draw media attention to your documents. Also those who stand to lose from the leak can send a couple of copyright take down notices which will lead to deletion. So your only real option is &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks.org&lt;/a&gt;, where they boast:&amp;nbsp; Every source protected. No documents censored. All legal attacks defeated.&lt;/p&gt;
&lt;p&gt;Launched in December 2006, &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks.org&lt;/a&gt; stands alone on the Internet as the last refuge for the truth. Even though the promoters are European and US academic organisations, journalists and NGOs – a near neutral point of view is realised by sparing no one across the political and ideological spectrum. It is the archive of the whistle-blowers of the world and it is ugly: login information and private emails of a holocaust denier, secret documents from the Church of Scientology, Internet block-lists from Thailand and standard operating procedures for US guards at Guantanamo Bay, et cetera. One could safely assume that these guys have very few friends.&amp;nbsp; Unlike Wikipedia.org whose technology it employs,&amp;nbsp;&lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks&lt;/a&gt; does not have an open and participatory editorial policy. It accepts documents through a trusted journalist–source system.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Leaking controversial documents can result in loss of job, limb and life, so extreme caution is always advised. Remember that India still does not have laws protecting whistle blowers, in spite of a bill being introduced in 2006. What follows is only a very rough guide to digital whistle blowing, so please get expert advice before you try these at home:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Download and install military grade encryption software like Pretty Good Privacy. Generate a pair of keys – a public and a private one. Use your private key in combination to a journalist's public key to send him or her, a 'for your eyes only message' email.&amp;nbsp; Only the journalist will be able to decrypt the message using your public key and his private key.&amp;nbsp; Note however, that an Indian court under the 2008 amendment of the IT Act can ask you to disclose your key-pair.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Step outside. Working from home is a bad idea since DOT mandates that all ISPs retain logs for all users and for all services utilized for an indeterminate time-period. Office is still worse as your network administrator might be also logging your activities.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Find an anonymous public access point. Cyber-cafes, especially in New Delhi, Maharashtra, Karnataka and Tamil Nadu are asking users to provide identity cards and record contact details and in some cases web-cam photographs as well. Using your laptop in a coffee shop may work but DOT is considering cracking down on open wifi networks.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Use an anonymizing service so that the chain of digital evidence leading up to &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks&lt;/a&gt; is obliterated. TOR is the anonymizing solution of choice. Several TOR servers that provide private tunnels across the Internet work in unison, to form a cloud of anonymity. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;If you were leaking large amounts of data, uploading it may be too risky. Burn the data on DVDs and mail them to &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks&lt;/a&gt;. However, do ensure that all digital files have been purged of personal information. For word files this can be done by converting to PDF.&amp;nbsp; Also you may not want to leave any finger-prints on the package. India will soon have a database of finger prints thanks to the National Unique Identity (NUID) project. We know this thanks to the leaked NUID project document on &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks.org&lt;/a&gt;, days before the consultation.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/whistle-blowers-unite'&gt;https://cis-india.org/internet-governance/blog/whistle-blowers-unite&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:17:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/time-out-software-patenting">
    <title>Time Out Bengaluru - Software Patenting </title>
    <link>https://cis-india.org/news/time-out-software-patenting</link>
    <description>
        &lt;b&gt;An article by Akhila Seetharaman published as a precursor to the national public meeting on software patents held on 4th in Bangalore. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.timeoutbengaluru.com/aroundtown/aroundtown_feature_details.asp?code=14"&gt;Original article on Time Out Bengaluru website&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In August this year, the US Patents and Trademarks Office granted Microsoft ownership of “page up” and “page down”. So in theory, no other company can scroll without permission and acknowledgement to Microsoft in monetary terms.&lt;br /&gt; &lt;br /&gt;A number of seemingly ubiquitous software ideas have been patented: the use of tabs to shift from one hyperlink to another on a web page, the “Add to Shopping Cart” function that appears on every online store, automated online loan requests, and even reducing image size to make a webpage load faster.&lt;br /&gt; &lt;br /&gt;“Most companies register defensive patents to protect themselves, not offensive ones,” said Sunil Abraham of Centre for Internet and Society. “Not many actively pursue patent infringement, but it is still very scary for a small-time entrepreneur.”&lt;br /&gt; &lt;br /&gt;At a time when the Indian Patent Office is in the process of putting together a new Manual of Patent Practice and Procedure, the Centre for Internet and Society is holding a one-day consultation on the issue of software patenting in the city. Participants include the Delhi Science Forum, RedHat, IT for Change, Open Space, as well as the Alternative Law Forum.&lt;br /&gt; &lt;br /&gt;From mobile phone technology to pacemakers in healthcare, everybody is dependent on software. “Each software patent is a 17-year monopoly on an idea,” said Anivar Aravind of the Free Software User Group Bangalore.&lt;br /&gt; &lt;br /&gt;“If formulaic Hindi films were protected by patent laws, we would be able to make only one film,” joked Abraham. The system of software patenting wipes out smaller businesses and innovation, he said. “Software, like poetry and literary works, is already protected by copyright. After all, Bill Gates made his fortunes from copyright and not patents. But many software companies are trying to get additional protection.”&lt;br /&gt; &lt;br /&gt;Copyright and patents are both part of intellectual property rights, but copyright restricts the expression of an idea while patents restrict the idea itself, according to Abraham. Under a patenting regime, even before a kid writes one line of code he has to read many patents.”&lt;br /&gt; &lt;br /&gt;Kiran Patil of Turtle Linux Lab agreed. “If every little thing is patented, there’s nothing a developer can do.” He cited Richard Stallman, founder of the Free Software Movement and the GNU (a recursive acronym for GNU’s Not Unix) Project, who likened patents to explosive devices: “Software patents are the software project’s equivalent of land mines: each design-decision carries a risk of stepping on a patent, which can destroy your project.”&lt;br /&gt; &lt;br /&gt;Worst of all, the world sees those with patents as the innovators, said Patil, which, according to him, is a big misconception.&lt;br /&gt;&lt;br /&gt;While corporate giants like Microsoft and IBM fix exchange deals through cross-licensing, smaller companies get left out of the loop entirely. Despite not having many patents of their own, several Indian software companies support software patenting because they have huge contracts with the large software companies in the United States and Europe who do.&lt;br /&gt; &lt;br /&gt;The Indian Patent Act of 1970 did not allow for software patents until 2002 when an amendment, which ironically excluded “computer programmes per se” from the scope of patenting, was introduced.&lt;br /&gt; &lt;br /&gt;The amendment implied that while computer programmes themselves were not eligible for patents, programmes used in combination with hardware were. The Act was further amended through an ordinance in 2005 to narrow the scope of software excluded, but the ordinance was rejected by the Indian&lt;br /&gt; &lt;br /&gt;Parliament and the Act effectively reverted to what it was after the 2002 amendment. “The law has left it somewhat ambiguous,” said Abraham. “Nobody is sure what can or cannot be patented. Many people are using the clause “computer programmes per se” to get pure software patents.”&lt;br /&gt; &lt;br /&gt;This occurs either due to incompetence among patent officers or by accident, he said. “While many of the patent officers have expertise in the area of industrial inventions or medical inventions, very few know enough about software patents at the moment.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;-- Akhila Seetharaman&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/time-out-software-patenting'&gt;https://cis-india.org/news/time-out-software-patenting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-01-16T06:39:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/world-day-against-software-patents">
    <title>World Day Against Software Patents</title>
    <link>https://cis-india.org/news/world-day-against-software-patents</link>
    <description>
        &lt;b&gt;A global coalition of more than 80 software companies, associations and developers has declared the 24th of September to be the "World Day Against Software Patents".  The Hindu, a national daily dedicated one page of its Bangalore edition to software patents and software freedom. Deepa Kurup contributed written two articles titled "Will patenting take the byte out of IT here?" and "How would it be if you read only one type of book?" which reflects some of the concerns of the Free/Libre/Open Source Software community. &lt;/b&gt;
        &lt;h2&gt;Will patenting take the byte out of IT here? [&lt;a class="external-link" href="http://www.hinduonnet.com/thehindu/thscrip/print.pl?file=2008092461910300.htm&amp;amp;date=2008/09/24/&amp;amp;prd=th&amp;amp;"&gt;link&lt;/a&gt;]&lt;/h2&gt;
&lt;p&gt;Deepa Kurup&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;There has been little debate on patent laws and the software industry. Today is World Day Against Software Patents.&lt;/p&gt;
&lt;p&gt;IT software, services and outsourcing industry has been rooting for software patenting&lt;br /&gt;Delhi Patent Office receives around 50 applications for software patents every month&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;BANGALORE: Picture this. Indian mathematicians came up with the concept of the “zero” — often touted as India’s greatest contribution to civilisation — and got a patent for it. By now they would have raked in inestimable amounts in royalty. Seems preposterous? Members of the Free Software community say that patenting every other algorithm would be somewhat in the same league.&lt;br /&gt;&lt;br /&gt;While there has been substantial discussion on how patents will affect the pharmaceutical sector, there has been little debate about its implications on the software industry. To the layman, software patenting sounds like an abstract issue applicable to an even more abstract domain. However, with a growing software industry which is trying to spread its indigenous roots, the issue becomes an important one.&lt;br /&gt;&lt;br /&gt;Traditionally, software comes under the Copyright Law (just like any literary work) and anyone who writes a program owns it. After Indian Parliament in 2005 scrapped an ordinance which declared “software in combination with hardware” patentable, the controversial and ambiguous clause — “software per se” — has now resurfaced in a recently formulated Patent Manual.&lt;br /&gt;&lt;br /&gt;And how will the common man be affected by this proposed change in the patent manual? For example, when Global Patent Holdings patented usage of images on websites, a bunch of small and big companies had to cough up to $50 million each. And where does this cost reflect? “The consumer will find that products will get a lot more expensive. Take a DVD player which has about 2,000 patents (many of them software-related). Every time a local company makes a DVD player, they have to pay royalties and the costs will naturally be reflected on the sale price,” says Sunil Abraham of Centre for Internet and Society, a research and advocacy organisation.&lt;br /&gt;Backdoor entry&lt;br /&gt;&lt;br /&gt;The Free Software community feels that patents will make a backdoor entry, courtesy this manual and that ongoing public consultation (by the Patent Office) does not take their voices into account. Mr. Abraham says: “We feel that the powerful software lobbies around are pushing for this clause. If allowed, it will affect the basis of innovation, and will in turn affect the industry.” While the Bangalore consultation was “postponed indefinitely,” the Patent Office in its Delhi meeting said this issue called for an “exclusive meeting with the software industry.”&lt;br /&gt;&lt;br /&gt;The powerful IT software, services and outsourcing industry has been rooting for software patenting. Under the guile of the seemingly innocuous clause in the Indian Patent Bill 2005, software companies and the MNC lobby is trying to carve out a slice for the specific “software embedded with hardware” industry saying that it will increase the value of indigenous home-grown software, pump up software exports and thereby rake in greater revenue.&lt;br /&gt;&lt;br /&gt;However, the other side of the story is worth telling. Software, per se, is simply a set of instructions to carry out a certain process. Software experts put forth the argument that big corporations — with money, muscle and hired talent — will seek to impose patents along the software value chain, starting from source code to the recent demand for “embedded software.”&lt;br /&gt;&lt;br /&gt;Sources in the Delhi Patent Office say that they receive around 50 applications for software patents every month. In the U.S. 25,000 patents are granted every year. In a software-driven world, blurring the lines between software and software “per se” could be risky. “Patenting is an expensive and tedious process. The challenge for every programmer would be to verify each time, to see if any two lines of his code would infringe upon a patent. In the U.S., a single verification can cost as much as $5,000. The fundamental issue is that if I arrive at anything independently, should I not use it only because someone had got it patented before me?” asks a senior official at Red Hat, an open source service provider.&lt;br /&gt;&lt;br /&gt;A paper written by members of the Alternative Law Forum (ALF), the case against software patenting is presented as a very basic one. “Software evolves much faster than other industries, even with its own hardware industry. Microprocessors double in speed every two years. So, a patent that lasts up to 17 years (minimum period -15) is alarming. In this field, the idea underlying may remain the same but a product has to be replaced on an average of every two years,” it states. The paper also points out that in software “research costs are little because ideas are as abundant as air.”&lt;br /&gt;&lt;br /&gt;Prashant Iyengar of ALF feels that patent laws will effectively curtail innovation, like it has done in the U.S. “Software, unlike other industries in India, is end-driven but is also on a “body shopping” model. Given that, a strong start-up company will be either be shut down or bought over if patent laws come in,” he explains.&lt;/p&gt;
&lt;h3&gt;How would it be if you read only one type of book? [&lt;a class="external-link" href="http://www.hinduonnet.com/thehindu/thscrip/print.pl?file=2008092550590300.htm&amp;amp;date=2008/09/25/&amp;amp;prd=th&amp;amp;"&gt;link&lt;/a&gt;]&lt;/h3&gt;
&lt;p&gt;Deepa Kurup&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Little or no attention is paid to what is being taught in schools and colleges&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;BANGALORE: A computer literacy programme in a public sector organisation teaches the following modules: MS Office, MS Power Point, MS Excelsheet and Internet Explorer. A glance through the “computer syllabus” in most schools, and the list is similar. All items on this checklist have one thing in common: proprietary software. So, if every computer user is being taught exclusively on proprietary platforms, would they ever be comfortable switching to the easier, cheaper and readily available alternatives?&lt;br /&gt;&lt;br /&gt;Advocates of Free Software — software which can be used, studied and distributed without restriction — say that this is a ploy by proprietors to turn learners into potential customers. They allege that educational systems and the State are in cahoots with these large corporations which insist that children and learning adults be taught to only follow their system.&lt;br /&gt;&lt;br /&gt;In a recent meeting with a State Government official about the use of Free Software on e-governance platforms, the official complained that none of his officials knew how to use it or repair it if things went wrong.&lt;br /&gt;&lt;br /&gt;“This takes you to the root of the problem,” says Sunil Abraham of Centre for Internet and Society, Bangalore. “Students are taught to use only proprietary software. The Government is subsidising training in proprietary technology and little or no attention is paid to what is being taught in schools and colleges,” he explains.&lt;br /&gt;&lt;br /&gt;The “back-office” tag that our IT industry has learnt to live with is also a product of this malaise, experts point out. “When students learn only proprietary software, they will qualify only as computer operators and never learn about using the nuts and bolts of the profession. This is one of the reasons why there are no innovative products that come out of this country,” says Mr. Abraham.&lt;br /&gt;Simple analogy&lt;br /&gt;&lt;br /&gt;A simple analogy would be that of a child taking up reading as a habit. If a child reads a lot of books, they say, they learn to write and express better. Academics feel that in the absence of any familiarity with Free Software, where the source is easily available, engineering students and computer graduates never get to read any code and are thus hardly familiar with the languages.&lt;br /&gt;&lt;br /&gt;FOSS supporters have written to the Ministry of Human Resource Development and several universities to point this out. Anivar Aravind, a member of Free Software Users Group, says that the progress so far has been staggered. Recently, CDAC and Anna Univeristy (KB Chandrashekar Research Centre) came up with a Free Software syllabus and offers trained to teachers in engineering colleges.&lt;br /&gt;Cost factor&lt;br /&gt;&lt;br /&gt;A study by International Open Source Network (an UNDP initiative) study on FOSS and education states that using open source software could reduce the costs involved in ICT education significantly. In a country like ours, this fact that Open Source Software usually involves low or no cost would be perceived as an important step towards reducing the digital divide. With no licensing fee, they can be made available on CD or downloaded.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/world-day-against-software-patents'&gt;https://cis-india.org/news/world-day-against-software-patents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-01-16T07:15:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
