<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 521 to 535.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/huffington-post-september-22-2016-nirmita-narasimhan-mobile-apps-are-excluding-millions-of-indians-who-want-to-use-them"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/resources/cis-accessibility-work-overview"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/dna-september-17-2016-subhashish-panigrahi-software-freedom-day-importance-of-free-and-open-source-software"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/software-freedom-day"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/samaja-september-17-2016-subhashish-panigrahi-let-us-write-our-code-in-our-own-hands"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/global-voices-september-17-2016-subhashish-panigrahi-it-is-september-and-that-means-it-is-time-for-software-freedom-day"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/methodology-statements-of-working-form-27-of-indian-mobile-device-patents"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/spicy-ip-september-7-2016-anubha-sinha-where-is-the-regional-comprehensive-economic-partnership-headed"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-september-3-2016-nishant-shah-quarter-life-crisis-the-world-wide-web-turns-25-this-year"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/3-copyright-tips-for-students-and-educators"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/accessibility/blog/huffington-post-september-22-2016-nirmita-narasimhan-mobile-apps-are-excluding-millions-of-indians-who-want-to-use-them">
    <title>Mobile Apps Are Excluding Millions Of Indians Who Want To Use Them</title>
    <link>https://cis-india.org/accessibility/blog/huffington-post-september-22-2016-nirmita-narasimhan-mobile-apps-are-excluding-millions-of-indians-who-want-to-use-them</link>
    <description>
        &lt;b&gt;If someone were to ask you how many apps you use in a day, you might need to stop and count. You use apps to book cabs, to order groceries, make payments online, buy diapers, connect with friends... the list goes on. In fact apps, are becoming so intrinsic to daily life that without one handy you may have to think twice about how to complete a transaction.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.huffingtonpost.in/nirmita-narasimhan/mobile-apps-are-excluding-millions-of-indians-who-want-to-use-th/"&gt;Huffington Post&lt;/a&gt; on September 22, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Apps are uncomplicated, easy to use, at your finger tips and quick.  So logically, everyone who has a smartphone should be using them, right?  Unfortunately, that is not the case. Much as they would like to,  millions of persons living with disabilities are unable to use apps to  fulfil their daily living needs. This is because most apps are not  accessible to users with a visual disability.&lt;/p&gt;
&lt;div class="desktop-only ad_spot" id="entry_paragraph_2" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;blockquote class="pull-quote" style="text-align: justify; "&gt;&lt;span class="quote"&gt;With about 30% of the  blind population of the world living in India, it's imperative for  service providers to give more thought to universal design and  accessibility standards. &lt;/span&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In order for an app to be accessible for a blind user, it should be  readable by a screen reader -- software which reads out whatever appears  on the screen. For it to function effectively, elements on web pages  and applications should be properly labelled, otherwise the software  will be unable to decipher what it is, not having any cognitive  abilities like human beings. It will merely read out the element out as  "button" or "graphic".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here I will look at five very popular apps relating to food, groceries,  transportation and mobile bill payment and banking to see how accessible  they are for people with disabilities. These apps were tested using  Talk Back, an open source Android screen reader.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;1. Swiggy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first app we looked at was Swiggy, which is used to order food  from nearby restaurants. Here, the first screen, which shows the  discounts/offers available, uses a graphics banner without alternative  text, which cannot be deciphered by a screen reader. Another issue is  inaccessible navigation. For instance, though we can select a food  category like "soup", choosing a particular type of soup is not possible  as the focus simply stays on the main category. This means a screen  reader cannot read the rest of the information, making it impossible for  a visually challenged person to order food.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;2. Big Basket&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Then we tried Big Basket to order some groceries. One of the issues  we found included unlabelled banners; also, the continuous scrolling of  the banner, which makes the screen reader try to constantly read the  next unlabelled graphic, renders the app practically unusable. When we  navigated to the list of products available, only their names were  readable and the focus could not be shifted to information like price  and quantity. This means the user can add items to the basket, but has  no way of knowing the price or deciding the quantity, which obviously  makes the app a no-go.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;3. Ola&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The taxi-hailing app Ola is fairly accessible, with some scope for  improvement. The button to pinpoint the location is not labelled, and  while trying to select a cab category the focus moves away automatically  if there is no action in a few seconds. Hence, a person with vision  impairments may need some assistance to use the app.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;4. MyAirTel&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This app for Airtel customers was found to have limited usability, with several accessibility issues. Many buttons, including &lt;i&gt;Settings &lt;/i&gt;and &lt;i&gt;Information&lt;/i&gt; are not labelled and hence are not readable by screen readers. The  offers and discounts banner is also not labelled and keeps on moving,  sending the screen reader into a loop saying "graphic". However, viewing  unbilled/billed amounts and paying bills is easy, as those screens are  well labelled and use minimal graphic controls.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;5. ICICI - Pockets&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This digital wallet app from ICICI bank was tested using an ICICI  bank internet banking login and unfortunately found to be completely  inaccessible for a person using a screen reader. There is no screen  reader support and consequently no auditory feedback when using slides  or touching the screen. One can tap and access the menus/options but  they are not focusable and are not announced by the screen reader.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the past few years we have seen how corporates have embraced  technological innovations and helped better the lives of common Indians.  However, a more inclusive approach will help people with disabilities  to enjoy the best technology has to offer, and lead a more independent  life. It would be pertinent to mention at this point that the  inaccessibility of apps is not a phenomenon which is particular to the  ones reviewed above, but a common feature across stakeholder groups,  including private and government agencies. With about 30% of the blind  population of the world living in India, it's imperative for service  providers engaging consumers through information and communication  technologies to give more thought to universal design and accessibility  standards. It would truly make a difference in the lives of many  Indians.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/huffington-post-september-22-2016-nirmita-narasimhan-mobile-apps-are-excluding-millions-of-indians-who-want-to-use-them'&gt;https://cis-india.org/accessibility/blog/huffington-post-september-22-2016-nirmita-narasimhan-mobile-apps-are-excluding-millions-of-indians-who-want-to-use-them&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2016-09-24T16:01:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/resources/cis-accessibility-work-overview">
    <title>An Overview of Accessibility Work (2008 - 2016)</title>
    <link>https://cis-india.org/accessibility/resources/cis-accessibility-work-overview</link>
    <description>
        &lt;b&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and accessibility policies. CIS campaigns for change in this area. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The progress made over the years can be accessed below:&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Publications&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/front-page/blog/e-accessibility-handbook"&gt;&lt;span&gt;E-Accessibility Policy Handbook for Persons with Disabilities&lt;/span&gt;&lt;/a&gt; (Nirmita Narasimhan, G3ict and ITU; November 23, 2010): The handbook was compiled and edited by Nirmita Narasimhan. Nirmita also contributed to the original toolkit.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/accessibility/universal-service-disabilities.pdf"&gt;&lt;span&gt;Universal Service for Persons with Disabilities&lt;/span&gt;&lt;/a&gt; (CIS, G3ict and Hans Foundation; December 27, 2011). Nirmita Narasimhan was a co-author.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/web-accessibility.pdf"&gt;Web Accessibility Policy Making&lt;/a&gt; (CIS, G3ict and Hans Foundation; February 28, 2012). Nirmita Narasimhan was a contributor.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/making-mobile-phone-and-services-accessible-for-persons-with-disabilities.pdf"&gt;&lt;span&gt;Making Mobile Phones and Services Accessible for Persons with Disabilities&lt;/span&gt;&lt;/a&gt; (ITU and G3ict; August 2012). Nirmita Narasimhan was a co-author.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/accessibility-of-government-websites-in-india"&gt;&lt;span&gt;Accessibility of Government Websites in India: A Report&lt;/span&gt;&lt;/a&gt; (CIS and Hans Foundation; September 26, 2012). Nirmita Narasimhan was a co-author.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/unesco-global-report"&gt;&lt;span&gt;Opening New Avenues for Empowerment&lt;/span&gt;&lt;/a&gt; (UNESCO; February 2013). Nirmita Narasimhan was the project coordinator from Asia Pacific.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/inclusive-financial-services.pdf"&gt;&lt;span&gt;Inclusive Financial Services for Seniors and Persons with Disabilities: Global Trends in Accessibility Requirements&lt;/span&gt;&lt;/a&gt; (G3ict and CIS; February 2015). Nirmita Narasimhan was a co-author.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/national-compendium-of-laws-policies-programmes-for-persons-with-disabilities"&gt;&lt;span&gt;National Compendium of Laws, Policies and Programmes for Persons with Disabilities&lt;/span&gt;&lt;/a&gt; (CIS and Office of the Chief Commissioner for Persons with Disabilities, Department of Disability Affairs, Ministry of Social Justice and Empowerment, Govt. of India; January 3, 2016). Nirmita Narasimhan was one of the contributors.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Reports&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://nivh.gov.in/Ar_English_2011-12.pdf"&gt;NIVH Annual Report 2011-12&lt;/a&gt; (NIVH; 2012)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/blog/inclusive-disaster-and-emergency-management-for-persons-with-disabilities"&gt;&lt;span&gt;Inclusive Disaster and Emergency Management for Persons with Disabilities&lt;/span&gt;&lt;/a&gt; (Nirmita Narasimhan and Deepti Samant Raja; September 17, 2013). The report was submitted to the National Disaster Management Authority of India for their action. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report"&gt;Banking and Accessibility in India: A Report&lt;/a&gt; (Nirmita Narasimhan; August 12, 2013)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/accessibility-of-political-parties-websites.pdf"&gt;&lt;span&gt;Accessibility of Political Parties Websites in India&lt;/span&gt;&lt;/a&gt; (Nirmita Narasimhan; March 24, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/enabling-elections"&gt;&lt;span&gt;Enabling Elections&lt;/span&gt;&lt;/a&gt; (Nirmita Narasimhan and Centre for Law and Policy Research; March 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Policy Submissions and Feedback&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS worked with the Department of Electronics and Information Technology and civil society and industry partners such as the National Centre for Promotion of Employment for Disabled People (NCPEDP), Microsoft Corporation, National informatics Centre (NIC), etc., to formulate and implement a &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/NPE_Notification.pdf"&gt;&lt;span&gt;National Electronic Accessibility Policy&lt;/span&gt;&lt;/a&gt; to ensure that all Indian information and communication technologies and electronic infrastructure (including the Internet) and research which is publically funded, is accessible to persons with disabilities. Nirmita Narasimhan was part of the policy drafting committee. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/accessibility-new-telecom-policy-2011"&gt;Accessibility in the New Telecom Policy 2011&lt;/a&gt;: CIS made a submission to the Department of Telecommunications, Ministry of Communications &amp;amp; Information Technology, Government of India on December 9, 2011. CIS was one of the 27 organisations that sent a joint letter requesting that accessibility for persons with disabilities be included specifically within the goals and objectives of the policy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pilot Project Scheme - Access to ICTs and ICT Enabled Services for Persons with Disabilities in Rural India: CIS worked with USOF of India to design a &lt;a href="http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf"&gt;&lt;span&gt;scheme to launch projects for persons with disabilities&lt;/span&gt;&lt;/a&gt;. CIS prepared a background paper for the USOF, compiled a comprehensive global report which was later &lt;a href="http://cis-india.org/accessibility/universal-service-for-persons-with-disabilities"&gt;&lt;span&gt;published&lt;/span&gt;&lt;/a&gt; in cooperation with G3ict and helped to convene a stakeholders meeting in September 2011 to launch the scheme and invite project applications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/blog/comments-to-rights-of-persons-with-disablities-bill-2014"&gt;&lt;span&gt;Comments to the Rights of Persons with Disabilities Bill, 2014&lt;/span&gt;&lt;/a&gt; (Nirmita Narasimhan and Anandhi Viswanathan; October 30, 2014). The comments were submitted to the Parliamentary Standing Committee in October 2014.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS joined hands with Daisy Forum of India member Arushi in Bhopal to &lt;a href="http://cis-india.org/accessibility/blog/govt-of-mp-initiates-ict-accessibility-in-public"&gt;&lt;span&gt;submit a request for a notification mandating that all communication by the Government of Madhya Pradesh should be accessible to persons with disabilities&lt;/span&gt;&lt;/a&gt;. The state government issued a &lt;a href="http://cis-india.org/accessibility/blog/notification-by-mp-govt.pdf"&gt;notification in Hindi&lt;/a&gt; requesting all departments to comply with WCAG 2.0 and use Unicode font. Nirmita Narasimhan drafted this submission.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/blog/accessible-ict-procurement"&gt;&lt;span&gt;Accessible ICT Procurement&lt;/span&gt;&lt;/a&gt;: CIS along with 20 other organisations petitioned the Ministry of Social Justice &amp;amp; Empowerment, Ministry of Finance and the Ministry of Information Technology, Govt. of India to bring in accessibility considerations within the draft Procurement Bill.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/blog/comments-to-gigw"&gt;Comments to the GIGW&lt;/a&gt; (Nirmita Narasimhan; April 30, 2015): CIS submitted its comments to the National Informatics Centre for making Indian government websites conform to the notified standards of the Guidelines for Indian Government Websites.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/accessible-ict-procurement"&gt;Recommendations on Accessible ICT Procurement&lt;/a&gt; (Pranesh Prakash; May 9, 2016). CIS along with 20 other organisations petitioned the Ministry of Social Justice &amp;amp; Empowerment, Ministry of Finance and the Ministry of Information Technology to bring in accessibility considerations within the draft Procurement Bill. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;WIPO&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is accredited as an observer at WIPO and regularly participates in the meetings of the Standing Committee for Copyright and Related Rights (SCCR) held in Geneva. CIS is actively involved in matters being discussed there such as the TVI. As part of its work, CIS provides comments at the SCCR and advises the Indian government on these matters through policy briefs, research and interactive discussions and meetings. CIS has given several statements on &lt;a href="http://cis-india.org/a2k/blog/cis-statement-sccr24-treaty-visually-impaired"&gt;&lt;span&gt;Treaty for the Visually Impaired&lt;/span&gt;&lt;/a&gt; and prepared an &lt;a href="http://cis-india.org/a2k/blog/cis-analysis-july2011-treaty-print-disabilities"&gt;&lt;span&gt;analysis&lt;/span&gt;&lt;/a&gt; of the consensus document on an international instrument on limitations and exceptions for persons with disabilities with the Third World Network which was widely circulated amongst the negotiators at the SCCR. CIS’ statements at the SCCR in June 2013, &lt;a href="http://cis-india.org/a2k/blog/cis-statement-sccr24-broadcast-treaty"&gt;July 2012&lt;/a&gt;, &lt;a href="http://cis-india.org/a2k/blog/sccr-23-broadcast-cis-statement"&gt;December 2011&lt;/a&gt;, &lt;a href="http://cis-india.org/a2k/blog/sccr-22-broadcast-cis-statement"&gt;June 2011&lt;/a&gt;, and &lt;a href="http://cis-india.org/a2k/blog/sccr-cis-statement"&gt;November 2010&lt;/a&gt; are available on the CIS website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS took part in the WIPO Diplomatic Conference to Conclude a Treaty to Facilitate Access to Published Works by Visually Impaired Persons and Persons with Print Disabilities in Marrakesh, Morocco, June 17 to 28, 2013. The conference concluded with the adoption of the &lt;a href="http://www.wipo.int/meetings/en/doc_details.jsp?doc_id=241683"&gt;&lt;span&gt;Marrakesh Treaty to Facilitate Access to Published Works for Persons who are Blind, Visually Impaired, or otherwise Print Disabled&lt;/span&gt;&lt;/a&gt;. CIS's Closing Statement at Marrakesh on the Treaty for the Blind &lt;a href="http://cis-india.org/a2k/blog/cis-closing-statement-marrakesh-treaty-for-the-blind"&gt;&lt;span&gt;can be seen here&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the national level CIS has been campaigning for right to read, attending meetings with ministries such as the Ministry of Human Resource Development, Department of Electronics and Information Technology, and the Ministry of Social Justice and Empowerment, and giving feedback on the Copyright Amendment Bills. Earlier this year, CIS gave a detailed analysis of the &lt;a href="http://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Copyright (Amendment) Bill 2012&lt;/a&gt; examining the positive changes and the negative ones.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Events&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/events/announcement-of-national-workshop-on-web-accessibility"&gt;&lt;span&gt;National Workshop on Web Accessibility&lt;/span&gt;&lt;/a&gt; (Organized by CIS and Society for Promotion of Alternative Computing and Employment; September 25-26, 2009).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-national-conference-ICTs"&gt;&lt;span&gt;National Conference on ICTs for Differently Abled / Under privileged Communities in Education, Employment &amp;amp; Entrepreneurship — NCIDEEE 2009&lt;/span&gt;&lt;/a&gt; (Loyola College, Chennai, December 1 – 3, 2009): The event was co-organised by Dr. A. Albert Muthumalai S. J, Principal, Loyola College, &amp;amp; Prof. J. Jerald Inico, Faculty In-charge, Resource Centre for the Differently Abled (RCDA), Loyola College, in association with NASSCOM, Computer Society of India and CIS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS organized Right to Read campaigns in the 4 metro cities of &lt;a href="http://cis-india.org/accessibility/blog/right-to-read-campaign-chennai"&gt;Chennai&lt;/a&gt; &lt;a href="http://cis-india.org/accessibility/blog/right-to-read-campaign-kolkata"&gt;Kolkata&lt;/a&gt;, &lt;a href="http://cis-india.org/accessibility/blog/right-to-read-campaign"&gt;Delhi&lt;/a&gt; and &lt;a href="http://cis-india.org/accessibility/blog/mumbai-phase-of-right-to-read-campaign"&gt;Mumbai&lt;/a&gt;. The campaign has gathered thousands of supporters and has succeeded in bringing the problems of the print disabled to the notice of policy makers and the general public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/blog/edict-report"&gt;&lt;span&gt;EdICT 2010&lt;/span&gt;&lt;/a&gt; (New Delhi, October 27 to 30, 2010): CIS in collaboration with G3ict, UNESCO, ITU, WIPO, The Deafway Foundation, DEF and SPACE and with the support from Hans Foundation and the Department of Information Technology, Ministry of Information and Communication Technology organised this event. Twenty-nine experts made presentations on a variety of topics, ranging from discussing challenges and solutions in educational institutions, to technology development and policy formulation and implementation. A total of 77 participants attended this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/blog/websites-accessibility-evaluation-methodologies"&gt;&lt;span&gt;Websites Accessibility Evaluation Methodologies at Twentieth International World Wide Web Conference&lt;/span&gt;&lt;/a&gt; (Hyderabad, March 30 – 31, 2011): CIS co-organised this with G3ict and W3C. The panel discussed web accessibility evaluation methodologies and their challenges and technical survey methodologies alternatives. The panel was moderated by Nirmita Narasimhan and featured four speakers — Shadi Abou Zahra, Neeta Verma, Srinivasu Chakravartula and Glenda Sims.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/itu-tutorial-delhi"&gt;ITU Tutorial on Audiovisual Media Accessibility&lt;/a&gt; (India International Centre, New Delhi, March 14 – 15, 2012): In cooperation with the ITU-APT Foundation of India, CIS hosted a two-day Tutorial on Audio Visual Media Accessibility from March 14 to 15, 2012 at the India International Centre, New Delhi, India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/events/girls-in-ict-day"&gt;&lt;span&gt;Girls in ICT Day&lt;/span&gt;&lt;/a&gt; (Organized by CIS and Mithra Jyothi; Bangalore; April 25, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Internet Governance Forum&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;CIS has been organising workshops and participating regularly at IGF events since 2008 on topics like accessibility, access to knowledge, openness, internet governance, freedom of expression, etc. Details given below:&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;IGF 2008, Hyderabad, India: CIS joined the Dynamic Coalition on Open Standards and also contributed to the authoring of the &lt;a href="http://cis-india.org/openness/blog/dcos-agreement-on-procurement"&gt;Agreement on Procurement in Support of Interoperability and Open Standards&lt;/a&gt;. CIS is now a part of the DCOS secretariat. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;IGF 2009, Sharm El Sheikh, Egypt: Nirmita Narasimhan presented on Accessibility Policy Making: An International Perspective at the &lt;a href="http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=WSProposals2009View&amp;amp;wspid=110"&gt;Global Internet Access for Persons with Disabilities&lt;/a&gt; workshop organised by ITU and EBU on November 16. CIS also co-organised the workshop on ‘Content Regulation, Surveillance and Sexuality Rights – Privacy, Agency and Security’, together with the Association for Progressive Communications, Women’s Networking Support Programme and the Alternative Law Forum.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;IGF2010, Vilnius, Lithuania: At the UNESCO Open Forum, Anja Kovacs presented the research study &lt;a href="http://portal.unesco.org/ci/fr/files/30853/12852529733Open_Forum_-_Anja_Kovacs_-_disabilities.pdf/Open%2BForum%2B-%2BAnja%2BKovacs%2B-%2Bdisabilities.pdf"&gt;‘Exploring ICT-enabled Education Initiatives for Persons with Disabilities in the Asia-Pacific Region&lt;/a&gt;’. The study was undertaken by CIS in cooperation with G3ICT and UNESCO. Besides this, CIS co-organised these workshops: &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2010View&amp;amp;wspid=85"&gt;Freedom of Expression or Access to Knowledge: Are We Taking the Necessary Steps towards an Open and inclusive Internet?&lt;/a&gt; with the Center for Technology and Society, Brazil, ‘&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2010View&amp;amp;wspid=73"&gt;Sexual Rights, Openness and Regulatory Systems&lt;/a&gt;’, with the Association for Progressive Communications and the Alternative Law Forum, &lt;a href="http://cis-india.org/events/open-standards"&gt;Open Standards: Ensuring Accessibility and Inclusiveness&lt;/a&gt; with the World Wide Web Consortium and the workshop on &lt;a href="http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=WSProposals2010View&amp;amp;wspid=154"&gt;Data in the Cloud: Where Do Open Standards Fit In?&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;IGF 2011, Nairobi, Kenya: &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=184"&gt;Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward&lt;/a&gt; and &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=121"&gt;Open Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;. These workshops were organized by CIS.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Awards&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Nirmita Narasimhan was awarded the &lt;a href="http://cis-india.org/advocacy/accessibility/blog/national-award"&gt;&lt;span&gt;National Award&lt;/span&gt;&lt;/a&gt; for Empowerment of Persons with Disabilities from the Government of India on December 3, 2010 on the occasion of the World Disability Day. The award was presented by Smt. Pratibha Patil, President of India under the Role Model category. The award function took place at Vigyan Bhavan in New Delhi and was telecast live on Doordarshan.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Nirmita Narasimhan received the &lt;a href="http://cis-india.org/news/nirmita-nivh-award"&gt;&lt;span&gt;NIVH Excellence Award&lt;/span&gt;&lt;/a&gt; from Justice AS Anand (retd), former chairman of the National Human Rights Commission, on International Day of Persons with Disabilities at the National Institute for the Visually Handicapped in Dehradun on December 3, 2011. The Tribune &lt;a href="http://www.tribuneindia.com/2011/20111204/dplus.htm#3"&gt;covered the award ceremony&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/blog/girls-in-ict-day-2013-in-delhi"&gt;&lt;span&gt;Girls in ICT Day 2013&lt;/span&gt;&lt;/a&gt; (organized by ITU-APT Foundation of India with support from CMAI - Association of India Communication and Infrastructure, FICCI Auditorium, Tansen Marg, New Delhi, May 7, 2013). Dr. Nirmita Narasimhan got a felicitation for her contribution and achievements in the field of Information and Communication Technology. The honour was conferred during the celebration of this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Nirmita Narasimhan won the &lt;a class="external-link" href="http://cis-india.org/accessibility/news/nirmita-narasimhan-gets-ncpedp-mphasis-universal-design-award"&gt;NCPEDP-Mphasis Universal Design Award&lt;/a&gt; in the "Persons with Disabilities" category. The  awards aim to raise awareness about accessibility.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Articles and Interviews&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/accessibility-in-higher-education"&gt;&lt;span&gt;Technology for Accessibility in Higher Education&lt;/span&gt;&lt;/a&gt;: Nirmita Narasimhan wrote an article in Enabling Access for Persons with Disabilities to Higher Education and Workplace - Role of ICT and Assistive Technologies. The IIMB Journal was brought out on the occasion of the conference ‘never-the-less’.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/business-case-for-web-accessibility"&gt;&lt;span&gt;The Business Case for Web Accessibility&lt;/span&gt;&lt;/a&gt;: NASSCOM Foundation published "Understanding Web Accessibility — A Guide to create Accessible Work Environments". In this handbook on web accessibility, Nirmita Narasimhan authored a chapter titled “The Business Case for Web Accessibility”. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility/barriers-to-access-connected-world"&gt;&lt;span&gt;Barriers to Access in a Connected World&lt;/span&gt;&lt;/a&gt;: Hans Foundation published its Annual Review of 2011. Nirmita Narasimhan wrote an article in it. She wrote that accessibility is an imperative to achieve a truly inclusive and participatory society and every individual, corporation, organization and government has a crucial role to play in nurturing it.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/news/interview-with-nirmita"&gt;&lt;span&gt;Girls in ICT Portal&lt;/span&gt;&lt;/a&gt; (November 28, 2011): ITU interviewed Nirmita and published her profile on their website.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/dataquest-august-5-2016-an-india-where-the-disabled-have-a-choice"&gt;An India Where the Disabled have a Choice&lt;/a&gt; (Dataquest, August 5, 2016). Nirmita Narasimhan spoke to Dr. Archana Verma about the problems faced by the disabled while using technology.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/factor-daily-august-31-2016-nirmita-narasimhan-we-tested-18-government-apps-most-are-not-fully-accessible-to-disabled"&gt;We Tested 18 Government Apps, and Most are not Fully Accessible to the Disabled&lt;/a&gt; (Nirmita Narasimhan; Factor Daily, August 31, 2016). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/huffington-post-september-22-2016-nirmita-narasimhan-mobile-apps-are-excluding-millions-of-indians-who-want-to-use-them"&gt;Mobile Apps Are Excluding Millions Of Indians Who Want To Use Them&lt;/a&gt; (Nirmita Narasimhan; Huffington Post; September 22, 2016).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Media Coverage&lt;/h2&gt;
&lt;p&gt;Nirmita Narasimhan gave inputs to the following media coverage:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/dfi-and-cambridge-university-press"&gt;&lt;span&gt;DFI and Cambridge University Press join hands for getting print access to the “print impaired”&lt;/span&gt;&lt;/a&gt; (The Bookseller; November 27, 2009).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/news/WIPO-Proposals-for-Disabled"&gt;&lt;span&gt;WIPO Proposals Would Open Cross-Border Access To Materials For Print Disabled&lt;/span&gt;&lt;/a&gt; (IP Watch; May 28, 2010).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/news/times-of-india-city-mumbai-madhavi-rajadhyaksha-december-20-2012-disability-groups-in-india-welcome-progress-on-treaty-for-blind-persons"&gt;&lt;span&gt;Disability groups in India welcome progress on treaty for blind persons&lt;/span&gt;&lt;/a&gt; (The Times of India; December 20, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/news/ip-watch-feb-16-2013-catherine-saez-indian-users-perspective-on-wipo-negotiations-on-treaty-for-visually-impaired"&gt;&lt;span&gt;Indian Users’ Perspective On WIPO Negotiations On Treaty For Visually Impaired&lt;/span&gt;&lt;/a&gt; (IP Watch; February 16, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/news/the-times-of-india-may-29-2016-how-tech-brings-self-reliance-to-students-with-disabilities"&gt;&lt;span&gt;How tech brings self-reliance to students with disabilities&lt;/span&gt;&lt;/a&gt; (The Times of India; May 29, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/livemint-august-9-2016-sachi-p-mampatta-amritha-pillay-ritika-mazumdar-how-indias-top-firms-are-faring-in-employing-women-and-persons-with-disabilities"&gt;How India’s top firms fare in employing women and persons with disabilities&lt;/a&gt; (Livemit; August 9, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/using-technology-to-address-issues/article8987393.ece"&gt;Using technology to address issues&lt;/a&gt; (The Hindu; August 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/your-story-sourav-roy-august-31-2016-india-has-a-long-road-ahead-in-becoming-a-disabled-friendly-country"&gt;India has a long road ahead in becoming a disabled-friendly country&lt;/a&gt; (Your Story; August 31, 2016).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;NVDA and eSpeak&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Hans Foundation is funding CIS to do a project on developing a text-to-speech software in 15 Indian languages over a period of two-and-a-half years. Following are the monthly programmatic reports indicating the progress made in the project:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Monthly Reports&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2014&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/nvda-e-speak-update-march-2014"&gt;March&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/nvda-e-speak-update-april-2014.pdf"&gt;April&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/nvda-e-speak-update-may-2014.pdf"&gt;May&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/nvda-e-speak-update-june-2014.pdf"&gt;June&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/nvda-e-speak-update-july-2014.pdf"&gt;July&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/nvda-e-speak-update-august-2014.pdf"&gt;August&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/september-2014-nvda-report.pdf"&gt;September&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/october-2014-nvda-report.pdf"&gt;October&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/november-e-speak-nvda-2014-report.pdf"&gt;November&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/december-2014-nvda-report.pdf"&gt;December&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;2015&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/january-2015-nvda-report.pdf"&gt;January&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/nvda-e-speak-report-february-2015.pdf"&gt;February&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/march-nvda-e-speak-report.pdf"&gt;March&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/nvda-e-speak-april-2015-report.pdf"&gt;April&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/may-2015-report.pdf"&gt;May&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/nvda-e-speak-june-2015-report.pdf"&gt;June&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/july-2015-report.pdf"&gt;July&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/august-2015-nvda-report.pdf"&gt;August&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/september-2015-nvda-report.pdf"&gt;September&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/october-2015-report"&gt;October&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/november-2015-report.pdf"&gt;November&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/december-2015-report"&gt;December&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;2016&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/January%20Report%202016.pdf"&gt;January&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/february-2016-report.pdf"&gt;February&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/march-2016-report.pdf"&gt;March&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/april-2016-report"&gt;April&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/May%20Report%202016.pdf"&gt;May&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/resources/june-2016-report/view"&gt;June&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/july-2016-report"&gt;July&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;a class="internal-link" href="http://cis-india.org/accessibility/blog/august-report-2016"&gt;August&lt;/a&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;h3&gt;Training Programmes&lt;/h3&gt;
&lt;p&gt;Following are the reports of the training programmes that were conducted across several locations in India:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-basic-computing-with-nvda-and-e-speak-in-hindi"&gt;15 days Training in Basic Computing with use of NVDA and eSpeak in Hindi&lt;/a&gt; (April 10; 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-basic-computing-with-use-of-nvda-e-speak-gujarati"&gt;15 days Training in Basic Computing with use of NVDA and eSpeak in Gujarati&lt;/a&gt; (April 16, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;15 days Training in Basic Computing with use of NVDA and eSpeak in Oriya (April 30, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-espeak-tamil-computing-with-nvda-at-tiruchirappalli"&gt;eSpeak Tamil Computing with NVDA&lt;/a&gt; (May 4 – 8, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-basic-computing-with-use-of-nvda-espeak-assamese"&gt;Training in Basic Computing with use of NVDA and eSpeak in Assamese&lt;/a&gt; (May 9 – 10, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/espeak-indian-languages-during-tot-conducted-by-enable-india"&gt;Training in the Use of eSpeak for Indian Languages during TOT&lt;/a&gt; (May 11 – 20, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-espeak-tamil-computing-with-nvda-training-workshop"&gt;Tamil Language&lt;/a&gt; (May 25 – 29, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-use-of-espeak-hindi-on-windows-and-android-platforms"&gt;Training on the Use of eSpeak Hindi on Windows and Android Platforms&lt;/a&gt; (May 28, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-30-days-summer-course-on-basic-computer-competencies-and-language-proficiency"&gt;Report on 30 Days Summer Course on Basic Computer Competencies and Language Proficiency&lt;/a&gt; (May 1 – 30, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-using-espeak-tamil-with-nvda-training-tirunelveli"&gt;Tamil Computing with NVDA Training Workshop&lt;/a&gt; (Organized by NVDA team: Anne Jane Ask with Higher Secondary School for the Visually Impaired, Palayamkottai, Tirunelveli; June 3 – 7, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-using-espeak-tamil-with-nvda-training-tirunelveli"&gt;Report on eSpeak Tamil Computing with NVDA Training Workshop in Tirunelveli &lt;/a&gt;(Organized by NVDA team; Anne Jane Askwith Higher Secondary School for the Visually Impaired, Palayamkottai, Tirunelveli; June 3 - 7, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-espeak-marathi"&gt;Training in eSpeak Marathi&lt;/a&gt; (Organized by NVDA team; National Association for the Blind; Nashik; June 22 - 23, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-e-speak-marathi"&gt;Training in eSpeak Marathi&lt;/a&gt; (Organized by NVDA team; SIES College, Sion, Mumbai; June 28, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/training-in-espeak-marathi"&gt;Training in eSpeak Marathi&lt;/a&gt; (Organized by CIS; Atmadepam Society; August 22 – 23, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/training-in-e-speak-hindi"&gt;Training in eSpeak Hindi&lt;/a&gt; (Organized by NVDA team; Jeevan Jyoti School for the Blind; Varanasi; August 26 - 28, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/espeak-training-in-hindi-language-1"&gt;eSpeak Training in Hindi Language&lt;/a&gt; (Organized by CIS and National Association for the Blind; Kullu; September 3 – 4, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-use-of-espeak-bengali-with-nvda"&gt;Training in use of eSpeak Bengali with NVDA&lt;/a&gt; (Organized by CIS; Turnstone Matruchaya, Siligudi, West Bengal; September 7 – 9, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-5-day-tot-for-training-in-use-of-espeak-kannada-with-nvda"&gt;5 day TOT for Training in Use of eSpeak Kannada with NVDA&lt;/a&gt; (Organized by CIS, Mithra Jyoti, Enable India and NFB, Bangalore; September 21 – 25, 2015; Bangalore).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-the-training-in-the-use-of-espeak-hindi-with-nvda"&gt;Training in the use of eSpeak Hindi with NVDA&lt;/a&gt; (Organized by CIS and Lakshay for the Differently Abled; September 29 – 30, 2015; Ranchi). The event was conducted online by Dr. Homiyar with local support from Mritunjay Kumar and Zainab.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-espeak-with-nvda-screen-reader-and-assistive-technology-for-visually-challenged"&gt;Report on eSpeak with NVDA Screen Reader and Assistive Technology for Visually Challenged&lt;/a&gt; (Organized by National Association for the Blind, New Delhi, Centre for Differently Abled Persons, Bharathidasan University, Tiruchirappalli, and CIS; January 21, 2016; Tiruchirappalli).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-nvda-with-e-speak-and-bookshare-online-library"&gt;Report on NVDA with E-Speak and BookShare Online Library&lt;/a&gt; (Organized by Karna Vidya Technology Centre, Computer and Internet Society, and CIS; February 27, 2016; Chennai).&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/resources/cis-accessibility-work-overview'&gt;https://cis-india.org/accessibility/resources/cis-accessibility-work-overview&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2016-09-24T16:09:53Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks">
    <title>Is India Prepared for a Cyber Attack? Suckfly And Other Past Responses Say No</title>
    <link>https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks</link>
    <description>
        &lt;b&gt;From mandatory disclosures to improving CERT-IN’s functioning and transparency, there is much to be done in the event of future cyber attacks.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sushil Kambampati was &lt;a class="external-link" href="http://thewire.in/67398/india-is-unprepared-for-future-cyber-attacks/"&gt;published in the Wire&lt;/a&gt; on September 21, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In early September, details about India’s top secret Scorpene submarine program were published online. This presumed data breach brought the issue of cyber security into the headlines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, earlier this year, news of potentially catastrophic breaches of Indian networks barely made a blip. On &lt;/span&gt;&lt;span&gt;May 17, the cyber-security firm Symantec &lt;/span&gt;&lt;a href="http://www.symantec.com/connect/blogs/indian-organizations-targeted-suckfly-attacks" rel="external nofollow" target="_blank" title="stated"&gt;&lt;span&gt;stated&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in a blog post that it had traced breaches of several Indian  organisations to a cyber-espionage group called Suckfly. The targeted  systems belonged to the central government, a large financial  institution, a vendor to the largest stock exchange and an e-commerce  company. The espionage activity began in April 2014 and continued  through 2015, Symantec said. Based on the targets that were penetrated,  Symantec speculated that the espionage was targeted at the economic  infrastructure of India. Such allegations should be ringing alarm bells  inside the government and amongst private businesses across the country.  And yet, from the official public response, one would think nothing was  amiss.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A week later, another cyber-security firm, Kaspersky Lab, &lt;/span&gt;&lt;a href="http://www.kaspersky.co.in/about/news/virus/2016/Danti-and-Co" rel="external nofollow" target="_blank" title="announced"&gt;&lt;span&gt;announced&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that it too had tracked at least one cyberespionage group, called  Danti, that had penetrated Indian government systems through India’s  diplomatic entities. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Breaches of corporate and government networks are nothing new. Usually, these breaches come to light if the perpetrators &lt;/span&gt;&lt;a href="http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/" rel="external nofollow" target="_blank" title="reveal"&gt;&lt;span&gt;reveal&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the attack, the target of the attack &lt;/span&gt;&lt;a href="http://www.forbes.com/sites/davelewis/2014/10/14/sears-owned-kmart-discloses-data-breach/#3755df43540d" rel="external nofollow" target="_blank" title="discloses"&gt;&lt;span&gt;discloses&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the breach, or because the leaked data &lt;/span&gt;&lt;a href="https://www.washingtonpost.com/news/the-intersect/wp/2015/08/19/how-to-see-if-you-or-your-spouse-appear-in-the-ashley-madison-leak/" rel="external nofollow" target="_blank" title="shows"&gt;&lt;span&gt;shows&lt;/span&gt;&lt;/a&gt;&lt;span&gt; up on the Internet. The Suckfly and Danti breaches are unusual because  they were reported by a third party while the targets (in this case,  Indian organisations and the government) themselves have remained  silent. The breaches reported by Symantec and Kaspersky of Indian  organisations &lt;/span&gt;&lt;a href="http://tech.firstpost.com/biztech/cyberespionage-group-suckfly-targeted-indian-govt-e-commerce-organisations-symantec-315538.html" rel="external nofollow" target="_blank" title="received"&gt;&lt;span&gt;received&lt;/span&gt;&lt;/a&gt;&lt;span&gt; tepid &lt;/span&gt;&lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Cyber-spy-group-Suckfly-to-continue-targeting-Indian-government-Symantec/articleshow/52326126.cms" rel="external nofollow" target="_blank" title="coverage"&gt;&lt;span&gt;coverage&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in India. A few news organisations &lt;/span&gt;&lt;a href="http://www.hindustantimes.com/tech/cyber-spy-group-suckfly-to-keep-targeting-indian-government-symantec/story-F50rNLT2zYhkG90o7DGKaN.html" rel="external nofollow" target="_blank" title="published"&gt;&lt;span&gt;published&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the same wire &lt;/span&gt;&lt;a href="http://economictimes.indiatimes.com/tech/ites/government-units-top-it-firm-among-cyber-espionage-targetssymantec/articleshow/52312952.cms" rel="external nofollow" target="_blank" title="story"&gt;&lt;span&gt;story&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that basically &lt;/span&gt;&lt;a href="http://tech.firstpost.com/biztech/kaspersky-reports-cyber-espionage-attacks-on-indian-government-in-2016-317107.html" rel="external nofollow" target="_blank" title="rewrote"&gt;&lt;span&gt;rewrote&lt;/span&gt;&lt;/a&gt;&lt;span&gt; information in the original posts, but there was very little follow-up  as there was not much follow-up investigation to determine the targets  or an analysis to gauge how much damage the leaks could cause. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Part of the reason there was no  fallout may have to do with the reluctance of the parties involved to  provide information. Symantec, in response to multiple requests for more  details, kept referring to the original blog post. The government made  no statement either confirming or denying the report. Several banks,  e-commerce companies and government agencies were asked whether they  were aware of Suckfly, whether they had been breached by the  organisation and whether Symantec had contacted them. Only Yatra, Axis  Bank and Flipkart responded, denying that they had been penetrated by  Suckfly. The National Stock Exchange also said it had not been  penetrated, although the questions asked were about whether any of the  stock exchange’s vendors had been penetrated and if they had been,  whether the NSE knew about such a breach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;This collective lack of response  across the board indicates a mindset that shows unpreparedness for the  cyber threats that are very real, existent and ongoing. Compare the  Suckfly reaction to the threat of a terrorist infiltration. In that  scenario, the government &lt;/span&gt;&lt;a href="http://zeenews.india.com/news/gujarat-on-high-alert-after-intelligence-input-on-infiltration-of-terrorists_1862830.html" rel="external nofollow" target="_blank" title="goes"&gt;&lt;span&gt;goes&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on high alert, resources are &lt;/span&gt;&lt;a href="http://timesofindia.indiatimes.com/india/Additional-BSF-battalion-on-Pakistan-border-to-avert-infiltration/articleshow/42081166.cms" rel="external nofollow" target="_blank" title="mobilised"&gt;&lt;span&gt;mobilised&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and the public is &lt;/span&gt;&lt;a href="http://timesofindia.indiatimes.com/city/ahmedabad/IB-warns-Gujarat-about-possible-infiltration-bid-at-Kutch/articleshow/50495655.cms" rel="external nofollow" target="_blank" title="warned"&gt;&lt;span&gt;warned&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. The government then tries to identify the threat and stop it from doing any harm. Citizens &lt;/span&gt;&lt;a href="http://idsa.in/idsacomments/IndiasCounterTerrorismPoliciesareMiredinSystemicWeaknesses_gkanwal_140512" rel="external nofollow" target="_blank" title="demand"&gt;&lt;span&gt;demand&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that in the future the government take proactive steps to catch infiltrators and prevent any future threats.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Weak government response&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One method that Suckfly uses to gain  access, according to Symantec, is by signing its malware with stolen  digital certificates. This is the same method that was &lt;/span&gt;&lt;a href="http://bits.blogs.nytimes.com/2015/10/14/deadline-to-disclose-data-breaches-raises-concerns-in-europe/" rel="external nofollow" target="_blank" title="used"&gt;&lt;span&gt;used&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to infect and sabotage the Iranian nuclear centrifuges with the Stuxnet  virus, so the potential for harm of these breaches cannot be  understated. Several security experts confirmed the plausibility of such  doomsday scenarios as two-factor authentication being turned off for  credit card transactions, unauthorised money transfers, leakage of  credit card details, stolen password hashes or personal information,  massive numbers of fake e-commerce orders and the manipulation of the  stock exchange. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;All the targets taken together, the  potential for economic damage that the Suckfly breach poses is immense.  If another country or malevolent group wanted to wreak havoc in India,  it could trigger banking panic by emptying accounts or a stock-market  collapse by dumping stocks at fractional values. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Even more disturbing, though, is that  if a foreign entity has access to government networks, it has the  potential to collect passwords to critical systems using key-loggers and  password scanners. From there the entity could steal national security  data, &lt;/span&gt;&lt;a href="http://www.idsa.in/system/files/book/book_indiacybersecurity.pdf" rel="external nofollow" target="_blank" title="disrupt"&gt;&lt;span&gt;disrupt&lt;/span&gt;&lt;/a&gt;&lt;span&gt; control systems of electrical grids or nuclear facilities and gain access to everything the government &lt;/span&gt;&lt;a href="https://incometaxindiaefiling.gov.in/e-Filing/Services/KnowYourPanLink.html" rel="external nofollow" target="_blank" title="knows"&gt;&lt;span&gt;knows&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about its citizens, including personal details, financial information and &lt;/span&gt;&lt;a href="https://uidai.gov.in/beta/enrolment-update/aadhaar-enrolment.html" rel="external nofollow" target="_blank" title="identity information"&gt;&lt;span&gt;identity information&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. On an only slightly less dangerous level, the central bank’s funds could be stolen, like the recent &lt;/span&gt;&lt;a href="http://gizmodo.com/bangladesh-bank-hackers-created-malware-to-target-the-g-1772834299" rel="external nofollow" target="_blank" title="attempt"&gt;&lt;span&gt;attempt&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to heist $800 million from the central bank of Bangladesh.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A report on risks facing India, &lt;/span&gt;&lt;a href="https://home.kpmg.com/in/en/home/insights/2016/08/de-risking-india-in-the-new-age-of-technology.html" rel="external nofollow" target="_blank" title="published"&gt;&lt;span&gt;published&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in August by KPMG and the Confederation of Indian Industry said: “While  traditionally cyber attacks were largely used for causing financial and  reputational loss, today they have  a potential of posing a threat to  human life. While the perpetrators behind these attacks traditionally  were a few challenge loving ‘hackers’ with unbridled curiosity, we see  an increasing number of state sponsored cyber terrorists and organised  criminals behind the attacks today.” &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In light of such serious threats, the  government needs to take more action to mitigate the threat and  reassure the public that it is on top of the situation. Reports of  encounters between the armed forces and alleged terrorists are  frequently relayed to the press. Similarly, the National Informatics  Centre (NIC) or its parent organisation, the Department of Electronics  and Information Technology, needs to make a public statement when  breaches of government systems or of private organisations at this scale  come to light. The investigative agencies need to open an enquiry into  the matter.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Network.jpg" alt="Network" class="image-inline" title="Network" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In the Suckfly case, it took a right-to-information &lt;/span&gt;&lt;a href="https://yourti.in/document/gu9wgny7" rel="external nofollow" target="_blank" title="query"&gt;&lt;span&gt;query&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from this author to get a response from the NIC. In the response, the  NIC stated that it was unaware of any breach of its systems by Suckfly,  that it did not use Symantec’s services and that Symantec had not  notified NIC of any breach. Of course, the response also raises many  more questions, which could be asked if the government took an attitude  of openness and disclosure.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The government also needs to step up its efforts of identifying and neutralising the threat. The Indian government’s &lt;/span&gt;&lt;a href="http://www.cert-in.org.in" rel="external nofollow" target="_blank" title="Computer Emergency Response Team"&gt;&lt;span&gt;Computer Emergency Response Team&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (CERT-IN) is responsible, according to its website, for “responding to  computer security incidents as and when they occur” and also collecting  information on and issuing “guidelines, advisories, vulnerability notes  and whitepapers relating to information security practices, procedures,  prevention, response and reporting of cyber incidents.” Yet, as of  September 12, its website does not mention the Backdoor.Nidoran exploit  which Suckfly allegedly used to gain access during at least one of its  attacks. The CVE-2015-2545 vulnerability that Danti used, according to  Kaspersky, is also unlisted. Any organisation or person relying on  CERT-IN to get notifications of vulnerabilities would be in the dark and  exposed to a breach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CERT-IN is a perfect example of where  the government could really do so much more, starting with some very  basic things. For example, by design, contact e-mail addresses listed on  the site cannot be clicked on or copied, and so have to be retyped.  Such a measure would barely stop even a novice hacker. E-mail messages  sent to one of the contact email address bounce back. While it laudably  posts its e-mail encryption hash on its contact page, one of the  identifiers does not match what is &lt;/span&gt;&lt;a href="http://pgp.mit.edu/pks/lookup?search=cert-in.org.in&amp;amp;op=index" rel="external nofollow" target="_blank" title="registered"&gt;&lt;span&gt;registered&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the public KeyStores (usually that would be a sign of a hack). Most  glaringly, anyone searching for information on a vulnerability on the  site will have to click in and out of every document because the site  does not have a search function. Collectively, these flaws give the  impression that while the government has thought about cyber-security,  it is not putting enough resources and effort into making that a  credible initiative. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The government’s regulatory agencies  also need to get into the fray. For example, one of the organisations  that Suckfly allegedly breached is a large financial institution. It  makes sense, therefore that the Reserve Bank of India (RBI), which  oversees all financial institutions, should make it mandatory that a  bank notify the RBI whenever there is a security breach. The RBI did  just that in a notification &lt;/span&gt;&lt;a href="https://rbidocs.rbi.org.in/rdocs/notification/PDFs/LBS300411F.pdf" rel="external nofollow" target="_blank" title="issued"&gt;&lt;span&gt;issued&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on &lt;/span&gt;&lt;span&gt;June  2, 2016, after the Suckfly breach. However, the notification does not  address the need to inform the public. The RBI itself also needs to be  more forthcoming. In the Suckfly instance the RBI has not made any  statements about whether financial institutions under its supervision  are secure. It took an &lt;/span&gt;&lt;a href="https://yourti.in/document/ien8cd4r" rel="external nofollow" target="_blank" title="RTI query "&gt;&lt;span&gt;RTI query &lt;/span&gt;&lt;/a&gt;&lt;span&gt;to get a statement from the RBI, and there it responded that it had no information on the matter. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Securities and Exchange Board of  India (SEBI), which oversees the country’s stock exchanges, initially  did not respond directly as to whether it knew of the breach at any IT  firm that supplies an Indian stock exchange. However, SEBI reacted to an  RTI query by asking all the stock exchanges under its mantle to verify  with each of their IT vendors whether there had been any breach. They  all denied it. If any of them are being untruthful, they have made a  false statement to SEBI. However, if  taken at their word, the public  can take comfort in the fact that the stock market was not compromised  by this attack. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;SEBI also &lt;/span&gt;&lt;a href="about:blank" target="_blank"&gt;&lt;span&gt;issued&lt;/span&gt;&lt;/a&gt;&lt;span&gt; a cyber-security policy framework for its stock exchanges in July 2015,  around the time when Suckfly may have been actively attacking systems.  Where the RBI asks financial institutions to report breaches within six  hours of detection, SEBI requires the reports to be quarterly. Given how  fast information travels and how many transactions can be done in mere  minutes, that seems like too much time for SEBI to take any effective  action. SEBI’s policy also does not address the need to inform the  public.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;What is needed is a coordinated,  comprehensive and unified policy that applies to stock exchanges,  financial institutions, government organisations and private companies.  It doesn’t matter from where the data is being stolen, what matters is  how quickly the organisation learns of it and lets people know so that  they too can take any action they need to.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right or wrong?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The across-the-board denials of any  breach raise the question whether Symantec was mistaken. Skeptics could  even wonder whether the company exaggerated the situation to increase  sales of its products and services. For its part, Symantec refuses to  provide any further information about the breach beyond what is in its  initial post; crucial information in this regard would include more  forensic details, which could identify whether the breach actually took  place. Symantec also would not confirm whether it had notified the  targets of the attacks, though the government says it has not been  alerted by Symantec. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On the other hand, according to  Sastry Tumuluri, a former Chief Information Security Officer for the  state of Haryana, Symantec probably did correctly identify the breaches.  Symantec collects vast amounts of information at every point where it  has a presence, such as on individual computers, at internet  interconnection points and web hosts globally. All that data can give a  fairly accurate and reliable indication of systems being penetrated.  Depending on their capabilities and level of sophistication, the target  organisations could also truthfully say that they have not detected a  breach. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;If Symantec’s is correct in  conjecturing that the Suckfly breach targeted India’s economic sector,  its lack of further action is disturbing. India &lt;/span&gt;&lt;a href="http://money.cnn.com/news/economy/world_economies_gdp/index.html" rel="external nofollow" target="_blank" title="is one"&gt;&lt;span&gt;is one&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of the world’s ten largest economies and instability here would have  ripple effects globally. Then there is the potential of catastrophic  cyberterrorism. It is in everyone’s interest that Symantec reach out to  the government and to let the public know which organisations may be  compromised.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to Pranesh Prakash, Policy  Director at the Centre for Internet and Society and Bruce Schneier, a  globally recognised security expert, the lack of knowledge regarding  which organisations were targeted reduces people’s trust in the Internet  across the board. In an email response, Schneier wrote, “Symantec has  an obligation to disclose the identities of those attacked. By leaving  this information out, Symantec is harming us all. We all have to make  decisions on the Internet all the time about who to trust and who to  rely on. The more information we have, the better we can make those  decisions.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Looking at it in the other direction,  it is not apparent whether the government has asked Symantec and  Kaspersky for more information and a disclosure of who the targets were.  After all, if government systems were breached, it is a matter of  national security. If the government has indeed reached out and received  more information, it has an obligation to let the public know. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;What other governments and private  companies are belatedly learning is that it is better to proactively  disclose the breaches before the information gets out through other  parties. When US retailer Target came under attack, its  data breach was  first &lt;/span&gt;&lt;a href="http://krebsonsecurity.com/2013/12/sources-target-investigating-data-breach/" rel="external nofollow" target="_blank" title="revealed"&gt;&lt;span&gt;revealed&lt;/span&gt;&lt;/a&gt;&lt;span&gt; by security reporter Michael Krebs. Target was &lt;/span&gt;&lt;a href="http://mashable.com/2014/01/17/retailers-security-breach-timing/#XN.TRtygnEqf" rel="external nofollow" target="_blank" title="criticised"&gt;&lt;span&gt;criticised&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for not coming forth itself and &lt;/span&gt;&lt;a href="https://topclassactions.com/lawsuit-settlements/lawsuit-news/32647-target-data-breach-class-action-lawsuit-trial-set-april-2016/" rel="external nofollow" target="_blank" title="faced"&gt;&lt;span&gt;faced&lt;/span&gt;&lt;/a&gt;&lt;span&gt; several lawsuits. In the US, most states and jurisdictions &lt;/span&gt;&lt;a href="http://www.reuters.com/article/us-target-data-notification-idUSBREA0F1LO20140116" rel="external nofollow" target="_blank" title="have"&gt;&lt;span&gt;have&lt;/span&gt;&lt;/a&gt;&lt;span&gt; laws that require companies to disclose data breaches, although  transparency advocates point out that there is great variation on how  long companies can wait to disclose and what events trigger a mandatory  disclosure. In Europe, telecoms and Internet Service Providers must &lt;/span&gt;&lt;a href="http://bits.blogs.nytimes.com/2015/10/14/deadline-to-disclose-data-breaches-raises-concerns-in-europe/" rel="external nofollow" target="_blank" title="report"&gt;&lt;span&gt;report&lt;/span&gt;&lt;/a&gt;&lt;span&gt; a breach within 24 hours and other organisations have 72 hours.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;India has no mandatory disclosure law  in the case of data breaches at government or private organisations,  Prakash said. It is something that CIS supports and had proposed since  2011, he added. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to Schneier, a mandatory  disclosure law would also be valuable if confidentiality agreements  would otherwise prevent a security firm such as Symantec from disclosing  names of targets.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Finally, private companies need to  understand that they are not doing themselves any favours by remaining  silent on the matter. Even if Suckfly or its clients do not use the  information they may have gained, the lack of disclosure by the targets  will weaken trust in online commerce and financial transactions, says  Prakash. For example, looking at e-commerce, while it is true that  e-commerce has &lt;/span&gt;&lt;a href="http://www.assocham.org/newsdetail.php?id=5669" rel="external nofollow" target="_blank" title="grown"&gt;&lt;span&gt;grown&lt;/span&gt;&lt;/a&gt;&lt;span&gt; rapidly in India, a study in 2014 by &lt;i&gt;YourStory&lt;/i&gt; and Kalaari Capital &lt;/span&gt;&lt;a href="http://yourstory.com/2014/06/infographic-indian-e-commerce-consumers-want-2014/" rel="external nofollow" target="_blank" title="found"&gt;&lt;span&gt;found&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that lack of trust and doubt about online security were hurdles for 80% of people who had never made an online purchase. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;When an organisation lets the public  know that it has been breached, users of the service or site can  evaluate what action they need to take. For example if a person uses the  same password across multiple sites, they would know they needed to  change the password at the other sites. Depending on the breach they  would also be able to alert credit card companies as well as friends and  family.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As the KPMG report states, cyber attacks are only going to become more common. Despite &lt;/span&gt;&lt;a href="http://thediplomat.com/2014/06/india-scrambles-on-cyber-security/" rel="external nofollow" target="_blank" title="multiple"&gt;&lt;span&gt;multiple&lt;/span&gt;&lt;/a&gt; &lt;a href="http://www.firstpost.com/business/danger-india-faces-shortage-lakh-cyber-security-pros-2482958.html" rel="external nofollow" target="_blank" title="warnings"&gt;&lt;span&gt;warnings&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,  the response on the part of the Indian government and private  organisations has been quite underwhelming. The government needs to  proactively monitor and respond to attacks. Lawmakers need to pass laws  establishing privacy policies and mandatory disclosures. Companies will  also need to invest in better security practices as well as gain public  trust by reacting to breaches promptly and letting the public know what  they are doing to recover from them.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks'&gt;https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-22T00:57:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3">
    <title>Another 5 Years: What Have We Learned about the Wikipedia Gender Gap and What Has Been Done? (Part 3.)</title>
    <link>https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3</link>
    <description>
        &lt;b&gt;Five years after Wikimedia Foundation’s 2011 editor survey was conducted and revealed the gender gap issue, scholars, practitioners, and communities around the globe have come a long way to address the gender imbalance of the online encyclopedia. This blog post series (of three parts) serve as a summary of movements and discoveries in Wikipedia gender gap narrowing on both local (India) and global scales.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;This is the third
(last) part of the blog series, please see &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-1"&gt;Part 1 &lt;/a&gt;and &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-2"&gt;Part 2&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Responding to the
Wikipedia gender gap problem, former WMF Executive Director Sue Gardner set a
target in 2011 to raise the female editor percentage &lt;a href="http://www.nytimes.com/2011/01/31/business/media/31link.html"&gt;to 25%&lt;/a&gt; by 2015. In an &lt;a href="http://www.bbc.com/news/business-28701772"&gt;interview&lt;/a&gt; in August 2014, Jimmy Wales declared that “&lt;em&gt;we’ve completely failed,&lt;/em&gt;” Gardner also
noted that the solutions should come from local Wikipedian communities rather
than from the Foundation on a macro scale.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the
target was not met, initiatives and reforms taken places globally and locally in
the past five years are not fruitless. And as mentioned in Part 2, we should
not define this movement as merely pursuing a goal towards certain percentage
or number. As for now dialogue has been created to include the issue into more strategic
plans; collectives are established to cumulate and share resources across
communities. There has been abundance of learning (and definitely much more to
learn) in the issue.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;What has been done?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Be it ongoing or spontaneous, international or local, there have been
many interventions trying to address the gender gap in Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;u&gt;Intervention events&lt;em&gt;&lt;/em&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In July 2015, WikiProject
&lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Women_in_Red"&gt;Women in Red&lt;/a&gt;&lt;span class="MsoHyperlink"&gt; (WiR)&lt;/span&gt; was launched to &lt;em&gt;“turn "&lt;a title="Wikipedia:WikiProject Women in Red/Redlist index" href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Women_in_Red/Redlist_indexhttps:/en.wikipedia.org/wiki/Wikipedia:WikiProject_Women_in_Red/Redlist_index"&gt;redlinks&lt;/a&gt;
(non-existing pages) into&amp;nbsp;&lt;a title="Wikilink" href="https://en.wikipedia.org/wiki/Wikilink"&gt;blue ones&lt;/a&gt; (existing pages).” &lt;/em&gt;&amp;nbsp;The project encourages editors worldwide to
create (or expand) female-related pages (biographies, women’s work,
contribution, issues, etc.) that fit the notability criteria of Wikipedia. WiR
also picks monthly and annual topics to feature. Currently in September, 2016,
edit-a-thons on Women in nursing and women labour activists are happening
online. And “Women scientists” edit-a-thon is a year-long featured topic for
2016. Although WiR is still primarily an English-WP project, some communities
have expanded and localized it to local initiatives.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Coincidentally, in
2013, Indian Wikipedian communities have carried out one of the biggest and
most well-known gender gap intervention – &lt;a href="https://meta.wikimedia.org/wiki/Lilavati%27s_Daughters_Edit-a-thon"&gt;Lilavatis’
Daughters&lt;/a&gt;. “Lilavati’s Daughters” is &lt;a href="http://www.thehindu.com/todays-paper/tp-features/tp-literaryreview/forgotten-daughters/article662225.ece"&gt;a
book&lt;/a&gt; of essay collections featuring nearly one hundred women scientists in Indian
since the Victorian Era. The 2013 edit-a-thon was hence to create Wikipedia
pages for these biographies in different Indian languages. Collaborating with
institutions and colleges, the event was greeted with high popularity and
success. Similar events were also carried out afterwards, including &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Indian_Women_in_Science_Edit-a-thon"&gt;Indian
Women in Science Edit-a-thon&lt;/a&gt; which has been held annually since 2014; the
last event was held in July, 2016 at the Indian Institute of Science,
Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another
significant initiative across the globe and in Indian communities is the annual
&lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiWomen%27s_History_Month"&gt;Wikiwomen’s history
month&lt;/a&gt; in March along with the celebration of International Women’s Day on March
8&lt;sup&gt;th&lt;/sup&gt;. The initiative started in 2012, edit-a-thons, photo-thons
(updating photos onto Wikimedia Commons), and meetups have been held to raise
the awareness of the gender gap online, create female-related content available
on Wikipedia, and to strengthen the bonding between local Wikiwomen.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Recently,
Wikimedia Foundation collaborated with the United Nations to launch the one-day
&lt;a href="https://meta.wikimedia.org/wiki/UN_Women_Her_Story"&gt;Her Story project&lt;/a&gt;&lt;span class="MsoHyperlink"&gt; Edit-a-thon&lt;/span&gt; on August 12&lt;sup&gt;th&lt;/sup&gt;, 2016 to celebrate International Youth Day
globally. Cities in India like &lt;a href="https://www.empowerwomen.org/en/campaigns/herstory"&gt;Chennai and Delhi
also held local edit-a-thons&lt;/a&gt; on the day of in response to the event. With
the opportunity to work alongside the UN, it is a good sign that the Wikipedia
gender gap issue is drawing global attention, not just in the Wikipedian
community level, but also in global institution level.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;u&gt;Collaborative&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a href="https://meta.wikimedia.org/wiki/WikiWomen%27s_Collaborative"&gt;Wikiwomen’s
Collaborative&lt;/a&gt; is a global platform for female Wikipedians to share
projects, insights, and support. The Collaborative also encourages participants
to write blog post on the &lt;a href="https://blog.wikimedia.org/c/community/wikiwomen/"&gt;Wikiwomen’s Blog&lt;/a&gt;
to spread more words about the gender gap issue and initiatives. A &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Countering_systemic_bias/Gender_gap_task_force"&gt;Gender
Gap Task Force (GGTF)&lt;/a&gt; was founded in 2013 aiming to challenge the
patriarchal culture of knowledge and Wikipedia. GGTF tries to fix the
encyclopedia’s imbalance power structure by initiating discussion and
examination on its policies and editor interaction. It has also been a place to
cumulate research studies and resources on the gender gap topic.&amp;nbsp; A (global) &lt;a href="https://lists.wikimedia.org/mailman/listinfo/gendergap"&gt;gender gap
mailing list&lt;/a&gt; is also created to spread the news and words with more
communities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;u&gt;Improvement in the
Interface&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Aside from events and
collectives organized by respective communities, the Wikipedia platform itself
has also been under constant transition in the last few years, trying to create
a friendlier place for women and newcomers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Since June 2012,
the new prototype &lt;a href="https://www.mediawiki.org/wiki/VisualEditor"&gt;Visual
Editor&lt;/a&gt; has become available in more and more language versions of Wikimedia
projects – including most Indian languages. Visual Editor enables editor to
contribute without learning the &lt;a href="https://en.wikipedia.org/wiki/Wiki_markup"&gt;Wiki markups&lt;/a&gt;, as it
creates the “write-as-how-you-will-see-it” feature requiring only basic typing
skills. Nevertheless, Visual Editor does have several &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:VisualEditor#Limitations"&gt;limitations&lt;/a&gt;
comparing to the traditional edit source option, including slower speed, unavailable
in talk and discussion namespaces, limited template editing options, and so on.
While a &lt;a href="https://meta.wikimedia.org/wiki/Research:VisualEditor%27s_effect_on_newly_registered_editors/June_2013_study"&gt;research&lt;/a&gt;
in 2013 on Visual Editor’s use in English Wikipedia showed low effectiveness of
the new feature in attracting and encouraging new editors, more research should
also be done in the non-English (especially Global South) context. &lt;a href="https://commons.wikimedia.org/wiki/Category:Marathi_Wikipedia_Tutorials"&gt;Online
tutorial resources&lt;/a&gt; about editing are also becoming available in Indian
communities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/wikimarkup.png/image_large" alt="Traditional wiki markup editing screenshot" class="image-inline" title="Traditional wiki markup editing screenshot" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Traditional Wiki
markup editing screenshot&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/visualeditor.png/image_large" alt="visual editor of wikipedia screenshot" class="image-inline" title="visual editor of wikipedia screenshot" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Visual Editor
screenshot&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;On the other hand,
&lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Editing_on_mobile_devices"&gt;mobile
apps of Wikipedia&lt;/a&gt; has been improved in its editing function. Although the
apps are still in constant development to make the function smoother and easier
for mobile users, it is a great breakthrough for those who do not have personal
computers to contribute in small ways (or even in great ways – &lt;a href="https://en.wikipedia.org/wiki/User:Cullen328/Smartphone_editing#Why_I_edit_by_smartphone"&gt;some&lt;/a&gt;
have created pages and denied the statement that mobile editing is
impractical).&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;What’s more to be learned?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There is no
denying that our Indian language communities have been putting efforts to
highlight and address the gender gap issue on Wikipedia. The &lt;a href="https://meta.wikimedia.org/wiki/WikiConference_India_2016"&gt;Wikiconference
India 2016&lt;/a&gt; in August also had a panel responding to this topic where
panelists from both outreach and research threads proposed localized
perspective and strategies to fix the problem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, there are
still much more to be learned. First of all, we need a more organized feedback
loop (a cycle of planning-executing-evaluating-sharing learning) for local
interventions to learn from our success and mistakes. Secondly, the issue has
to become more “public” in a sense that we are not just promoting within our
own circles. Awareness-building through media coverage and institutional
collaboration can bring in greater public opinions and volunteers to help the
online encyclopedia become a more inclusive place. The third point is a change
of mindset: women's feeling and experience should be put forward into the
central of our initiatives and interventions.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;“We made it clear
that we were focusing on the (female) participants and their experience, the
content they created online are of course important too, but that’s just the
by-product.&lt;/em&gt;” -&lt;span style="text-align: right;"&gt;Wikiconference Indian 2016 Gender Gap panel presenter&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;In other words, as
we are engaging more and more women, the focus should not be numbers but the
humans. At the same time, we should always encourage women to stand out and
speak out. As mentioned in the previous part, gender discrimination cases have
not yet been reported in our communities, but we also have to ensure if it does
happen both the female editors and the community should have a certain level of
awareness (what constitutes harassment/discrimination/sexism; when and how to
call out) and a report and support mechanism to the problem.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The road to a real
equalized knowledge system is not easy. As many have noticed and pointed out
“This is not just a Wikipedia problem!” Indeed, similar gender imbalance exists
in our academies, IT industries, free and open-source software (FOSS) workplace,
to name a few. Nonetheless, with the flexibility and the strong bond that Indian
Wikipedian communities possess, we can be one of the pioneers in positive
changes. After all, the knowledge created and action taken today will shape
what our tomorrow can be like.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3'&gt;https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ting</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Wikipedia gender gap</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2016-09-22T07:54:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/dna-september-17-2016-subhashish-panigrahi-software-freedom-day-importance-of-free-and-open-source-software">
    <title>Software Freedom Day: The Importance of Free and Open Source Software</title>
    <link>https://cis-india.org/openness/dna-september-17-2016-subhashish-panigrahi-software-freedom-day-importance-of-free-and-open-source-software</link>
    <description>
        &lt;b&gt;Software Freedom Day (SFD) on September 17 celebrates the liberty that free and open software and the philosophy of freedom brings into people’s lives. When SFD was started in 2004, only 12 teams from different places joined. It grew to a whooping 1000 by 2010 across the world. Explaining the aim of the celebration, SFD’s official website says,&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dnaindia.com/scitech/column-software-freedom-day-the-importance-of-free-and-open-source-software-2256118"&gt;published by DNA&lt;/a&gt; on September 17, 2016.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Our goal in this celebration is to educate the worldwide public about the benefits of using high quality FOSS in education, in government, at home, and in business — in short, everywhere! The non-profit organisation Software Freedom International coordinates SFD at a global level, providing support, giveaways and a point of collaboration, but volunteer teams around the world organise the local SFD events to impact their own communities&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What are FOSS, Free Software, Open Source, and FLOSS?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Free and open source software (FOSS or F/OSS), and Free/Libre and  Open-Source Software (FLOSS) are umbrella terms that are used to include  both Free software and open source software. Adopted by noted software  freedom advocate Richard Stallman in 1983, the free software has many  names — libre software, freedom-respecting software and software libre  are some of them. As defined by the &lt;a href="https://www.gnu.org/philosophy/free-software-intro.html" rel="nofollow" target="_blank"&gt;Free Software Foundation&lt;/a&gt;,  one of the early advocates of software freedom, free software allows  users not just to use the software with complete freedom, but to study,  modify, and distribute the software and any adapted versions, in both  commercial and noncommercial form. The distribution of the software for  commercial and noncommercial form however depends on the particular  license the software is released under. The &lt;a href="https://creativecommons.org/share-your-work/licensing-types-examples/" rel="nofollow" target="_blank"&gt;Creative Commons&lt;/a&gt; licenses have recommendations for a wide array of &lt;a href="https://creativecommons.org/share-your-work/public-domain/freeworks/" rel="nofollow" target="_blank"&gt;free licenses&lt;/a&gt; that one can choose for software-related documentations and any creative work they create. Similarly, there are &lt;a href="https://opensource.com/education/16/8/3-copyright-tips-students-and-educators" rel="nofollow" target="_blank"&gt;several different &lt;/a&gt;open licenses for software and many other works that are related to software development. “&lt;a href="https://en.wikipedia.org/wiki/The_Open_Source_Definition" rel="nofollow" target="_blank"&gt;Open Source&lt;/a&gt;” was coined as an alternative to free software in 1998 by educational-advocacy organisation &lt;a href="https://opensource.org/history" rel="nofollow" target="_blank"&gt;Open Source Initiative&lt;/a&gt;.  Open source software is generally created collaboratively, made  available with its source code, and it provides the user rights to  study, change, and distribute the software to anyone and for any  purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supported by several global organisations like Google, Canonical,  Free Software Foundation, Joomla, Creative Commons and Linux Journal,  Software Freedom Day draws its inspiration from the philosophy that was  grown by people like Richard Stallman who argues that free software is  all about the freedom and not necessarily free of cost, but it provides  the liberty to users from [proprietary software developers’] unjust  power. SFD encourages everyone to gather in their own cities, educate  people around them about free software, promote on social media (with  the hashtag &lt;a href="https://mobile.twitter.com/search?q=%23SFD2016" rel="nofollow" target="_blank"&gt;#SFD2016&lt;/a&gt; this year), even hacking with free software, organising hackathons,  running free software installation camps, and even going creative with  flying a drone running free software!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From South Asia, there are &lt;a href="http://wiki.softwarefreedomday.org/2016/India" rel="nofollow" target="_blank"&gt;13 celebratory events in India&lt;/a&gt;, &lt;a href="http://wiki.softwarefreedomday.org/2016/Nepal?highlight=%28%5CbCategoryCountry2016%5Cb%29" rel="nofollow" target="_blank"&gt;8 in Nepal&lt;/a&gt;, &lt;a href="http://wiki.softwarefreedomday.org/2016/Bangladesh?highlight=%28%5CbCategoryCountry2016%5Cb%29" rel="nofollow" target="_blank"&gt;1 in Bangladesh&lt;/a&gt; and &lt;a href="http://wiki.softwarefreedomday.org/2016/Sri%20Lanka?highlight=%28%5CbCategoryCountry2016%5Cb%29" rel="nofollow" target="_blank"&gt;4 in Sri Lanka&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;South Asian countries have seen adoption of both free software and  open source software, in both individual and organisational level and by  the government. The &lt;a href="http://www.fsmi.in/about" rel="nofollow" target="_blank"&gt;Free Software Movement of India&lt;/a&gt; was founded in Bengaluru, India in 2010 to act as a national coalition  of several regional chapters working for promoting and growing the free  software movement in India. The Indian government has launched an open  data portal at data.gov.in portal, initiated a new policy to adopt open  source software, and &lt;a href="https://opensource.com/government/15/6/indian-government-includes-open-source-rfps" rel="nofollow" target="_blank"&gt;asked&lt;/a&gt; vendors to include open source software applications while making  requests for proposals. Similarly, several free and open source  communities and organisations like Mozilla India, Wikimedia India,  Centre for Internet and Society, Open Knowledge India in India, Mozilla  Bangladesh, Wikimedia Bangladesh, Bangladesh Open Source Network, Open  Knowledge Bangladesh in Bangladesh, Mozilla Nepal, Wikimedians of Nepal  and Open Knowledge Nepal in Nepal, Wikimedia Community User Group  Pakistan in Pakistan, Lanka Software Foundation in Sri Lanka, that are  operating from the subcontinent also promote free and open source  software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We promote open source and open Web technologies in the country. We  are open to associate/work with existing open source or other  community-run, public benefit organisations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Internet By The People, Internet For The People” (from &lt;a href="https://wiki.mozilla.org/India#Objectives" rel="nofollow" target="_blank"&gt;Mozilla India wiki&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mohammad Jahangir Alam, a lecturer from Southern University Bangladesh argues in a &lt;a href="http://research.ijcaonline.org/volume42/number18/pxc3878099.pdf" rel="nofollow" target="_blank"&gt;research paper&lt;/a&gt; that the use of open source software can help the government save  enormous amount of money spent in purchasing proprietary software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A large amount of money of the government can be saved if it uses open source software in different IT sectors of government offices and others sectors, because government is providing computers to all educational institutes from school to university level and they are using proprietary software. For this reason government is to expend a large amount of many for buying proprietary software to run the computers. Another one is government paying significant amount of money to the different vendors for buying different types of software to implement e-Governance project. So, the government can use open source software for implanting projects to minimize cost of the projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/dna-september-17-2016-subhashish-panigrahi-software-freedom-day-importance-of-free-and-open-source-software'&gt;https://cis-india.org/openness/dna-september-17-2016-subhashish-panigrahi-software-freedom-day-importance-of-free-and-open-source-software&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-09-18T03:46:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/software-freedom-day">
    <title>ସଫ୍ଟଓଏର ସ୍ୱାଧୀନତା ଦିବସ: ଆମ ହାତେ ଆମ କୋଡ଼ ଲେଖିବା</title>
    <link>https://cis-india.org/openness/software-freedom-day</link>
    <description>
        &lt;b&gt;Software Freedom Day (SFD), which celebrates the use of free and open software, was celebrated in many cities today. The piece sheds light on the philosophy of software freedom, and how free and open source software is making a significant social change. I have also shared how anyone can contribute to the FOSS movement in different ways and celebrate SFD.&lt;/b&gt;
        &lt;p&gt;The blog post was mirrored in &lt;a class="external-link" href="https://odia.yourstory.com/read/b3b56fd08a/-?c=16"&gt;Your Story&lt;/a&gt;, &lt;a class="external-link" href="http://www.odishastory.com/odia/2016/09/software-freedom/"&gt;Odisha Story&lt;/a&gt; and &lt;a class="external-link" href="http://aajiraodisha.org/software-freedom/"&gt;Aajira Odisha&lt;/a&gt; on September 17, 2016. The originally published piece can be &lt;a class="external-link" href="http://psubhashish.com/post/150524560200/sfd"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;ଫ୍ରି ଓ ଓପନ ସୋର୍ସ ସଫ୍ଟଓଏର ପଛରେ ଥିବା ସାମାଜିକ ଆବଶ୍ୟକତା ଓ ପ୍ରତିଟି  ବ୍ୟବହାରୀଙ୍କୁ ସଫ୍ଟଓଏର ବ୍ୟବହାର, ବଦଳ ଓ ବାଣ୍ଟିବାର ସୁଯୋଗ ଦେବା ଉଦ୍ଦେଶ୍ୟରେ  ପାଳିତ ସଫ୍ଟଓଏର ସ୍ୱାଧୀନତା ଦିବସ ।&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2For.wikipedia.org%2Fwiki%2F%25E0%25AC%25B8%25E0%25AC%25AB%25E0%25AD%258D%25E0%25AC%259F%25E0%25AD%25B1%25E0%25AD%2587%25E0%25AC%25B0&amp;amp;t=MGEyZDliNWFkMTM2YTUyNjUyN2VkOWVkMzlmYzBlYjUyZTE5ZDQ3MSxtOFE1Q3pwMw%3D%3D"&gt;ସଫ୍ଟଓଏର &lt;/a&gt;ଶବ୍ଦଟି  ବୋଧେ ଆଉ କାହାରି ପାଇଁ ଅଜଣା ଅଶୁଣା ନୁହେଁ । ଆପଣଙ୍କ ମୋବାଇଲ ଫୋନରୁ କମ୍ପୁଟରଯାଏ ଓ  ଏବେ ଏକ ସ୍ଥାନରେ ନ ଥାଇ ସେଠାରେ ଥିବା ଭଳି ଅନୁଭବିବା ପାଇଁ ବ୍ୟବହୃତ &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FVirtual_reality&amp;amp;t=NWI3ZTNhNThmZGRjMjc2MWVkNjU0OTE3N2EwNmYyM2E5OTZhOGZjYSxtOFE1Q3pwMw%3D%3D"&gt;ଭର୍ଚୁଆଲ ରିଆଲିଟି&lt;/a&gt; ଓ &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FAugmented_reality&amp;amp;t=NDQ0OTRhYTM0YWVhYWExNTI2ZjQ3ODlmNjY3NmIyN2M3N2IzZWU1ZixtOFE1Q3pwMw%3D%3D"&gt;ଅଗମେଣ୍ଟେଡ଼ ରିଆଲିଟି &lt;/a&gt;ହେଡ଼ସେଟରେ ହାର୍ଡ଼ଓଏର ବା ଯାନ୍ତ୍ରିକ ଉପକରଣକୁ ସଠିକ ଭାବେ ପରିଚଳାନା କରିବା ହେଉଛି ସଫ୍ଟଓଏରର କାମ । ଆଉ ସଫ୍ଟଓଏରରେ ଟିକେ ଗୋଳମାଳ ହେଲେ କେବେ &lt;a href="http://t.umblr.com/redirect?z=http%3A%2F%2Fwww.howtogeek.com%2F163452%2Feverything-you-need-to-know-about-the-blue-screen-of-death%2F&amp;amp;t=Yzc1NWI1MjU5MmE5NmZjZTNlMmRkMjE2ODg4ZDM5YzU0MWI0Y2IyOSxtOFE1Q3pwMw%3D%3D"&gt;କମ୍ପୁଟରର ସ୍କ୍ରିନ ନେଳି &lt;/a&gt;ପଡ଼ିଯାଏ  ତ ପୁଣି କେବେ କେବେ ମୋବାଇଲରେ ଠିକଣା ଜାଗାରେ ଯେତେ ଦବେଇଲେ ବି କାମକରେନା । ତେବେ  ଉଣାଅଧିକ ସାଧାରଣ ଲୋକେ ସଫ୍ଟଓଏରରେ ସ୍ୱାଧୀନତା ଆଉ ତାଙ୍କ ଜୀବନ ପାଇଁ ତା’ର ଭୂମିକା  ବାବଦରେ କେବେ ଶୁଣିନଥିବେ । ଆଉ ଏଇଟି ସତରେ ଏକ ଅନାଲୋଚିତ ବିଷୟ । ତେବେ ଏ ବିଷୟକୁ  ବୁଝିବା ଆଗରୁ ଆମ ଚଳନ୍ତି ସମାଜର କିଛି ଉଦାହରଣ ଆଡ଼େ ଆସନ୍ତୁ ଆଖିପକେଇବା । ଦିନ ଥିଲା  ଆପଣ ରେଡ଼ିଓରୁ ଆକାଶବାଣୀ ଲଗେଇ ଗୀତ, ଖବର, ନାଟକ ଆଦି ଶୁଣୁଥିଲେ । ହେଲେ କେବେ  ଆକାଶବାଣୀ ଆପଣଙ୍କ ପାହୁଲାଟିଏ ମାଗିଥିଲା କି ନାଁ ଆପଣ ଭଲ ଭଲ ପ୍ରୋଗ୍ରାମ ଆସୁଛି ବୋଲି  ଖୁସିରେ କେବେ କିଛି ଦେଇଥିଲେ? କିନ୍ତୁ ଆପଣଙ୍କ ଅଜାଣତରେ ଆପଣ ସତରେ କିଛି ଦେଇଛନ୍ତି ।  ତା’ ହେଉଛି ଟିକସ । ଆପଣ ଛୋଟରୁ ବଡ଼ ଯାଏ ଯାହା କିଣୁଛନ୍ତି ପ୍ରାୟ ସବୁ ଜିନିଷରେ  ଟିକସ ଦିଅନ୍ତି ଆଉ ଚାକିରି କି ଅନ୍ୟ ଉପାୟରେ ପଇସା ଅରଜୁଥିଲେ ବର୍ଷ ଶେଷକୁ ଇନକମ ଟିକସ  ବି ଦିଅନ୍ତି । ଏସବୁ ସରକାରଙ୍କ କାମରେ ଲାଗେ । ତେଣୁ ଆକାଶବାଣୀର ରେଡ଼ିଓ ପ୍ରୋଗ୍ରାମ  ହେଉ କି ମୋଦିଙ୍କ ବିଦେଶ ବୁଲା ହେଉ ସବୁ ଆପଣଙ୍କ ପଇସାରେ ହିଁ ହେଉଛି । ସରକାରୀ ଓ  ବେସରକାରୀ ଉଭୟ ସ୍ଥାନରେ ଏଇ ଏକା ଜିନିଷ । ତେବେ ସଫ୍ଟଓଏର କ୍ଷେତ୍ରରେ ବି ଏଇ ଏକା  ଅବସ୍ଥା । ସାଧାରଣରେ ଜଣାଶୁଣା ମାଇକ୍ରୋସଫ୍ଟର ଉଇଣ୍ଡୋଜ ଅପରେଟିଂ ସିଷ୍ଟମ ପାଇଁ କେତେ  ପଇସା ନିଜ ଅଜାଣତରେ ଦେଉଛନ୍ତି ତାହା ନୂଆ ଲାପଟପ କିଣିଲାବେଳକୁ କେବେ ଗଣିନଥିବେ ।  କିନ୍ତୁ ସେଇଟି ଜମାରୁ ମାଗଣା ଆସିନଥାଏ । ସଫ୍ଟଓଏରଟିଏ ଏକ ବା ଅନେକ ଉଚ୍ଚସ୍ତରର  ନିର୍ଦ୍ଦିଷ୍ଟ କାମ କରୁଥିବା ବେଳେ ଏକ କମ୍ପୁଟର କି ମୋବାଇଲର ସାମଗ୍ରୀକ ହାର୍ଡ଼ଓଏର ବା  ଯନ୍ତ୍ରପାତି ଓ ସଫ୍ଟଓଏର ସବୁକୁ ପରିଚାଳନା ପାଇଁ ଅପରେଟିଂ ସିଷ୍ଟମ ବ୍ୟବହାର କରାଯାଏ ।  ବିଭିନ୍ନ ଅପରେଟିଂ ସିଷ୍ଟମ ଓ ସଫ୍ଟଓଏର ଭିନ୍ନଭିନ୍ନ ଉପାୟରେ ତିଆରି ହୁଏ । କେବେ  ଏସବୁ ମାଇକ୍ରୋସଫ୍ଟ କି ଆପଲ ଭଳି ବଡ଼ ବଡ଼ କମ୍ପାନି ତିଆରି କରି ବିକନ୍ତି ତ କେବେ  କେବେ ବ୍ୟକ୍ତିବିଶେଷ ବା ଛୋଟ ବଡ଼ ସଂଗଠନ ମଧ୍ୟ ବିକନ୍ତି । କିନ୍ତୁ ଏସବୁ ବାଦେ ଆଉ ଏକ  ଧରଣର ସଫ୍ଟଓଏର ଗଢ଼ାଳି ବ୍ୟକ୍ତିବିଶେଷ-ସଂଗଠନ-କମ୍ପାନି ମଧ୍ୟ ଅଛନ୍ତି । ସେମାନେ  ସଫ୍ଟଓଏର ତିଆରି କରି ଖାଲି ବଜାରରେ ଛାଡ଼ନ୍ତି ନାହିଁ ବରଂ ସେ ସଫ୍ଟଓଏରର &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSource_code&amp;amp;t=YjU1NjY2NTlkZTE3NmNiZDg3ODE3NzkzOTQxY2ZmYjdmNGI4M2Q2OCxtOFE1Q3pwMw%3D%3D"&gt;ସୋର୍ସ କୋଡ଼ &lt;/a&gt;ମଧ୍ୟ  ଛାଡ଼ନ୍ତି । ଅର୍ଥାତ ଗଣିତ କଷି ଫଳାଫଳ ସଙ୍ଗେ କିପରି କଷିଲେ ସୋପାନ ତଳକୁ ସୋପାନ  ଲେଖି ବୁଝାଇଦିଅନ୍ତି । ଫଳରେ ଆଉ କେହି ସେହି ସଫ୍ଟଓଏରରେ କିଛି ବଦଳ କରିବାକୁ ଚାହିଁଲେ  କିମ୍ବା ପୁରୁଣା ସଫ୍ଟଓଏରରେ କିଛି ନୂଆ ଯୋଡ଼ି ଉନ୍ନତ କରିବାକୁ ଚାହିଁଲେ ତାଙ୍କୁ  ସେଥିରେ କେହି ବାଧା ଦେବେନାହିଁ । କିନ୍ତୁ ନୂଆ ଫଳାଫଳ ବା ସଫ୍ଟଓଏରଟି ବଜାରରେ  ଛାଡ଼ିଲା ବେଳେ ତାଙ୍କୁ ମୂଳ ଗଢ଼ାଳିଙ୍କୁ ଉପଯୁକ୍ତ ଶ୍ରେୟ ଦେବାକୁ ପଡ଼ିବ । ଧରନ୍ତୁ  ଆପଣ ଚନ୍ଦକାରୁ କଲରାପତରିଆ ବାଘର ଖୋଳ ଆଣି ତାକୁ ଧଳା ରଙ୍ଗ ମାରି ଧଳା ବାଘ କଲେ ।  ଆପଣଙ୍କୁ ସେ ଧଳା ବାଘକୁ ଶିମିଳିପାଳରେ ଛାଡ଼ିଲା ବେଳେ ଚନ୍ଦକାରୁ ମୂଳ କଲରାପତରିଆ ବାଘ  ଆଣିଥିଲେ ବୋଲି ଉଲ୍ଲେଖ କରିବାକୁ ପଡ଼ିବ । ମଜା କଥା ହେଉଛି ଏଭଳି ନିଆରା ଧାରା ଆମ  ସମାଜରେ ଜମାରୁ ନୂଆ ନୁହେଁ । ଅକ୍ଷୟ ମହାନ୍ତି ସାଲବେଗଙ୍କ ଲିଖିତ ପୁରୁଣା ଗୀତକୁ  ଆଉଥରେ ବୋଲିବା ପରେ ସେ ହଜିଲା ଗୀତସବୁ ଲୋକତୁଣ୍ଡରେ ଆହୁରି ଜଣାଶୁଣା ହେଲା । ହେଲେ  ଅକ୍ଷୟ ମହାନ୍ତି ଗୀତର ଗାୟକ ଓ ସଙ୍ଗୀତ ନିର୍ଦ୍ଦେଶକ ଭାବେ ନାଁ ନେଲା ବେଳେ ସାଲବେଗଙ୍କ  ରଚନାରୁ ବୋଲି ଲେଖିବାରେ ଉଣା କରିନାହାନ୍ତି ।&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ଏହି ଧାରା ଆମ ସମାଜରେ ସବୁକାଳେ ସବୁସ୍ଥଳେ ରହିଛି । ହେଲେ ଆଧୁନିକ ସମାଜରେ ଅନେକ  ଲାଭଖୋର କମ୍ପାନି ନିଜ ଲାଭ ଲାଗି ଏ ସାମାଜିକ ଚଳଣିଟିକୁ ପାଶୋରି ପକାଇଛନ୍ତି ।  ମାଇକ୍ରୋସଫ୍ଟରୁ ଆରମ୍ଭ କରି ଆକୃତି, ଅପ୍ରାନ୍ତ ଯାଏ ପ୍ରାୟ ଅଧିକାଂଶ ସାଧାରଣରେ  ବ୍ୟବହାର ହେଉଥିବା ସଫ୍ଟଓଏର ହେଉଛି &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FProprietary_software&amp;amp;t=NmQ5NGVjNzU0MDYxYzkzOGI3YzQ1MGQ5NTRiMzJmMjlmNWE3ZDBkOCxtOFE1Q3pwMw%3D%3D"&gt;ପ୍ରୋପ୍ରାଇଟରି &lt;/a&gt;ବା  ପୂରା ନିବୁଜ । ମାନେ ଆପଣ କେବଳ କିଣି ବ୍ୟବହାର କରିପାରିବେ କିନ୍ତୁ ବାଣ୍ଟିପାରିବେ  ନାହିଁ କି କୌଣସି ବଦଳ କରିପାରିବେ ନାହିଁ । କଲେ ଆପଣଙ୍କ ବିରୋଧରେ କୋର୍ଟରେ ଉକ୍ତ  କମ୍ପାନିମାନେ କେସ କରି ତଳିତଳାନ୍ତ ମଧ୍ୟ କରିପାରିବେ । ଏ କପିରାଇଟର ଫାନ୍ଦ ଏଡ଼େ  କୁଟିଳ ଯେ ସଫ୍ଟଓଏର ତିଆରି କରିଥିବା କମ୍ପାନିମାନେ ସବୁକାଳେ ତାଙ୍କର ମନୋମୁଖୀ ପତିଆରା  ରଖିପାରିବେ । ଏଣୁ ଥୋକେ ଭାବିଲେ ବଡ଼ ବଡ଼ ଧନୀ କମ୍ପାନିମାନଙ୍କର ଏ ଗୁମାନ ସେମିତି  ଥାଉ । ଆମେ ଚାଲ ବିକଳ୍ପ ଓ ଉଚ୍ଚମାନର କିଛି ସଫ୍ଟଓଏର ତିଆରିବା । ଲୋକ ସ୍ୱାଧୀନ ।  ଯାହାକୁ ଯାହା ରସିବ ତାକୁ ସେ କିଆଫୁଲ ପରି ବାସୁ । ଆଉ ଏ ଥିଲା ଏକ ସାମାଜିକ ଆବଶ୍ୟକତା  । ବିକଳ୍ପ ବାଟଟି ହେଲା ସଫ୍ଟଓଏରର ସ୍ୱାଧୀନତା । ଏଥିରେ କୌଣସି ସଫ୍ଟଓଏର ଗଢ଼ିଥିବା  ମୂଳ ଗଢ଼ାଳି ଓ ତା’ ପରେ ସେଥିରେ ଯୋଗଦାନ କରିଥିବା ସଭିଙ୍କୁ ସମାନ ଭାବେ ସମ୍ମାନ ଦେଇ  ଯୋଗଦାନକାରୀ ଭାବେ ସେମାନଙ୍କ ନାମ ଉଲ୍ଲେଖ କରାଯାଇଥାଏ । ଖାଲି ନାଁ ନୁହେଁ ଅନେକ  ସମୟରେ ଖୋଲା ସଫ୍ଟଓଏର ସଙ୍ଗେ ଜଡ଼ିତ ବ୍ୟକ୍ତିବିଶେଷ ଓ ସଂଗଠନସବୁ ଏମିତି ଆଖିଖୋସିଲା  ଭଳି କାମ କରନ୍ତି ଯେ କିଣା ଆଉ ବୁଜା ସଫ୍ଟଓଏର କିଣିବାରୁ କି ବ୍ୟବହାର କରିବାରୁ ମନ  ମରିଯିବ । ତିନି ବର୍ଷ ତଳେ Firefox ବ୍ରାଉଜର ତିଆରିରେ ଭାଗନେଇଥିବା Mozillaର  ସ୍ୱେଚ୍ଛାସେବୀ ଯୋଗଦାନକାରୀମାନଙ୍କୁ ସମ୍ମାନ ଜଣାଇ ଆମେରିକାର ସାନ ଫ୍ରାନସିସ୍କୋ  ସହରରେ ଏକ &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fwiki.mozilla.org%2FMonument&amp;amp;t=ZTI1ZDNhYjdlMmFjYWI0ODVhMWMxYjU3ODc3MDEwYjdjNGU2M2Y5ZixtOFE1Q3pwMw%3D%3D"&gt;ବିଶାଳ ସ୍ମାରକୀ&lt;/a&gt; ଗଢ଼ି ସେଥିରେ ସମସ୍ତଙ୍କ ନାମ ଲେଖାଯାଇଥିଲା । ଭାବନ୍ତୁ ଏ ପ୍ରକଳ୍ପରେ ସାମାନ୍ୟତମ  ଯୋଗଦାନ କରିଥିବା ଲୋକଟିର ନାଁ ବି ଇତିହାସରେ ଲେଖାହୋଇ ରହିଗଲା । ୨୦୦୧ ମସିହାରେ  ଇଂରାଜୀ ଓ ତା’ ପରେ ଓଡ଼ିଆ ସମେତ ବାକି ବିଶ୍ୱଭାଷାରେ ଇଣ୍ଟରନେଟରେ ତିଆରି ଖୋଲା  ଜ୍ଞାନକୋଷ &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2For.wikipedia.org%2Fwiki%2F%25E0%25AC%2593%25E0%25AC%25A1%25E0%25AC%25BC%25E0%25AC%25BF%25E0%25AC%2586_%25E0%25AC%2589%25E0%25AC%2587%25E0%25AC%2595%25E0%25AC%25BF%25E0%25AC%25AA%25E0%25AC%25BF%25E0%25AC%25A1%25E0%25AC%25BC%25E0%25AC%25BF%25E0%25AC%2586&amp;amp;t=YWE1N2E5ZDlhNDU5NTY2MzM2ZjIwOTQ4NzkyNTQwOWI4OWZiNDkzOCxtOFE1Q3pwMw%3D%3D"&gt;ଉଇକିପିଡ଼ିଆର&lt;/a&gt; ଇତିହାସ ବି ଏମିତି । ଏହି ଉଇକିପିଡ଼ିଆ ୱେବସାଇଟଗୁଡ଼ିକ &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FMediaWiki&amp;amp;t=MDZhOGJhMjRlY2I4YzlkMmYwNWYzMGM5OTliMWRkNDAwNDA1NTZkZSxtOFE1Q3pwMw%3D%3D"&gt;ମିଡ଼ିଆଉଇକି&lt;/a&gt; ନାମକ ଖୋଲା ସଫ୍ଟଓଏରରେ ତିଆରି । ଆଉ ସେଇ ଏକା ସଫ୍ଟଓଏରକୁ ନିଜ ଆବଶ୍ୟକତା ଅନୁସାରେ  ବଦଳାଇ ଉଇକିଲିକ୍ସ ଓ ଉଇକିଟ୍ରାଭେଲ ଭଳି ଅଲଗା ଅଲଗା ୱେବସାଇଟ ଆଜି ଚାଳିତ ।&lt;/p&gt;
&lt;p&gt;ତେବେ ଅନେକେ ଭାବୁଥିବେ ଯେ ଏ &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FFree_software&amp;amp;t=MzBmMWZkOGNiMDM1ZDVlYTM5YmIyNDhmMmQxMDA2M2MzN2QyZDZkMyxtOFE1Q3pwMw%3D%3D"&gt;ଫ୍ରି ସଫ୍ଟଓଏର&lt;/a&gt; କଣ ସବୁବେଳେ ମାଗଣା? ସଫ୍ଟଓଏର ସ୍ୱାଧୀନତା କ୍ଷେତ୍ରରେ ଗତ କେଇ ଦଶନ୍ଧି ଧରି କାମ କରି ଏ ଆନ୍ଦୋଳନକୁ ବହୁ ଆଗକୁ ନେଇଥିବା &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FRichard_Stallman&amp;amp;t=MDc2MGQxYjJiYzVhMDNiYTM1MDFiZThiOThlZWU3ZDU4NTEwNDY5NixtOFE1Q3pwMw%3D%3D"&gt;ରିଚାର୍ଡ଼ ଷ୍ଟଲମ୍ୟାନ&lt;/a&gt; ଖୁବ ସହଜ ଓ ସରଳ ଢଙ୍ଗରେ ଏ ବିଷୟଟି &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fwww.gnu.org%2Fphilosophy%2Fopen-source-misses-the-point.en.html&amp;amp;t=YWY5NDEzNTEyODc5NjYwMTMxYmFkNzA0MjU1NzEwOWUzNjExZmEzNSxtOFE1Q3pwMw%3D%3D"&gt;ବୁଝାଇଦିଅନ୍ତି&lt;/a&gt; ।&lt;/p&gt;
&lt;p&gt;ଫ୍ରି ସଫ୍ଟଓଏର ମାଗଣାରେ ବଣ୍ଟାଯାଇପାରେ ବା କିଛି ଦରରେ ବିକାଯାଇପାରେ । କିନ୍ତୁ  ଏଥିରେ ଥିବା “ଫ୍ରି” ମାଗଣା ନୁହେଁ ବରଂ ଖୋଲା ଜ୍ଞାନ ଭଳି “ଫ୍ରିଡ଼ମ” ବା  ସ୍ୱାଧୀନତାକୁ ସୂଚାଏ ।&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ତେଣୁ କୌଣସି ସଫ୍ଟଓଏର ବ୍ୟବହାର କରିବା ଆଗରୁ ତା’ର କପିରାଇଟ ବାବଦରେ ସେଥିରେ ଥିବା  ନିୟମାବଳୀ ପଢ଼ିଲେ ବୁଝାପଡ଼ିବ ଯେ ତାହା ଏକ ପ୍ରୋପ୍ରାଇଟରି କି ଫ୍ରି ସଫ୍ଟଓଏର ।  ସ୍ୱାଧୀନତା ମଣିଷର ଜନ୍ମଗତ ଅଧିକାର । ଆଉ ଜ୍ଞାନ ବାଣ୍ଟିବା ଲାଗି । ବାନ୍ଧି ରଖିବା  ଲାଗି ନୁହେଁ । କାରଣ କେହି ଜ୍ଞାନ ତିଆରି ନାହିଁ ବରଂ ସଭିଏଁ ଜ୍ଞାନର ନାନାଦି  ଭଣ୍ଡାରକୁ ବ୍ୟବହାର କରିବା ପାଇଁ ବାଟ ତିଆରି କରିଥାନ୍ତି । ତେଣୁ ସେ ବାଟରେ ବାଡ଼  କିଆଁ? ନିକଟରେ ସମାଜର ଏହି ପୁରାତନ ଧାରାକୁ ବାହୁଡ଼ି ଯିବା ପାଇଁ ଅନେକ  ବ୍ୟକ୍ତିବିଶେଷ, ସଂଗଠନ ଓ ବଡ଼ ବଡ଼ କମ୍ପାନି ଧୀରେ ଧୀରେ ସେମାନେ ତିଆରୁଥିବା  ସଫ୍ଟଓଏରର ସୋର୍ସ କୋଡ଼ ଖୋଲାରେ ଦେଲେଣି । ଫଳରେ ସାଧାରଣ ବ୍ୟବହାରକାରୀ ଓ ସଫ୍ଟଓଏର  ଗଢ଼ାଳିଙ୍କ ହାତରେ ସ୍ୱାଧୀନ ଭାବେ ସେମାନେ ବ୍ୟବହାର କରୁଥିବା ସଫ୍ଟଓଏରକୁ ନିଜ ଆବଶ୍ୟକ  ଅନୁସାରେ ବ୍ୟବହାର କରିପାରିବେ । ଆଉ ସମାଜର ମୌଳିକ ଆବଶ୍ୟକତା ବିଭିନ୍ନତାର ବହୁରଙ୍ଗ  ଏଥିରେ ସମୁଜ୍ଜଳେ ଫୁଟିଉଠିବ ।&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ଆମ ସମାଜର ଏହି ବାଣ୍ଟିବାର ଧାରାକୁ ନୂଆ ଟେକନୋଲୋଜି ଯୁଗରେ ଉଜ୍ଜୀବିତ କରିବା ଲକ୍ଷରେ ଜଗତ ସାରା ୨୦୦୪ ମସିହାରୁ ସେପ୍ଟେମ୍ବର ମାସର ତୃତୀୟ ସପ୍ତାହରେ “&lt;a href="http://t.umblr.com/redirect?z=http%3A%2F%2Fsoftwarefreedomday.org%2F&amp;amp;t=YmZiZWNhMmY4ZWJlNjUxMDU3NDliOGE1MDA1NGQ3YTk1ZDk0ZDQwNCxtOFE1Q3pwMw%3D%3D"&gt;ସଫ୍ଟଓଏର ଫ୍ରିଡ଼ମ ଡେ&lt;/a&gt;”  ବା “ସଫ୍ଟଓଏର ସ୍ୱାଧୀନତା ଦିବସ” ପାଳିତ ହୋଇଆସୁଛି । ଏଥିରେ କୌଣସି ନିର୍ଦ୍ଦିଷ୍ଟ  ସଫ୍ଟଓଏର ନୁହେଁ ବରଂ ଖୋଲା ସଫ୍ଟଓଏର ପଛରେ ଥିବା ଦାର୍ଶନିକ ଓ ସାମାଜିକ ଦୃଷ୍ଟିକୋଣଟି  ସଭିଙ୍କୁ ବୁଝାଇବା ହେଉଛି ମୂଳ ଲକ୍ଷ । ଆଉ ଯେଯାଏ ବଡ଼ କମ୍ପାନି ସାଧାରଣ ଲୋକଙ୍କୁ  ସମ୍ପୂର୍ଣ୍ଣ ତଥ୍ୟ ନ ଜଣାଇ କପିରାଇଟ ବଳରେ ବାନ୍ଧି ରଖିଥିବେ ସେଯାଏ ବ୍ୟବହାରୀ  ବାପୁଡ଼ା ବା ଜାଣିବ କେମିତି ଏ ଭିତର ଗୁମର? ନିଜ ହାତରେ ନିଜ ଶାସନର ଡୋର ଧରିବା  ଯେମିତି ସ୍ୱାଧୀନତା ନିଜ ବ୍ୟବହାରରେ ଲାଗୁଥିବା ସଫ୍ଟଓଏରର ସ୍ୱାଧୀନତା ବି ଏକାଭଳି  ପ୍ରତିଟି ବ୍ୟବହାରକାରୀର ଅଧିକାର । ତେଣୁ ଏ ସ୍ୱାଧୀନତା ଦିବସକୁ ସଭିଏଁ ନିଆରା ଢଙ୍ଗରେ  ପାଳନ୍ତି । &lt;a href="http://t.umblr.com/redirect?z=http%3A%2F%2Fwww.htxt.co.za%2F2015%2F09%2F03%2Fflying-freedom-day-gloriously-combines-drones-and-craft-beer%2F&amp;amp;t=ZjkyZDkzYTg2MmMxODBjMGQ3YWZlZjVhYjAwMTM0ZGM0NTI5MWY5ZSxtOFE1Q3pwMw%3D%3D"&gt;ଆଫ୍ରିକାରେ&lt;/a&gt; କିଛି ବର୍ଷ ଆଗରୁ ଫ୍ରି ସଫ୍ଟଓଏର ଚାଳିତ ଏକ ଡ୍ରୋନ ବା ଚାଳକବିହୀନ ପବନଯାନଟିଏ  ଛାଡ଼ିଥିଲେ । ଅନେକ ସ୍ଥାନରେ ଲୋକେ ଏକାଠି ହୋଇ ଏ ବାବଦରେ ସଫ୍ଟଓଏର ସ୍ୱାଧୀନତା  ବାବଦରେ ଆଲୋଚନା କରନ୍ତି । ଆଉ ପୁଣି କେଉଁଠି ସାଧାରଣ ଲୋକଙ୍କୁ ତାଙ୍କ କମ୍ପୁଟରରେ  ଫ୍ରି ସଫ୍ଟଓଏର ଇନଷ୍ଟଲ କରିବା ପାଇଁ କ୍ୟାମ୍ପ କରନ୍ତି । ଫଳରେ ଲୋକେ ନିଜ କମ୍ପୁଟରରେ  ମାଇକ୍ରୋସଫ୍ଟର ବିକଳ୍ପ ଓ ଉବଣ୍ଟୁ ଭଳି ଖୋଲା ଲିନକ୍ସ ଅପରେଟିଂ ସିଷ୍ଟମ କିମ୍ବା &lt;a href="http://t.umblr.com/redirect?z=https%3A%2F%2Fwww.mozilla.org%2Fen-US%2Ffirefox%2Fnew%2F%3Futm_medium%3Dreferral%26utm_source%3Dfirefox-com&amp;amp;t=NGZlNzIwNGI0MmU0MjhiMjQ5MjVlZDQ5N2RkMDQxNWJiZDdhNmZjOCxtOFE1Q3pwMw%3D%3D"&gt;Mozilla Firefox&lt;/a&gt; ଭଳି ବ୍ରାଉଜର ଇନଷ୍ଟଲ କରିପାରିବେ । ସଫ୍ଟଓଏର ସ୍ୱାଧୀନତା ଦିବସର ଚିହ୍ନ ସ୍ୱରୂପର  ଲେଖକର ଏ ଲେଖାଟି ମଧ୍ୟ ଏକ ଖୋଲା ଲାଇସେନ୍ସରେ ଆଉ ଶ୍ରେୟ ଦେଇ କେହି ଚାହିଁଲେ ତାହାକୁ  ପ୍ରକାଶ କରିପାରିବେ ।&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/software-freedom-day'&gt;https://cis-india.org/openness/software-freedom-day&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-09-18T03:33:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/samaja-september-17-2016-subhashish-panigrahi-let-us-write-our-code-in-our-own-hands">
    <title>ଆମ ହାତେ ଆମ କୋଡ୍ ଲେଖିବା</title>
    <link>https://cis-india.org/a2k/blogs/samaja-september-17-2016-subhashish-panigrahi-let-us-write-our-code-in-our-own-hands</link>
    <description>
        &lt;b&gt;I authored a column on writing our code in our own hands for the editorial of Odia-language daily the "Samaja". The piece is about the philosophy of software freedom and how free and open source software is making a significant difference in our lives. I have also shared a little bit about how anyone can celebrate the Software Freedom Day today by contributing to and sharing about to FOSS.
&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/Samaja2016September17.jpg/@@images/dbc8b6d5-3e4c-4e01-b176-70340cfd768e.jpeg" alt="Samaja" class="image-inline" title="Samaja" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/samaja-september-17-2016-subhashish-panigrahi-let-us-write-our-code-in-our-own-hands'&gt;https://cis-india.org/a2k/blogs/samaja-september-17-2016-subhashish-panigrahi-let-us-write-our-code-in-our-own-hands&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-09-17T16:04:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/global-voices-september-17-2016-subhashish-panigrahi-it-is-september-and-that-means-it-is-time-for-software-freedom-day">
    <title>It's September, and That Means It's Time for Software Freedom Day </title>
    <link>https://cis-india.org/openness/global-voices-september-17-2016-subhashish-panigrahi-it-is-september-and-that-means-it-is-time-for-software-freedom-day</link>
    <description>
        &lt;b&gt;Software Freedom Day (SFD), which celebrates the use of free and open software, is just around the corner on September 17. When the day first started in 2004, only 12 teams from different places joined, but it has since grown to include hundreds registered events around the world, depending on the year.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="https://globalvoices.org/2016/09/17/its-september-and-that-means-its-time-for-software-freedom-day/"&gt;published by Global Voices&lt;/a&gt; on September 17, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;a href="http://www.softwarefreedomday.org/index.php/about/sponsors"&gt;Supported&lt;/a&gt; by several global organizations like Google, Canonical, Free Software  Foundation, Joomla, Creative Commons and Linux Journal, Software Freedom  Day draws its inspiration from the philosophy promoted by people  like Richard Stallman who &lt;a href="http://www.softwarefreedomday.org/index.php/about/sponsors"&gt;argue&lt;/a&gt; that  free software is all about the freedom and not necessarily free of cost  but provides the liberty to users from proprietary software developers’  power and influence.&lt;/p&gt;
&lt;p&gt;SFD &lt;a href="https://www.fsf.org/blogs/community/its-software-freedom-day"&gt;encourages&lt;/a&gt; everyone to gather in their own cities (here's a &lt;a href="http://www.softwarefreedomday.org/map/index.php?year=2015"&gt;map&lt;/a&gt; of places where SFD is organized this year), educate people around them  about free software, and promote the cause on social media (with the  hashtag &lt;a href="https://twitter.com/search?q=%23SFD2016"&gt;#SFD2016&lt;/a&gt; this year). There's also hackathons (hacking free software to modify the  code and create what one wants to have in it),  running free software  installation camps, and even going creative with &lt;a href="http://www.htxt.co.za/2015/09/03/flying-freedom-day-gloriously-combines-drones-and-craft-beer/"&gt;flying a drone running free software&lt;/a&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;What are FOSS, free software, open source, and FLOSS?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Free and open source software (FOSS or F/OSS), and free/libre and  open-source software (FLOSS) are umbrella terms that are used to include  both free software and open source software. Adopted by noted software  freedom advocate Richard Stallman in 1983, free software has many names —  libre software, freedom-respecting software and software libre are some  of them. As defined by the &lt;a href="https://www.gnu.org/philosophy/free-software-intro.html"&gt;Free Software Foundation&lt;/a&gt;,  one of the early advocates of software freedom, free software allows  users not just to use the software with complete freedom, but to study,  modify, and distribute the software and any adapted versions, in both  commercial and noncommercial form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The distribution of the software for  commercial and noncommercial form, however, depends on the particular  license the software is released under. “&lt;a href="https://en.wikipedia.org/wiki/The_Open_Source_Definition"&gt;Open source&lt;/a&gt;” was coined as an alternative to free software in 1998 by educational-advocacy organization &lt;a href="https://opensource.org/history"&gt;Open Source Initiative.&lt;/a&gt; Open  source software is generally created collaboratively, made available  with its source code, and it provides the user rights to study, change,  and distribute the software to anyone and for any purpose.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;From South Asia, there are &lt;a href="http://wiki.softwarefreedomday.org/2016/India"&gt;13 celebratory events in India&lt;/a&gt;, &lt;a href="http://wiki.softwarefreedomday.org/2016/Nepal?highlight=%28%5CbCategoryCountry2016%5Cb%29"&gt;eight in Nepal&lt;/a&gt;, &lt;a href="http://wiki.softwarefreedomday.org/2016/Bangladesh?highlight=%28%5CbCategoryCountry2016%5Cb%29"&gt;one in Bangladesh&lt;/a&gt; and &lt;a href="http://wiki.softwarefreedomday.org/2016/Sri%20Lanka?highlight=%28%5CbCategoryCountry2016%5Cb%29"&gt;four in Sri Lanka&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;South Asian countries have seen adoption of both free software and open  source software by individuals, organizations and the government. The &lt;a href="http://www.fsmi.in/about"&gt;Free Software Movement of India&lt;/a&gt; was founded in Bengaluru, India, in 2010 to act as a national coalition  of several regional chapters working to promote and grow the free  software movement in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government has &lt;a href="https://data.gov.in/about-us"&gt;launched&lt;/a&gt; an open data portal at &lt;a href="http://data.gov.in"&gt;data.gov.in&lt;/a&gt; portal for sharing large datasets like the census data under free licenses. The government's &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf"&gt;new policy&lt;/a&gt; emphasizes on adopting open source software. Moreover government's Ministry of Communication and Information Technology &lt;a href="https://opensource.com/government/15/6/indian-government-includes-open-source-rfps"&gt;asked&lt;/a&gt; vendors to include open source software applications while making requests for proposals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, there are several free and open source communities and organizations operating from the subcontinent, like &lt;a href="http://mozillaindia.org/"&gt;Mozilla India&lt;/a&gt;, &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_India"&gt;Wikimedia India&lt;/a&gt;, the &lt;a href="https://meta.wikimedia.org/wiki/CISA2K"&gt;Centre for Internet and Society, &lt;/a&gt;&lt;a href="http://in.okfn.org/about/"&gt;Open Knowledge India&lt;/a&gt;, &lt;a href="http://mozillabd.org/"&gt;Mozilla Bangladesh&lt;/a&gt;, &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_Bangladesh"&gt;Wikimedia Bangladesh,&lt;/a&gt; &lt;a href="http://www.bdosn.org/about-bdosn"&gt;Bangladesh Open Source Network&lt;/a&gt;, &lt;a href="https://okfn.org/network/bangladesh/"&gt;Open Knowledge Bangladesh&lt;/a&gt;, &lt;a href="https://wiki.mozilla.org/Nepal"&gt;Mozilla Nepal&lt;/a&gt;, &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_Nepal"&gt;Wikimedians of Nepal,&lt;/a&gt; &lt;a href="http://np.okfn.org/about/"&gt;Open Knowledge Nepal&lt;/a&gt;, &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_Community_User_Group_Pakistan"&gt;Wikimedia Community User Group Pakistan&lt;/a&gt;, and the &lt;a href="http://www.opensource.lk/"&gt;Lanka Software Foundation&lt;/a&gt; in Sri Lanka.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mohammad Jahangir Alam, a lecturer from Southern University Bangladesh, argues in a &lt;a href="http://research.ijcaonline.org/volume42/number18/pxc3878099.pdf"&gt;research paper&lt;/a&gt; that the use of open source software can help the government save a  enormous amount of money that are spent in purchasing proprietary  software:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;A Large amount of money of government can be saved if the government  uses open source software in different IT sectors of government offices  and others sectors, Because government is providing computer to all  educational institute from school to university level and they are using  proprietary software. For this reason government is to expend a large  amount of many for buying proprietary software to run the computers.  Another one is government paying significant amount of money to the  different vendors for buying different types of software to implement  e-Governance project. So, the Government can use open source software  for implanting projects to minimize cost of the projects.&lt;/blockquote&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/global-voices-september-17-2016-subhashish-panigrahi-it-is-september-and-that-means-it-is-time-for-software-freedom-day'&gt;https://cis-india.org/openness/global-voices-september-17-2016-subhashish-panigrahi-it-is-september-and-that-means-it-is-time-for-software-freedom-day&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>FLOSS</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    

   <dc:date>2016-09-17T15:42:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/methodology-statements-of-working-form-27-of-indian-mobile-device-patents">
    <title>Methodology: Statements of Working (Form 27) of Indian Mobile Device Patents </title>
    <link>https://cis-india.org/a2k/blogs/methodology-statements-of-working-form-27-of-indian-mobile-device-patents</link>
    <description>
        &lt;b&gt;In India, if a patent is not locally worked within three years of its issuance, any person may request a compulsory license, and if the patent is not adequately worked within two years of the grant of such a compulsory license, it may be revoked. In order to provide the public with information about patent working, India requires every patentee to file an annual statement on “Form 27” describing the working of each of its issued Indian patents. We conducted the first comprehensive and systematic study of all Forms 27 filed with respect to mobile devices. We tried to empirically establish the extent to which patentees and licensees comply with the statutory requirement to declare information about the working of their patents. 

Research assistance was provided by interns Anna Liz Thomas and Nayana Dasgupta.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The research paper on patent landscape, &lt;a class="external-link" href="https://www.vanderbilt.edu/jotl/wp-content/uploads/sites/78/6.-Contreras-Web.pdf"&gt;Patents and Mobile Devices in India: An Empirical Survey&lt;/a&gt;, [PDF] was published in the Vanderbilt Journal of Transnational Law (2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The research paper on "Patent Working Requirements and Complex Products: An Empirical Assessment of India's Form 27 Practice and Compliance" has been published &lt;a class="external-link" href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3004283"&gt;here&lt;/a&gt; (July 2017).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dataset of all the Form 27 studied for this paper has been published &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/dataset-for-patent-working-requirements-and-complex-products-an-empirical-assessment-of-indias-form-27-practice-and-compliance"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Research Questions&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;How many annual Form 27 submissions have been made to the Indian Patent Office for 4,419 granted patents identified in the landscape of mobile device patents in India?&lt;/li&gt;
&lt;li&gt;How many patents have no corresponding Form 27 filed yet?&lt;/li&gt;
&lt;li&gt;How many Form 27 submissions from those found are defective?&lt;/li&gt;
&lt;li&gt;Is there an identifiable pattern in the defects and discrepancies?&lt;/li&gt;
&lt;li&gt;Is there any discernible trend in filing of Form 27 over time and with respect to patent owners?&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The objective of this paper is to quantitatively determine the extent to which patentees and licensees comply with the statutory requirement to declare information about the working of their patents according to Section 146(2) of the Patents Act, 1970 read with Rule 131 of the Patent  Rules, 2003.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Section 146(2): Without prejudice to the provisions of sub-section (1), every patentee and every licensee (whether exclusive or otherwise) shall furnish in such manner and form and at such intervals (not being less than six months) as may be prescribed statements as to the extent to which the patented invention has been worked on a commercial scale in India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Rule 131: Form and manner in which statements required under section 146(2) to be furnished &lt;/i&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;The statements shall be furnished by every patentee and every licensee under sub-section (2) of section 146 in Form 27 which shall be duly verified by the patentee or the licensee or his authorised agent.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;The statements referred to in sub-rule (1) shall be furnished in respect of every calendar year within three months of the end of each year.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;The Controller may publish the information received by him under sub-section (1) or sub-section (2) of section 146.&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Object&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The research object is Form 27 submissions made annually to the Indian Patent Office for the 4,419 granted patents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4,052 of these patents were identified in the landscape (“the patent landscape”) developed by the Centre for Internet and Society as a part of ongoing research on patents pertaining to sub-USD-100 mobile devices sold in India. The dataset of the patent landscape can be &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/dataset-patent-landscape-of-mobile-device-technologies-in-india"&gt;accessed here&lt;/a&gt;. Another 367 patents pertaining to mobile technology identified during the landscaping exercise but excluded from it, were added to the initial set of 4,052 patents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A blank copy of Form 27 is &lt;a class="external-link" href="http://ipindia.nic.in/ipr/patent/manual/HTML%20AND%20PDF/Manual%20of%20Patent%20Office%20Practice%20and%20Procedure%20-%20html/Forms/Form-27.pdf"&gt;available here&lt;/a&gt;. The &lt;i&gt;pro forma&lt;/i&gt; is defined as per Schedule II of Patent Rules, 2003.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Research Methods&lt;/h2&gt;
&lt;p&gt;[Corresponding research questions&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;How many annual Form 27 submissions have been made to the Indian Patent Office for 4,419 granted patents identified in the landscape of mobile device patents in India?&lt;/li&gt;
&lt;li&gt;How many patents have no corresponding Form 27 filed yet?&lt;/li&gt;
&lt;li&gt;How many Form 27 submissions from those found are defective?]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outsourcing the searching of the submitted copies of Form 27 to a contractor&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Owing to the repetitive nature of the process for collecting the forms, as well the large scale of the project, the task of searching was outsourced to a contractor. Price quotations were invited from five data entry operators and two firms of patent attorneys. On the basis of the quotation, deliverable time, scope and nature of the results delivered, and quality assurance, the contract was awarded to one firm. The firm offered the best price for a commensurate deliverable time and assured quality of results.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Form 27 retrieval online&lt;/h3&gt;
&lt;p&gt;Form 27 were searched from IPAIRS (Indian Patent Information Retrieval System) and InPASS (Indian Patent Advanced Search System) public databases of the Indian Patent Office.&lt;/p&gt;
&lt;p&gt;InPASS has two features: Application Status and E-Register. We checked both features, in case forms not found through one could be located through the other. We indeed found that, sometimes, the forms not available on E-register could be found through the Application Status table, and vice versa.&lt;/p&gt;
&lt;h3&gt;Case 1: Accessing form 27 using Application Status tab on INPASS&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;A search portal is located at ipindiaservices.gov.in/publicsearch.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Pass.png" alt="Pass" class="image-inline" title="Pass" /&gt;&lt;/p&gt;
&lt;li&gt;Enter the patent number in the “Patent Number” search field without the kind codes (IN) and click on “Search”. E.g., for patent number IN263932B, enter ‘263932’ in the “Patent Number”  field.&lt;/li&gt;
&lt;li&gt;Once the queried patent is displayed, select the “Application Status” tab to access the list of documents that were filed for the requested patent.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Pass.png" alt="Pass" class="image-inline" title="Pass" /&gt;&lt;/p&gt;
&lt;li&gt;In the Application Status tab, scroll down to the bottom to view “Application Status table”. Click on the “View Documents” button to access the list of the documents filed for the queried patent. A pop-up window opens with the results.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_Pass.png" alt="Pass" class="image-inline" title="Pass" /&gt;&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;In the window, a list of hyperlinks to various documents is displayed. Sometimes Form 27/ working statement is explicitly named so. At other times, it may have a different title. Once you click on the form 27 link, a PDF file opens in a new tab. There may be more than one Form 27 in the list of documents as Form 27 is an annual submission.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Case 2: No record of Form 27 found (Application status tab)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If the form is not present on InPASS, that is, if it has not been uploaded to the website, or if it has not been submitted to the Indian Patent Office (IPO), then it will not be displayed in the list of documents described in Case 1, step 5. Such instances have been logged as “No record found”.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Case 3: Accessing form 27 using E-Register tab on INPASS&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;At &lt;a class="external-link" href="http://ipindiaservices.gov.in/publicsearch"&gt;http://ipindiaservices.gov.in/publicsearch&lt;/a&gt;,  a patent search portal is displayed. Enter the patent number by following the same steps as described in Case 1 until the queried patent is displayed. Select the “E-register” tab to access the e-register data corresponding to the queried patent.&lt;/li&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Pass.png" alt="Pass" class="image-inline" title="Pass" /&gt;&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;In the “E-register” tab, scroll to the bottom to view the “Information u/s 146” table. The “Information u/s 146” table includes a list of Form 27 filed for the queried patent. As visible in the screenshot below, on clicking the “261762_2015” hyperlink, Form 27 for the queried patent opens. There could be multiple form 27s corresponding to different years.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_Pass.png" alt="Pass" class="image-inline" title="Pass" /&gt;&lt;/p&gt;
&lt;h3&gt;Case 4: No record of Form 27 found (E-register)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If the form is not present in the E-register, that is, if it has not been uploaded to the website or if it has not been submitted to the IPO, then the E-Register tab displays “Eregister Not Available”.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy5_of_Pass.png" alt="Pass" class="image-inline" title="Pass" /&gt;&lt;/p&gt;
&lt;h3&gt;Case 5: Searching on IPAIRS&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Both InPASS and IPAIRS fetch forms from the same URL. However, we observed that one search engine sometimes displays the forms when the other doesn’t. The IPAIRS search engine was used when Form 27 was not found on InPASS.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;IPAIRS patent search homepage: http://ipindiaonline.gov.in/patentsearch/search/index.aspx On the home page, in the Application Status tab, enter the full patent application number and CAPTCHA.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A window containing information pertaining to the patent application opens. At the bottom of the window, there is a “View Documents” button.&lt;/li&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_Pass.png" alt="Pass" class="image-inline" title="Pass" /&gt;&lt;/p&gt;
&lt;li&gt;On clicking on “View Documents”, a new window with list of hyperlinked documents opens as described in Case 1, Step 5.&lt;br /&gt;&lt;img src="https://cis-india.org/home-images/copy7_of_Pass.png" alt="Pass" class="image-inline" title="Pass" /&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;The URL for the new window displayed via “View Documents” on IPAIRS is the same as the URL displayed via “View Documents” in the “Application Status” tab on InPASS. For example, for patent number 263932, the URL for this window is the same on IPAIRS and InPASS: http://ipindiaonline.gov.in/patentsearch/GrantedSearch/viewdoc.aspx?id=Bx6eZ7YQLgsl3yH1LqKHjg==&amp;amp;loc=wDBSZCsAt7zoiVrqcFJsRw==&lt;/p&gt;
&lt;h3&gt;Form 27 retrieval via Right To Information (RTI) requests&lt;/h3&gt;
&lt;p&gt;CIS filed two requests under the RTI Act, 2005 with the Office of the Controller General of Patents, Designs, and Trade Marks in Mumbai.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CIS' RTI application to the Indian Patent Office in Mumbai,       March 2016 [&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-app-2016.pdf/at_download/file"&gt;PDF]&lt;/a&gt;. The IPO's reply, April 2016 [&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-reply-2016.pdf/at_download/file"&gt;PDF&lt;/a&gt;].&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(View text: &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-march-2016"&gt;https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-march-2016&lt;/a&gt;)&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;CIS' RTI application to the IPO in Mumbai,       June 2015 [&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-app-2015.pdf/at_download/file"&gt;PDF&lt;/a&gt;]. The IPO's reply, June 2015 [&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-reply-2015.pdf/at_download/file"&gt;PDF&lt;/a&gt;].&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(View text: &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-2015"&gt;https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-2015&lt;/a&gt;)&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;InPASS and IPAIRS yielded Form 27 for 1,999 patents out of 4,419. For Form 27 pertaining to 61 of the remaining patents, CIS made a request in March 2016 under the Right to Information Act (2005) to the office of the Indian Patent Office located in Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How the 61 patents were chosen&lt;br /&gt;&lt;/b&gt;37 of the 50 companies in the patent landscape owned granted patents. We took one patent from each of the 37 companies. [See &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/fifty-companies.pdf"&gt;Annexure 4&lt;/a&gt; (PDF)of Methodology: Patent landscaping in the Indian mobile device market] The remaining were &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt;patents litigated in India&lt;/a&gt;, as well as patents transferred from one of the companies in the landscape to another.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IPO’s reply to the March 2016 RTI application &lt;br /&gt;&lt;/b&gt;The IPO replied in April 2016 that it could provide CIS with forms for eleven of the requested patents. As for the rest of the forms, the IPO stated, “As thousand [sic] of Form-27 are filed in this office, it is very difficult to segregate Form-27 for the patent numbers enlisted in your RTI application as it needs diversion of huge official/ staff manpower and it will affect day to day [sic] work of this office.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Repeating the Form 27 search online&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A few days after CIS received the reply from the IPO, Form 27 pertaining to patents in the landscape started appearing on InPASS and IPAIRS E-register portal. CIS’ contractor repeated the search for forms for all 4,419 patents as some forms filed in 2016 and 2015 were found. Forms for additional 1,003 patents were found, taking the number of patents with at least one corresponding form to 3,002.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 1,417 patents for which forms were not found, 481 are either expired or there is no log corresponding to them in the E-Register.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Schema for the results&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Information from the Form 27 was logged into a spreadsheet with the following heads:&lt;br /&gt;Serial Number -- Assignee -- Patent Number -- Status -- Application Date -- Grant Date -- Title -- Application Number -- Form 27 presence -- Multiple Forms -- Number of years -- Year -- If Worked -- Working/ Non-working Status -- Working/ Non-working Information -- Licensing Status -- Licensing Information -- Comments.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Detailed legend and process of logging the results&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Assignee&lt;/b&gt;: Name of the company that owns the patent. &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/fifty-companies.pdf"&gt;Annexure 4&lt;/a&gt; [PDF] lists 50 companies studied for the patent landscape. 37 of those companies owned patents in India. Thus, the assignee could be one of 37 companies among the 50 in Annexure 4. Where two assignees are mentioned, the patent was transferred from the second assignee to the first on account of sale of the patent, company merger, etc. For example, "Huawei|NEC" indicates that a patent that belonged to NEC was transferred to Huawei.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Form 27 presence: &lt;/b&gt;Whether or not Form 27 was found. Entries in this column are either “Yes” or “No”. If case Form 27 was not found, the subsequent columns are unpopulated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Multiple Forms: &lt;/b&gt;If more than one Form 27 was found, the number of years for which it was found. In some cases, more than one form was found for the same patent for the same year. We have considered these instances as a single form for the same year and noted the defect in the “Comments” column.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Year&lt;/b&gt;: The year for which the form was filed. This information was found in #2 of the pro forma of Form 27. In the case of patents with Form 27 filed for more than one year, the entries for different years have been logged into consecutive rows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;If Worked:&lt;/b&gt; This information was found in 3(i) of the pro forma. Depending on whether the text of Form 27 states that the patent was “worked” or “not worked”, results have been logged as either “Yes” or “No”. In instances where it is not explicitly stated whether the patent has been worked or not, or where 3(i) is blank, the results are logged as “Not disclosed” with a description of the defect in the “Comments” column.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Working/ Non-working status: &lt;/b&gt; Corresponds to 3(i)a in the case of patents stated as “worked” and to 3(i)b in the case of those stated as “not worked”. The results have been marked as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Description is generic (future use)&lt;/li&gt;
&lt;li&gt;Description is generic (present use)&lt;/li&gt;
&lt;li&gt;Description is specific&lt;/li&gt;
&lt;li&gt;No description&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Description is generic (future use)&lt;/b&gt;: No specific information been provided as required by 3(i)a or 3(i)b. The description indicates that in the future the patentee might “work” or license  the patent or do both. E.g: “May be worked in the future depending on the market demand and when technology is mature.”&lt;/p&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are still assessing the commercial and technological aspects of working of this patent in India and negotiating marketing and distribution of patented product with related parties.”&lt;/p&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;p&gt;“Technical developments [sic] are still continuing” or “Negotiations and technical developments [sic] are still continuing”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Description is generic (present use): &lt;/b&gt;No specific information been provided as required by 3(i)a or 3(i)b. The description indicates that the patentee may be “working” the patent. E.g:, “DUE TO THE NATURE OF THE INVENTION, IT IS NOT POSSIBLE TO DETERMINE ACCURATELY WHETHER THE PATENTED INVENTION HAS BEEN WORKED IN INDIA OR NOT. Improvements in the invention are continuing to be made. The Patentee is actively looking for licensees and customers to commercialise the invention in the Indian environment.”&lt;/p&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“... This patent is among a large number of patents in the patentee’s complex portfolio which may cover the products services and embedded technologies provided by the patentee or its licensee(s) in India. This patent might worked [sic] in India in some of the patentee(s) existing or future products, services and embedded technologies. Given the extremely Iarge number of patents that may apply to any given product or service of the patentee, it is very difficult to Identify and accurately update which of those patents would apply to the numerous products, services and embedded technologies.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Description is specific: &lt;/b&gt;Specific information has been provided as required in 3(i)a or 3(i)b.&lt;/p&gt;
&lt;p&gt;E.g, “Quantum of the patented product-303520 and value of the patented product in INR-2790524299”.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;No description:&lt;/b&gt; 3(i)a and 3(i)b are blank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Working/non-working information:&lt;/b&gt; Contains the full text of the descriptions mentioned in “Working/non-working status” column. These have been reproduced verbatim from Form 27 filings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Licensing status: &lt;/b&gt;States whether or not the patent has been licensed as per 3(ii) of the pro forma for Form 27. Results are logged as “Yes” (licensed), “No” (no-licensed), “Cross-licensed” and “Not disclosed”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Not disclosed” indicates that the response to 3(ii) is either blank or there is an explicit statement that licensing information would not be disclosed on Form 27.   E.g: “As all the licenses are confidential in nature, the details pertaining to the same are not being disclosed herein and may be provided to the Patent Office as and when the same is specifically directed by the Patent Office under sealed cover so that such details are not laid open in public domain.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Licensing information: &lt;/b&gt;Contains the full text of the response reproduced verbatim from 3(ii). (Blank fields when there is no text in 3(ii))&lt;/p&gt;
&lt;p&gt;For patents marked as licensed, this column contains the names and addresses of licensees and/ or sub-licensees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For patents marked as not-licensed, this column is either blank or contains statements such as, “Information Not readily available; efforts will be made to collect and submit further information, if asked for.”, “None”, “No licensees”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For patents marked as “cross-licensed”, the patentee states that it has a cross-licensing agreement with its licensees. E.g: “There is a cross license agreement between &amp;lt;company name&amp;gt; and at least one licensee, giving mutual rights to produce despite monopoly afforded by patents that are hold by any of the companies. There is no information available on whether the technology of said  patent is included products sold by such licensee. As all the licenses are confidential in nature, the details pertaining to the same shall be provided under specific directions from the Patent Office.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Comments: &lt;/b&gt;Contains information about defects and notable observations from the Form 27 submissions.&lt;/p&gt;
&lt;h2&gt;Validation of results&lt;/h2&gt;
&lt;p&gt;Validation of the results was done via deduplication first and then random sampling of 10% of the results.&lt;/p&gt;
&lt;h2&gt;Analysis of results&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;[Corresponding research questions:&lt;br /&gt;4. Is there an identifiable pattern in the defects and discrepancies?&lt;br /&gt;5. Is there any discernible trend in filing of Form 27 over time and with respect to patent owners?]&lt;br /&gt;&lt;br /&gt;The results logged into the spreadsheet were analysed to find a pattern in the defects in the submissions. Visualisations will be created, if necessary.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Prior Art&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Extraordinary writ petition in the matter of a public interest litigation, filed in the High Court of Delhi, Shamnad Basheer vs Union of India and others, C.M. No. 5590 of 2015 &lt;a href="http://spicyip.com/wp-content/uploads/2015/05/FORM-27-WP-1R-copy.pdf"&gt;http://spicyip.com/wp-content/uploads/2015/05/FORM-27-WP-1R-copy.pdf&lt;/a&gt; &lt;br /&gt;&lt;br /&gt;The petitioner(s) “sought to investigate the commercial working of certain patented  inventions in India, particularly in relation to three key areas”. One of these areas include telecommunications technology. Para 53 to 58 of the writ elucidate on the petitioners’ observations and findings on “High technology patents and trolls”, while para 59 and 60 refer to the linkage between patents and products. Annexure P-8 of this petition contains copies of Form 27 filed by Ericsson in India. Annexure P-11 contains a “summary of findings of Form 27 investigations conducted by the petitioner”. Annexure P-4 (II. Telecommunications Sector) contains a list of 58 patents pertaining to the telecommunications domain in India. 21 of these are coincide with the patent landscape mentioned in “Research Object”.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Basheer had published a report in 2011 based on the findings of his RTI investigation of Form 27 pertaining to pharmaceutical patents in India. The report titled “RTI Applications and “Working” of Foreign Drugs in India?” is available at: &lt;a href="http://www.spicyip.com/docs/Workingpatents.doc"&gt;http://www.spicyip.com/docs/Workingpatents.doc&lt;/a&gt; The report sheds light on lack of filing, incomplete filing and violation of patent working norms by pharmaceutical companies. He states having encountered difficulties during the RTI process: &lt;i&gt;The RTI process was a very arduous one, with the patent office refusing information or claiming missing files in some cases. We had to resort to the appellate procedure in almost all cases. And in one case concerning the drugs Tarceva and Sutent, both the CPIO (Delhi office) and the appellate authority refused to provide information. We had to then take the matter up directly with Controller General PH Kurian who immediately ordered that the information be provided. Upon his instructions, the information was provided within 24 hours. However, we received this information only on the 4&lt;sup&gt;th&lt;/sup&gt; of April 2011, more than 6 months since we began the RTI process! (Source:&lt;/i&gt; Drug Firms and Patent "Working": Extent of Compliance with Form 27 &lt;a href="http://spicyip.com/2011/04/drug-firms-and-patent-working-extent-of.html"&gt;http://spicyip.com/2011/04/drug-firms-and-patent-working-extent-of.html&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Limitations&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;If Form 27 is not found on InPASS or INPAIRS, it is not possible to determine if the form has not been submitted to the IPO or it has been submitted but the IPO has not uploaded it. There is no publicly available database or log where such information is available.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technical issues with the IPAIRS website hampered the speed of searching for and downloading Form 27. At the time of trial run in May 2015, the website was not available for nearly a week. Technical issues also lead to conflicting search results on IPAIRS and INPASS at times. For example, the form may be available via one search engine but not via another, even though they are fetched the files from the same database. Runtime errors occur due to browser caching. &lt;/li&gt;
&lt;br /&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Edited, September 10, 2017: &lt;/b&gt;To add -- URLs of the research paper on Form 27 published in July 2017, and of the dataset containing raw data, which was published and licensed CC-BY-SA 4.0.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/methodology-statements-of-working-form-27-of-indian-mobile-device-patents'&gt;https://cis-india.org/a2k/blogs/methodology-statements-of-working-form-27-of-indian-mobile-device-patents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2017-09-10T15:19:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/spicy-ip-september-7-2016-anubha-sinha-where-is-the-regional-comprehensive-economic-partnership-headed">
    <title>Where is the Regional Comprehensive Economic Partnership Headed?</title>
    <link>https://cis-india.org/a2k/blogs/spicy-ip-september-7-2016-anubha-sinha-where-is-the-regional-comprehensive-economic-partnership-headed</link>
    <description>
        &lt;b&gt;The Regional Comprehensive Economic Partnership (RCEP) – the Asian answer to the Trans-Pacific Partnership (TPP) is still being furiously scripted.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The blog post was originally published in Spicy IP on September 7, 2016. It can be &lt;a class="external-link" href="http://spicyip.com/2016/09/where-is-the-regional-comprehensive-economic-partnership-headed.html"&gt;read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The US-led TPP and China-led RCEP were always touted as rivals racing to  set global trade standards before the conclusion of the other. Well,  TPP gunned ahead and is currently in the ratification phase, where as  RCEP is yet to be concluded and &lt;a href="http://www.bilaterals.org/?rcep-talks-may-miss-december-2016"&gt;talks may very well enter 2017&lt;/a&gt;. The latest round of RCEP talks ended last&amp;nbsp;month and paints a worrisome picture for the global south, given that it will bring &lt;a href="http://qz.com/519790/thought-the-tpp-was-a-big-deal-chinas-rival-free-trade-pact-covers-half-the-worlds-population/"&gt;3.5 billion people and 12% of world trade&lt;/a&gt; into its fold.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Free Trade Agreements (FTAs) do not enable zero-sum free trade. In fact,  each country leaves with disproportionate gains and losses in their  kitty, after the conclusion of the agreement. And the worst casualties  are environment, public health, labour rights, SMEs and local markets.  Since&amp;nbsp;there is plenty of give and take occurring in&amp;nbsp;a context of  fluid&amp;nbsp;foreign policy relations, it becomes imperative to locate the  ‘barter’.&amp;nbsp;Last month, Balaji wrote an&amp;nbsp;excellent comparative analysis(&lt;a href="http://spicyip.com/2016/08/assessing-the-consequences-of-trips-ftas-for-india-tpp-tisa-and-rcep-part-i.html"&gt;I&lt;/a&gt; &amp;amp; &lt;a href="http://spicyip.com/2016/08/assessing-the-consequences-of-trips-ftas-for-india-tpp-tisa-and-rcep-part-ii.html"&gt;II&lt;/a&gt;) of the RCEP&amp;nbsp;IPR text, and this post complements that. &lt;strong&gt;I  present a regional overview of negotiations and the impact on course of  the agreement, as gathered from press coverage of the meetings and the  leaks; and to provide a more wholesome picture of the&amp;nbsp;barters, I discuss  other relevant chapters at the end of this post. &lt;/strong&gt;Further,&amp;nbsp;as the negotiations are conducted in secrecy, different organisations and individuals have ‘leaked’ draft texts. &lt;a href="http://www.keionline.org/"&gt;KEI&lt;/a&gt; and &lt;a href="http://www.bilaterals.org/?-south-south-ftas-"&gt;bilaterals.org&lt;/a&gt; are two such organizations that regularly collate and release latest RCEP texts.&amp;nbsp;&lt;strong&gt;I rely on RCEP’s &lt;a href="http://www.bilaterals.org/?rcep-ip-chapter-october-15-2015"&gt;IP Chapter(October 15, 2015 version)&lt;/a&gt; and&amp;nbsp;&lt;a href="http://www.bilaterals.org/IMG/pdf/ecommerce_draft_terms_of_reference.pdf"&gt;Terms of Reference by the Working Group on Electronic Commerce&lt;/a&gt;(August 2015 version).&lt;/strong&gt; Analysing the Telecommunications Services chapter&amp;nbsp;is outside the scope of the post, and&amp;nbsp;I link it &lt;a href="http://www.bilaterals.org/?rcep-telecommunications-services"&gt;here&lt;/a&gt; for the interest of our readers.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Impact on E-commerce&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;What&amp;nbsp;is&amp;nbsp;currently&amp;nbsp;available&amp;nbsp;are&amp;nbsp;the &lt;a href="http://www.bilaterals.org/IMG/pdf/ecommerce_draft_terms_of_reference.pdf"&gt;terms for reference establishing the Working Group’s mandate on drafting a chapter on e-commerce&lt;/a&gt;.  The document acknowledges the need for inclusion of a provision for  special and differential treatment, and additional flexibilities to the  least developed ASEAN countries. It draws a list of relevant elements  for possible inclusion in the RCEP. I reproduce the list here (&lt;em&gt;emphasis supplied is mine&lt;/em&gt;):&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;I. General Provisions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cooperation&lt;/li&gt;
&lt;li&gt;Electronic Supply of Services&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;II. Trade Faciliation&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Paperless Trading&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Electronic Signature and Digital Certification&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;III. Creating a Conducive Environment for Electronic Commerce&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Online Consumer Protection&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Online Personal Data Protection&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Unsolicited Commercial E-mail&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Domestic Regulatory Frameworks&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Custom Duties&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Non-Discriminatory Treatment of Digital Products&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;IV. Promoting Cross Border Electronic Commerce&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Prohibition on Requirements Concerning the Location of Computing Facilities&lt;/li&gt;
&lt;li&gt;Prohibition on Requirements Concerning Disclosure of Source Code&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cross- Border Transfer of Information by Electronic Means&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;While there is no clarity on customs  duties, there is a mention of non-discriminatory treatment of digital  products. While India has no law on non-discriminatory treatment of  digital products, this may conflict with &lt;a href="http://spicyip.com/2016/08/assessing-the-consequences-of-trips-ftas-for-india-tpp-tisa-and-rcep-part-ii.html"&gt;the Indian government’s policy on adoption of open source software for government use&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;More alarmingly, the first&amp;nbsp;prohibition restrains governments from mandating data localisation. The &lt;a href="http://spicyip.com/2016/08/assessing-the-consequences-of-trips-ftas-for-india-tpp-tisa-and-rcep-part-ii.html"&gt;Trans-Pacific  Partnership (TPP) and Trade in Services Agreement (TISA)&amp;nbsp;also  bar&amp;nbsp;governments from making rules on data localisation&lt;/a&gt;, i.e.  requiring physical situation of servers and storage in their  countries’&amp;nbsp;territories. This is a worrisome provision because it may  effectuate surreptitious surveillance. The prohibition on disclosure of  source code is also&amp;nbsp;troublesome and is aimed to&amp;nbsp;stop examination and  review of code in computing devices. This would effectively ban security  researchers from finding security vulnerabilities in devices, and the &lt;a href="https://www.eff.org/deeplinks/2015/12/tpp-threatens-security-and-safety-locking-down-us-policy-source-code-audit"&gt;if the provision is drafted like its counterpart in the TPP&lt;/a&gt;, there will&amp;nbsp;also be prohibitions on checks by regulating authorities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Re ‘Cross- Border Transfer of Information  by Electronic Means’, the provision will be most likely drafted to  favour big data and advertising companies’ operations  enabling&amp;nbsp;unrestricted transfer of personal data(like the TPP). If that  is the case, then it &lt;a href="http://spicyip.com/2016/08/assessing-the-consequences-of-trips-ftas-for-india-tpp-tisa-and-rcep-part-ii.html"&gt;will be in conflict&lt;/a&gt; with Rule 7 of the Information Technology (Reasonable security  practices and sensitive personal data or information) Rules 2011, which  permits cross-border flow of personal information only in situations  where the recipient of the information complies with Indian data  protection standards as a bare minimum.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Impact on farmer's seeds&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;RCEP is bound to hit farmers the worst:  not only are countries reducing tariffs for increased import of  agricultural products, there also exists an obligation to join the  International Union for Protection of New Varieties of Plants (UPOV  system), which would mandate members to introduce a new IPR: the  breeders’ right over new plant varieties. &lt;a href="https://www.grain.org/article/entries/5405-new-mega-treaty-in-the-pipeline-what-does-rcep-mean-for-farmers-seeds-in-asia"&gt;Japan and Korea want RCEP members to join UPOV 1991&lt;/a&gt;, and Japan has proposed criminal penalties for the infringement of breeders’ rights.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While India has applied to become a  member to the UPOV Convention, in 2001 it passed the Protection of Plant  Varieties and Farmers’ Rights Act, and thereby built a sui generis  system of protection (ambitiously trying to balance breeders’ rights and  farmers’ rights). It will be naive to expect a similar attempt in  balanced lawmaking by other countries. Furthermore, “&lt;a href="https://www.grain.org/article/entries/5405-new-mega-treaty-in-the-pipeline-what-does-rcep-mean-for-farmers-seeds-in-asia"&gt;&lt;em&gt;…India’s  current legislation is less stringent than UPOV 1991. It allows farmers  to continue with their seed practices, except they cannot sell packaged  seeds of protected varieties. The space for both small farmers and  public breeders to freely work with seeds will be lost of RCEP goes the  way of what Korea and Japan are proposing.&lt;/em&gt;&lt;/a&gt;” Using FTAs to reduce farmers’ freedom has been well documented, and you may read more on that &lt;a href="https://www.grain.org/article/entries/5511-new-trade-deals-legalise-corporate-theft-make-farmers-seeds-illegal"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The text also desires&amp;nbsp;all RCEP members to  codify traditional knowledge and make it available to various patent  offices. This push is widely regarded as &lt;a href="https://www.grain.org/article/entries/5405-new-mega-treaty-in-the-pipeline-what-does-rcep-mean-for-farmers-seeds-in-asia"&gt;problematic&lt;/a&gt;,  as it is feared that documenting and digitization of existing knowledge  may propel companies to use that information for commercial gains, to  the detriment of the indigenous people and farming communities. On the  other hand, it would be feasible to share such data in a confidential  manner with patent offices, as India has done under the TKDL.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Massive reduction in tariffs&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Tariffs emerged as an enormous sticking point in the August round, and  there was pressure on India to eliminate tariffs completely. India  proposed a differential tariff reduction plan, but countries kept  pushing for a single-tier plan – particularly Japan. Finally, in what is  &lt;a href="http://www.financialexpress.com/economy/india-may-sweeten-offers-for-china-japan-others-at-rcep-but-opposes-early-harvest/355617/"&gt;seen as a big loss&lt;/a&gt;,  India offered tariff cuts as high as 80% goods trade for all RCEP  partners, except China. With China, India said that it was only &lt;a href="http://economictimes.indiatimes.com/news/economy/policy/india-may-offer-china-different-terms-in-new-rcep-structure/articleshow/53819418.cms"&gt;comfortable with a 65% tariff cut initially&lt;/a&gt;,  given the skewed trade deficit between China and India. It is worth  noting that for India, RCEP will become the first FTA to forge trade  partnerships with China, Australia,and New Zealand.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As a result of the heavy concession in tariffs, the Kerala Agriculture Minister has &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-kerala/kerala-concerned-over-impact-of-trade-pact/article9071645.ece"&gt;moved a cabinet note&lt;/a&gt;, and &lt;a href="http://googleweblight.com/?lite_url=http://www.thehindu.com/news/national/kerala/kerala-seeks-steps-to-insulate-ryots-from-free-trade-agreements/article8924408.ece&amp;amp;ei=mtKedgYX&amp;amp;lc=en-IN&amp;amp;s=1&amp;amp;m=195&amp;amp;host=www.google.co.in&amp;amp;ts=1469936275&amp;amp;sig=AKOVD64Tp5JoonVuzIiYnlISXlPh7ukXCQ"&gt;written a letter to the Centre&lt;/a&gt; expressing serious concerns on lowering of tariffs for agricultural  products. He also requested to include Kerala in the RCEP  pre-negotiation talks.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Staving off ISDS&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Provisions on investor-to-state dispute settlement (ISDS) are being  pushed by Japan and South Korea. Countries are not convinced about  agreeing to this, especially India. In fact, India is in the process of  rolling back on bilateral investment treaties, and has already moved for  BIT t&lt;a href="http://thewire.in/52022/remodeling-indias-investment-treaty-regime/"&gt;ermination with 57 countries.&lt;/a&gt; We’ve already seen ISDS being (mis)used by private entities against  governments – there have been enough challenges to countries’ IPR laws  and policies as well.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Mobilised Movements against the RCEP&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Individuals and organizations are advocating for scrapping the RCEP,  given the impact that it is expected to have on people’s rights and  freedoms. A ‘People’s Strategy Meeting’ last month conducted large-scale  sessions to inform civil society organizations, NGOs, trade unions,  farmers groups and other peoples’ movements in the Asia-pacific region.  Many have also been &lt;a href="http://occupyfta.blogspot.in/2016/07/written-opinion-on-rcep-to-south-korean.html"&gt;persistently calling out&lt;/a&gt; for a meeting with negotiators of their respective countries and for a public hearing on the RCEP. &amp;nbsp;The &lt;a href="http://aprnet.org/"&gt;Asia Pacific Research Network&lt;/a&gt; has released a policy brief on the RCEP, and you may read that &lt;a href="http://aprnet.org/wp-content/uploads/2016/07/RCEP-BRIEFER-PAGES-no-bleed-with-text-boxes.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;The road ahead&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Looking at the larger picture, it is  evident now that neo-FTAs’ focus on trade has descended into attacks on  sovereign states’ economic and social policies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;With respect to the RCEP IPR text, India  is trying to eliminate TRIPS plus provisions from the text. And after  heavy concessions on the tariff front, it will be bargaining for  liberalisation in services in the next rounds. India’s aim is to &lt;a href="https://insidetrade.com/daily-news/some-asian-nations-eye-joining-tpp-despite-push-finish-rcep-year"&gt;clinch a deal allowing for free-er movement of its workers and professionals. &lt;/a&gt;Further,  the negotiations are going to proceed quickly now. Members are becoming  desperate to lock down the text, and therefore, this year we will see  more rounds than the usual scheduled ones. The urgency is driven largely  by Japan and Korea – both of which wish to ratify the TPP soon and  would like the RCEP to work in tandem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In another worrisome development, &lt;a href="https://insidetrade.com/daily-news/some-asian-nations-eye-joining-tpp-despite-push-finish-rcep-year"&gt;Phillipines, Thailand and Indonesia have met with US trade officials&lt;/a&gt; on what they need to do to join the TPP, once it is implemented. These  countries are considering making serious changes to their labour,  environmental, IP, and other standards. Yesterday, US Prez. Obama  arrived in Vietnam for the Asean summit, t&lt;a href="https://www.usasean.org/council-in-the-news/2016/05/25/pres-obama-pushes-tpp-during-second-day-vietnam-trip"&gt;rying hard to sell the TPP&lt;/a&gt;.  Japan and Korea are already TPP members, and if ASEAN countries come  under TPP’s fold as well, we may see an upping of standards at the RCEP.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;India will have to deploy serious  negotiating chops at the upcoming rounds if it is remotely hopeful of  steering the RCEP standards away from the TPP.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Author’s note: Added the&amp;nbsp;sentence &lt;em&gt;“On the other hand, it would be  feasible to share such data in a confidential manner with patent  offices, as India has done under the TKDL.” &lt;br /&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/spicy-ip-september-7-2016-anubha-sinha-where-is-the-regional-comprehensive-economic-partnership-headed'&gt;https://cis-india.org/a2k/blogs/spicy-ip-september-7-2016-anubha-sinha-where-is-the-regional-comprehensive-economic-partnership-headed&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Regional Comprehensive Economic Partnership</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-09-17T14:15:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-september-3-2016-nishant-shah-quarter-life-crisis-the-world-wide-web-turns-25-this-year">
    <title>Quarter Life Crisis: The World Wide Web turns 25 this year</title>
    <link>https://cis-india.org/raw/indian-express-september-3-2016-nishant-shah-quarter-life-crisis-the-world-wide-web-turns-25-this-year</link>
    <description>
        &lt;b&gt;With the unexplained ban on websites, the state seems to have stopped caring for the digital rights of its citizens. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was published in the &lt;a class="external-link" href="http://indianexpress.com/article/technology/world-wide-web-internet-25-years-3011720/"&gt;Indian Express&lt;/a&gt; on September 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The World Wide Web turned 25 this year. A quarter of a century ago, the first website went live, and since then, the world as we know it has changed. The internet is probably the fastest way a new technology has become old. There are generations who have never known the world without it being connected. And yet, it is safe to say that if put into a corner, most of us might have a tough time trying to exactly describe what the World Wide Web is, and how it operates. Like many massification technologies, the internet has quickly evolved from being the playground for geeks to tinker with and build digital networks, into a blackbox that we access through our seductively designed interfaces.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At a technological level, the internet was a standardisation protocol that allowed for distributed databases on remote computers to interact with each other using digital connections. At the heart of the internet was the impulse to share, and to share safely, new information that would lead to collaborative knowledge production and stronger network communities. The World Wide Web saw this potential of sharing information quickly as one of the most promising aspects of human futures. Sir Tim Berners-Lee, in his first vision of the WWW, had proposed that the capacity to share information, without loss of quality, would create new societies of equality and equity. In this vision, the website was a way of sharing information, expression, political desire, personal longing and social ideas, thus creating connected societies that would be able to consolidate the sum total of all human experience.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;That historical moment of the technological architecture and the ideological articulation of the internet and the WWW are critical because as the internet has become increasingly privatised, with intermediaries, Internet Service Providers, and content producers claiming more and more of the digital turf, we have seen continued attack on the principles of sharing. We have, in the last few years, seen draconian crackdowns on people sharing their political views on social media, arresting young people for their political dissent online. We have witnessed the emergence of paywalls that close down content, criminalising students trying to access new knowledge towards their education. We have seen the policing of online creative spaces, monitoring users who engage in cultural production, forcing them into repressive intellectual property regimes that they do not necessarily want.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Most of these attacks on sharing have been fuelled by private companies who see the economic benefits of creating media monopolies out of the internet. These attacks have been particularly vicious because they also recognise the potentials of digital connectivity to completely disrupt the extraordinary powers of crowds who can co-create the biggest encyclopaedia in the word and undermine the corporatisation of cultural objects. And yet, in the interest of profits, there has been persistent lobbying from the private owners of the public goods of the internet, to crack down on sharing and access through legal punishment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Like many developing countries, India has been resisting the enforcing of Intellectual Property Rights promoted by private lobbyists. In doing so, it recognises that emerging geographies need more open, universal and affordable access to information and that the true potential of digitisation lies in the capacity of the web to enable unfettered access to knowledge and cultural artefacts. Despite pressure from global lobbies, the Indian state has continued to emphasise that access for public good overrides the interest of private right holders, and has favoured the digital user’s right to access material which they might not always have the economic rights for. Some scholars say that this is where the state emphasises that the moral rights of access to information supersede the legal rights that close the possibilities of access.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Or at least, the Indian state recognised the need of its still-being-connected population to have free access till recently. With the new law that enforces a block on torrent and file sharing sites, warnings of punitive action, and an unexplained ban on websites that most users have been using for knowledge and cultural products, the state seems to have buckled under private lobbying and also stopped caring for the rights of its citizens. There will always be a split vote when it comes to figuring out the pros and cons of piracy, and it is important to recognise the right of the cultural and knowledge producer to protect their economic interests. The debates have been interesting because it was difficult to take sides and required a balancing act of negotiation between different parties.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, with this new intervention, the Indian government seems to have taken sides, and made up its mind, that for the future of Digital India, it is going to favour the corporation, the company, the private profit making entity over the individual, the collective, and the public that sought to access information through the fundamental principle of the digital web — sharing.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-september-3-2016-nishant-shah-quarter-life-crisis-the-world-wide-web-turns-25-this-year'&gt;https://cis-india.org/raw/indian-express-september-3-2016-nishant-shah-quarter-life-crisis-the-world-wide-web-turns-25-this-year&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    

   <dc:date>2016-09-16T13:25:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission">
    <title>CIS - Telangana State Open Data Policy v.1 - Submission</title>
    <link>https://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission'&gt;https://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-09-01T05:45:54Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016">
    <title>Submitted Comments on the Telangana State Open Data Policy 2016</title>
    <link>https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016</link>
    <description>
        &lt;b&gt;Last month, the Information Technology, Electronics &amp; Communications Department of the Government of Telangana released the first public draft of the Telangana State Open Data Policy 2016, and sought comments from various stakeholders in the state and outside. The draft policy not only aims to facilitate and provide a framework for proactive disclosure of data created by the state government agencies, but also identify the need for integrating such a mandate within the information systems operated by these agencies as well. CIS is grateful to be invited to submit its detailed comments on the same. The submission was drafted by Anubha Sinha and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the submitted document: &lt;a href="http://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments and recommendations by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the proposed draft of the Telangana Open Data Policy 2016 (“the draft policy”). This submission is based on Version 1 of the draft policy shared by the Information Technology, Electronics &amp;amp; Communications Department, Government of Telangana (“the ITE&amp;amp;C Department”).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; CIS commends the ITE&amp;amp;C Department for its generous efforts at seeking inputs from various stakeholders to draft an open data policy for the state of Telangana. CIS is thankful for this opportunity to provide a clause-by-clause submission.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the principle of citizens’ right to information, instituting openness-by-default in governmental activities, and to realise the various kinds of public goods that can emerge from greater availability of open (government) data. The submission is limited to those clauses that most directly have an impact on these principles.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments and Recommendations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This section presents comments and recommendations directed at the draft policy as a whole, and in certain places, directed at specific clauses of the draft policy.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;3.1. Defining the Scope of the Policy in the Preamble&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; CIS observes and appreciates that the ITE&amp;amp;C Department has identified the open data policy as a catalyst for, and as dependent upon, a larger transformation of the information systems implemented in the state, to specifically ensure that these information systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; CIS commends the endeavour of the draft policy to share data in open and machine-readable standards. To further this, it will be useful for the preamble to explicitly mandate proactive disclosure in both human-readable and machine-readable formats, using open standards, and under open license(s).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.3.&lt;/strong&gt; CIS recommends that the draft policy state the scope of the policy at the outset, i.e. in the Preamble section of the document. This will provide greater clarity to the stakeholders who are trying to ascertain applicability of the draft policy to their data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.4.&lt;/strong&gt; CIS commends the crucial mandate of creating data inventory within every state government ministry / department. We further recommend that the draft policy also expressly states the need to make these inventories publicly accessible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.5.&lt;/strong&gt; CIS commends the draft policy’s aim to build a process to engage with data users for better outcomes. We suggest that the draft policy also enumerates the “outcomes” of such engagement, in order to provide more clarity. We recommend that these “outcomes” include greater public supply of open government data in an effective, well-documented, timely, and responsible manner.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.6.&lt;/strong&gt; Further, CIS suggests that the draft policy define “information centric and customer centric data” to provide more clarity to the document, as well as its scope and objectives.&lt;/p&gt;
&lt;h3&gt;3.2. Provide Legal and Policy References&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; Strengthening transparency, predictability, and legal certainty of rules benefits all stakeholders. Thus, as far as possible, terms in the draft policy should use pre-existing legal definitions. In case of ambiguities arising after the implementation of the policy, consistency in definitions will also lead to greater interpretive certainty. It must be noted that good quality public policies which promote legal certainty, lead to better implementation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.2.&lt;/strong&gt; CIS observes that the draft policy re-defines various terms in Section 4 that have already been defined in National Data Sharing and Accessibility Policy (“NDSAP”) 2012 &lt;strong&gt;[2]&lt;/strong&gt;, the Right to Information 2005 (“RTI Act”) &lt;strong&gt;[3]&lt;/strong&gt;, and IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011 &lt;strong&gt;[4]&lt;/strong&gt;. We strongly recommend that the draft policy uses the pre-existing definitions in these acts, rules, and policies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.3.&lt;/strong&gt; Further, CIS observes that while certain sections accurately reflect definitions and parts from other acts, rules and policies, such sections are not referenced back to the latter. These sections include, but are not limited to: Sections 3, 7, 8, 4 (definitions of Data set, Data Archive, Negative list, Sensitive Personal data). We strongly recommend that accurate legal references be added to the draft policy after careful study of the language used.&lt;/p&gt;
&lt;h3&gt;3.3. Need for More Focused Objective Statement&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; While the draft policy has a very comprehensive statement of its objectives, including "&lt;em&gt;all issues related to data in terms of the available scope of sharing and accessing spatial and non-spatial data under broad frameworks of standards and interoperability&lt;/em&gt;," it may consider offering a more focused statement of its key objective, which is to provide a policy framework for proactive disclosure of government data by the various agencies of the Government of Telangana.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; Further, the objective statement must clearly state that the policy enables publication of data created by the agencies of the Government of Telangana, and/or by private agencies working in partnership with public agencies, using public funds as open data (that is, using open standards, and under open license). The present version of the objective statement mentions "&lt;em&gt;sharing&lt;/em&gt;" and "&lt;em&gt;accessing&lt;/em&gt;" the data concerned under "&lt;em&gt;broad frameworks of standards and interoperability&lt;/em&gt;" but does not make it clear if such shared data will be available in open standards, under open licenses, and for royalty-free adaptation and redistribution by the users concerned.&lt;/p&gt;
&lt;h3&gt;3.4. Suggestions related to the Definitions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; The term “Data” has not been defined in accordance with NDSAP 2012. We suggest that the definition provided in NDSAP is followed so as to ensure legal compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; The term “Sensitive Personal Data” seems to have been defined on the basis of the definition provided in the IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011. Please add direct reference so as to make this clear. We further suggest that the term “Personal Information”, also defined in the same IT Rules, is also included and referred to in the draft policy, so that not only Sensitive Personal Data is barred from disclosure under this policy, but also Personal Information (that is "&lt;em&gt;any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person&lt;/em&gt;") &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; The term “Negative List” is defined in a manner that allows the state government ministries and agencies to identify which data are to be considered as non-shareable without any reference to an existing policy framework that list acceptable grounds for such identification. The term must be defined more restrictively, as this definition can allow an agency to avoid disclosure of data that may not be legally justifiable as non-shareable or sensitive. Thus, we recommend a more limited definition which may draw upon the RTI Act 2005, and specifically consider the factors mentioned in Sections 8 and 9 of the Act as the (only) set of acceptable reasons for non-disclosure of government data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.4.&lt;/strong&gt; The terms “Shareable Data” and “Sensitive Data” are used in several places in the draft policy but are not defined in Section 4. Both these terms are defined in NDSAP 2012. We suggest that both these terms be listed in Section 4, in accordance with the respective definitions provided in NDSAP 2012.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.5.&lt;/strong&gt; The terms “Data Archive”, “Data Acquisition”, “Raw Data”, “Standards-Compliant Applications”, and “Unique Data” are defined in Section 4, but none of these terms appear elsewhere in the draft policy. We suggest that these terms are either better integrated into the document, or may not be defined at all.&lt;/p&gt;
&lt;h3&gt;3.5. Rename Section 6 to Focus on Implementation of the Policy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.5.1.&lt;/strong&gt; Though the Section 6 is named as “Shareable Data”, it instead categorically lists down how the policy is to be implemented. This is a very welcome step, but the Section title should reflect this purpose of the Section.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.2.&lt;/strong&gt; The decision proposed in the draft policy to make it mandatory for "&lt;em&gt;each funding organization&lt;/em&gt;" to "&lt;em&gt;highlight data sharing policy as preamble in its RFPs as well as Project proposal formats&lt;/em&gt;" is much appreciated and commendable. For a clearer and wider applicability of this measure, we recommend that this responsibility should apply to all state government agencies, including agencies where the state government enjoys significant stake, and all public-private partnerships entered into by the state government agencies, and not only to "&lt;em&gt;funding organizations&lt;/em&gt;" (a term that has also not been defined in the draft policy).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.3.&lt;/strong&gt; While the Section details out various measures and steps of implementation of the policy, it does not clarify which agency and/or committee would have the authority and responsibility to coordinate, monitor, facilitate, and ensure these measures and steps. Not only governmental representatives but also non-governmental representatives may be considered for such a committee.&lt;/p&gt;
&lt;h3&gt;3.6. Host All Open Government Data in the State Portal&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.6.1.&lt;/strong&gt; We observe that the Section 6 indicates that  , the designated domain for the open government data portal for the state of Telangana, will only store metadata related to the proactive disclosed data sets but not the data sets themselves. This is further clarified in Section 10. We strongly urge the ITE&amp;amp;C Department to reconsider this decision to not to store the actual open data sets in the state open government data portal itself but in the departmental portals. A central archive of the open data assets, hosted by the state open government data portal, will allow for more effective and streamlined management of the open data assets concerned, including their systematic backing-up, better security and integrity, permanent and unique disclosure, and rule-driven updation. This would also reduce the burden upon all the government agencies, especially those that do not have a substantial IT team, to run independent department-specific open data portals.&lt;/p&gt;
&lt;h3&gt;3.7. Reconsider the Section on Data Classification&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.7.1.&lt;/strong&gt; While it is clear that the Section 7 on Data Classification follows the classification of various data sets created, managed, and/or hosted by government agencies offered in the NDSAP 2012, it is not very clear what role this classification plays in functioning and implementation of the draft policy. While Open Access and Registered Access data may both be considered as open government data that is to be proactively disclosed by the state government agencies via the state open government data portal, the Restricted Access data overlaps with the kinds of data already included in the Negative List defined in the draft policy (and elsewhere, like the RTI Act 2005). Further, the final sentence in this Section ensures that all data users provide appropriate attribution of the source(s) of the data set concerned, which (though is an important statement) should not be part of this Section on Data Classification. We suggest reconsideration of inclusion of this Section.&lt;/p&gt;
&lt;h3&gt;3.8. Reconsider the Section on Technology for Sharing and Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.8.1.&lt;/strong&gt; While it is clear that the Section 8 on Technology for Sharing and Access is adapted from the Section 9 of the NDSAP 2012, the text in this Section seems to be not fully compatible with other statements in this draft policy. For example, the Section states that "&lt;em&gt;[t]his integrated repository will hold data of current and historical nature and this repository over a period of time will also encompass data generated by various State Government departments&lt;/em&gt;." However, the draft policy states in Section 10 that "&lt;em&gt;data.telangana.gov.in will only have the metadata and data itself will be accessed from the portals of the departments&lt;/em&gt;."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.2.&lt;/strong&gt; We strongly urge the ITE&amp;amp;C Department to revise this Section through close discussion with the NDSAP Project Management Unit, National Informatics Centre, which is the technical team responsible for developing and managing the  portal, since the present version of this Section lists the original feature set of the  portal as envisioned in 2012 but does not reflect the most recent feature set that has been already implemented in the portal concerned.&lt;/p&gt;
&lt;h3&gt;3.9. Current Legal Framework (Section 9) should List to Relevant Acts, Rules, Policies, and Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.9.1.&lt;/strong&gt; CIS observes that the draft policy attempts to lay out the applicable legal framework in Section 2 and 9 of the draft policy, and submits that the legal framework is incomplete and recommends that the draft policy lists all the following relevant acts, rules, policies and guidelines:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;National Data Sharing and Accessibility Policy, 2012&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Right to Information Act, 2005&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology Act, 2002&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;3.9.2.&lt;/strong&gt; CIS submits that apart from the policies mentioned above, the implementation of the draft policy is intricately linked to concepts of "open standards," "open source software," "open API," and "right to information." These concepts are governed by specific acts and policies, and are applicable to government owned data, as follows:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Standards:&lt;/strong&gt; CIS observes that the draft policy draws on the importance of building information systems for interoperability and greater information accessibility. Interoperability is achieved by appropriate implementation of open standards. Thus, CIS submits that the Policy on Open Standards for e-Governance &lt;strong&gt;[6]&lt;/strong&gt; which establishes the guidelines for usage of open standards to ensure seamless interoperability, and the Implementation Guidelines of the National Data Sharing and Accessibility Policy, 2012 &lt;strong&gt;[7]&lt;/strong&gt; should be mentioned in the draft policy.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Source Software:&lt;/strong&gt; The Policy on Adoption of Open Source Software for Government of India states that the "&lt;em&gt;Government of India shall endeavour to adopt Open Source Software in all e-Governance systems implemented by various Government organizations, as a preferred option in comparison to Closed Source Software&lt;/em&gt; &lt;strong&gt;[8]&lt;/strong&gt;." As the draft policy proposed to guide the development of information systems to share open data is being developed and implemented both by the Government of Telangana and by other agencies (academic, commercial, and otherwise), it must include an explicit reference and embracing of  this mandate for adoption of Open Source Software, for reasons of reducing expenses, avoiding vendor lock-ins, re-usability of software components, enabling public accountability, and greater security of software systems.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation of Open APIs:&lt;/strong&gt; CIS observes that the draft policy refers to Standard compliant applications in Section 4. CIS suggests that final version of the policy refer to and operationalise the Policy on Open Application Programming Interfaces (APIs) for Government of India &lt;strong&gt;[9]&lt;/strong&gt;. This will ensure that the openly available data is available to the public, as well as  to all the government agencies, in a structured digital format that is easy to consume and use on one hand, and is available for various forms of value addition and innovation on the other. Refer to Official Secrets Act, 1923: The Official Secrets Act penalises a person if he/she "&lt;em&gt;obtains, collects, records or publishes or communicates to other person any secret official code or password, or any sketch, plan, model, article or note or other document or information which is calculated to be or might be or is intended to be, directly or indirectly, useful to an enemy for which relates to a matter the disclosure of which is likely to affect the sovereignty and integrity of India, the security of the State or friendly relations with foreign States&lt;/em&gt; &lt;strong&gt;[10]&lt;/strong&gt;." CIS submits that this Act should be referred to in this context of ensuring non-publication of the aforementioned data.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;3.10. Mandate a Participatory Process for Developing the Implementation Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.10.1.&lt;/strong&gt; We highly appreciate and welcome the fact that the draft policy emphasises rapid operationalisation of the policy by mandating that the ITE&amp;amp;C Department will prepare a detailed implementation guideline within 6 months of the notification of this policy, and all state government departments will publish at least 5 high value datasets within the next three months. Just as an addition to this mandate, we would like to propose that it can be suggested that the ITE&amp;amp;C Department undertakes a participatory process, with contributions from both government agencies and non-government actors, to develop this implementation guideline document. We believe that opening up government data in an effective and sustainable manner, for most government agencies, involves a systematic change in how the agency undertakes day-to-day data management practices. Hence, to develop productive and practical implementation guidelines, the ITE&amp;amp;C Department needs to gather insights from the other state government agencies regarding their existing data (and metadata) management practices &lt;strong&gt;[11]&lt;/strong&gt;. Further, participation of the non-government actors in this process is crucial to ensure that the implementation guidelines appropriately identify the high value data sets, that is data sets that should be published on a priority basis.&lt;/p&gt;
&lt;h3&gt;3.11. Defer the Decision about Roles of Data Owners, Generators, and Controllers&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.11.1.&lt;/strong&gt; As the draft policy does not specifically define the terms “Data Owners”, “Data Generators”, and “Data Controllers”, and the Section 11 only briefly describes some of the roles of these types of actors, we suggest removal of this discussion and the decision regarding the specific roles and functions of the Data Owners / Generators / Controllers from the draft policy itself. It will be perhaps more appropriate and effective to define these terms, as well as their roles and functions, in the implementation guidelines to be prepared by the ITE&amp;amp;C Department after the notification of the open data policy, since these terms relate directly to the final designing of the implementation process.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; CIS is grateful to the ITE&amp;amp;C Department for this opportunity to provide comments, and would be honoured to provide further assistance on the matter.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/" target="_blank"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://data.gov.in/sites/default/files/NDSAP.pdf" target="_blank"&gt;http://data.gov.in/sites/default/files/NDSAP.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://rti.gov.in/webactrti.htm" target="_blank"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf" target="_blank"&gt;http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See Section 2 (1) (i) of IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf" target="_blank"&gt;https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf" target="_blank"&gt;https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf" target="_blank"&gt;http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf&lt;/a&gt;, Sections 2 (2) and 3 (1) (c).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; A similar process was undertaken by the IT Department of the Government of Sikkim when developing the implementation guideline document. The ITE&amp;amp;C Department may consider discussing the matter with the said department to exchange relevant learnings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016'&gt;https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-09-01T05:49:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges">
    <title>Report on Understanding Aadhaar and its New Challenges</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges</link>
    <description>
        &lt;b&gt;The Trans-disciplinary Research Cluster on Sustainability Studies at Jawaharlal Nehru University collaborated with the Centre for Internet and Society, and other individuals and organisations to organise a two day workshop on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26 and 27, 2016. The objective of the workshop was to bring together experts from various fields, who have been rigorously following the developments in the Unique Identification (UID) Project and align their perspectives and develop a shared understanding of the status of the UID Project and its impact. Through this exercise, it was also sought to develop a plan of action to address the welfare exclusion issues that have arisen due to implementation of the UID Project.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Report: &lt;a href="https://cis-india.org/internet-governance/files/report-on-understanding-aadhaar-and-its-new-challenges/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;This Report is a compilation of the observations made by participants at the workshop relating to myriad issues under the UID Project and various strategies that could be pursued to address these issues. In this Report we have classified the observations and discussions into following themes:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.&lt;/strong&gt; &lt;a href="#1"&gt;Brief Background of the UID Project&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.&lt;/strong&gt; &lt;a href="#2"&gt;Legal Status of the UIDAI Project&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#21"&gt;Procedural issues with passage of the Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#22"&gt;Status of related litigation&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;3.&lt;/strong&gt; &lt;a href="#3"&gt;National Identity Projects in Other Jurisdictions&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#31"&gt;Pakistan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#32"&gt;United Kingdom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#33"&gt;Estonia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#34"&gt;France&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#35"&gt;Argentina&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;4.&lt;/strong&gt; &lt;a href="#4"&gt;Technologies of Identification and Authentication&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#41"&gt;Use of Biometric Information for Identification and Authentication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#42"&gt;Architectures of Identification&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#43"&gt;Security Infrastructure of CIDR&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;5.&lt;/strong&gt; &lt;a href="#5"&gt;Aadhaar for Welfare?&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#51"&gt;Social Welfare: Modes of Access and Exclusion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#52"&gt;Financial Inclusion and Direct Benefits Transfer&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;6.&lt;/strong&gt; &lt;a href="#6"&gt;Surveillance and UIDAI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7.&lt;/strong&gt; &lt;a href="#7"&gt;Strategies for Future Action&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Annexure A&lt;/strong&gt; &lt;a href="#AA"&gt;Workshop Agenda&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Annexure B&lt;/strong&gt; &lt;a href="#AB"&gt;Workshop Participants&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1" style="text-align: justify;"&gt;&lt;strong&gt;1. Brief Background of the UID Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In the year 2009, the UIDAI was established and the UID project was conceived by the Planning Commission under the UPA government to provide unique identification for each resident in India and to be used for delivery of welfare government services in an efficient and transparent manner, along with using it as a tool to monitor government schemes.&amp;nbsp; The objective of the scheme has been to issue a unique identification number by the Unique Identification Authority of India, which can be authenticated and verified online. It was conceptualized and implemented as a platform to facilitate identification and avoid fake identity issues and delivery of government benefits based on the demographic and biometric data available with the Authority.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (the “&lt;strong&gt;Act&lt;/strong&gt;”) was passed as a money bill on March 16, 2016 and was notified in the gazette March 25, 2016 upon receiving the assent of the President. However, the enforceability date has not been mentioned due to which the bill has not come into force.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Act provides that the Aadhaar number can be used to validate a person’s identity, but it cannot be used as a proof of citizenship. Also, the government can make it mandatory for a person to authenticate her/his identity using Aadhaar number before receiving any government subsidy, benefit, or service. At the time of enrolment, the enrolling agency is required to provide notice to the individual regarding how the information will be used, the type of entities the information will be shared with and their right to access their information. Consent of an individual would be obtained for using his/her identity information during enrolment as well as authentication, and would be informed of the nature of information that may be shared. The Act clearly lays that the identity information of a resident shall not be sued for any purpose other than specified at the time of authentication and disclosure of information can be made only pursuant to an order of a court not inferior to that of a District Judge and/or disclosure made in the interest of national security.&lt;/p&gt;
&lt;h3 id="2" style="text-align: justify;"&gt;&lt;strong&gt;2. Legal Status of the UIDAI Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In this section, we have summarised the discussions on the procedural issues with the passage of the Act. The participants had criticised the passage of the Act as a money bill in the Parliament. The participants also assessed the litigation pending in the Supreme Court of India that would be affected by this law. These discussions took place in the session titled, ‘Current Status of Aadhaar’ and have been summarised below.&lt;/p&gt;
&lt;h3 id="21" style="text-align: justify;"&gt;Procedural Issues with Passage of the Act&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants contested the introduction of the Act in the form of a money bill. The rationale behind this was explained at the session and is briefly explained here. Article 110 (1) of the Constitution of India defines a money bill as one containing provisions only regarding the matters enumerated or any matters incidental to the following: a) imposition, regulation and abolition of any tax, b) borrowing or other financial obligations of the Government of India, c) custody, withdrawal from or payment into the Consolidated Fund of India (CFI) or Contingent Fund of India, d) appropriation of money out of CFI, e) expenditure charged on the CFI or f) receipt or custody or audit of money into CFI or public account of India. The Act makes references to benefits, subsidies and services which are funded by the Consolidated Fund of India (CFI), however the main objectives of the Act is to create a right to obtain a unique identification number and provide for a statutory mechanism to regulate this process. The Act only establishes an identification mechanism which facilitates distribution of benefits and subsidies funded by the CFI and this identification mechanism (Aadhaar number) does not give it the character of a money bill. Further, money bills can be introduced only in the Lok Sabha, and the Rajya Sabha cannot make amendments to such bills passed by the Lok Sabha. The Rajya Sabha can suggest amendments, but it is the Lok Sabha’s choice to accept or reject them. This leaves the Rajya Sabha with no effective role to play in the passage of the bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants also briefly examined the writ petition that has been filed by former Union minister Jairam Ramesh challenging the constitutionality and legality of the treatment of this Act as a money bill which has raised the question of judiciary’s power to review the decisions of the speaker. Article 122 of the Constitution of India provides that this power of judicial review can be exercised to look into procedural irregularities. The question remains whether the Supreme Court will rule that it can determine the constitutionality of the decision made by the speaker relating to the manner in which the Act was introduced in the Lok Sabha. A few participants mentioned that similar circumstances had arisen in the case of Mohd. Saeed Siddiqui v. State of U.P. &lt;a href="#ftn1"&gt;[1]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;where the Supreme Court refused to interfere with the decision of the Uttar Pradesh legislative assembly speaker certifying an amendment bill to increase the tenure of the Lokayukta as a money bill, despite the fact that the bill amended the Uttar Pradesh Lokayukta and Up-Lokayuktas Act, 1975, which was passed as an ordinary bill by both houses. The Court in this case held that the decision of the speaker was final and that the proceedings of the legislature being important legislative privilege could not be inquired into by courts. The Court added, “the question whether a bill is a money bill or not can be raised only in the state legislative assembly by a member thereof when the bill is pending in the state legislature and before it becomes an Act.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, it is necessary to carve a distinction between Rajya Sabha and State Legislature. Unlike the State Legislature, constitution of Rajya Sabha is not optional therefore significance of the two bodies in the parliamentary process cannot be considered the same. Participants also made another significant observation about a similar bill on the UID project (National Identification Authority of India (NIDAI) Bill) that was introduced before by the UPA government in 2010 and was deemed unacceptable by the standing committee on finance, headed by Yashwant Sinha. This bill was subsequently withdrawn.&lt;/p&gt;
&lt;h3 id="22" style="text-align: justify;"&gt;Status of Related Litigation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A panellist in this session briefly summarised all the litigation that was related to or would be affected by the Act. The panellist also highlighted several Supreme Court orders in the case of &lt;em&gt;KS Puttuswamy v. Union of India&lt;/em&gt; &lt;a href="#ftn2"&gt;[2]&lt;/a&gt; which limited the use of Aadhaar. We have reproduced the presentation below.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;KS Puttuswamy v. Union of India&lt;/em&gt; - This petition was filed in 2012 with primary concern about providing Aadhaar numbers to illegal immigrants in India. It was contended that this could not be done without a law establishing the UIDAI and amendment to the Citizenship laws. The petitioner raised concerns about privacy and fallibility of biometrics.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Sudhir Vombatkere &amp;amp; Bezwada Wilson &lt;a href="#ftn3"&gt;[3]&lt;/a&gt; - This petition was filed in 2013 on grounds of infringement of right to privacy guaranteed under Article 21 of the Constitution of India and the security threat on account of data convergence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Aruna Roy &amp;amp; Nikhil Dey &lt;a href="#ftn4"&gt;[4]&lt;/a&gt; - This petition was filed in 2013 on the grounds of large scale exclusion of people from access to basic welfare services caused by UID. After their petition, no. of intervention applications were filed. These were the following:&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Col. Mathew Thomas &lt;a href="#ftn5"&gt;[5]&lt;/a&gt; - This petition was filed on the grounds of threat to national security posed by the UID project particularly in relation to arrangements for data sharing with foreign companies (with links to foreign intelligence agencies).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Nagrik Chetna Manch &lt;a href="#ftn6"&gt;[6]&lt;/a&gt; - This petition was filed in 2013 and led by Dr. Anupam Saraph on the grounds that the UID project was detrimental to financial service regulation and financial &lt;em&gt;inclusion.&lt;/em&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;S. Raju &lt;a href="#ftn7"&gt;[7] &lt;/a&gt; - This petition was filed on the grounds that the UID project had implications on the federal structure of the State and was detrimental to financial inclusion.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Beghar Foundation&lt;/em&gt; - This petition was filed in 2013 in the Delhi High Court on the grounds invasion of privacy and exclusion specifically in relation to the homeless. It subsequently joined the petition filed by Aruna Roy and Nikhil Dey as an intervener.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Vickram Crishna – This petition was originally filed in the Bombay High Court in 2013 on the grounds of surveillance and invasion of privacy. It was later transferred to the Supreme Court.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Somasekhar – This petition was filed on the grounds of procedural unreasonableness of the UID project and also exclusion &amp;amp; privacy. The petitioner later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rajeev Chandrashekhar– This petition was filed on the ground of lack of legal sanction for the UID project. He later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013. His position has changed now.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Further, a petition was filed by Mr. Jairam Ramesh initially challenging the passage of the Act as a money bill but subsequently, it has been amended to include issues of violation of right to privacy and exclusion of the poor and has advocated for five amendments that were suggested to the Aadhaar Bill by the Rajya Sabha.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="23" style="text-align: justify;"&gt;Relevant Orders of the Supreme Court&lt;/h3&gt;
&lt;p&gt;There are six orders of the Supreme Court which are noteworthy.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Order of Sept. 23, 2013 - The Supreme court directed that: 1) no person shall suffer for not having an aadhaar number despite the fact that a circular by an authority makes it mandatory; 2) it should be checked if a person applying for aadhaar number voluntarily is entitled to it under the law; and 3) precaution should be taken that it is not be issued to illegal immigrants.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 26th November, 2013 – Applications were filed by UIDAI, Ministry of Petroleum &amp;amp; Natural Gas, Govt of India, Indian Oil Corporation, BPCL and HPCL for modifying the September 23rd order and sought permission from the Supreme Court to make aadhaar number mandatory. The Supreme Court held that the order of September 23rd would continue to be effective.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 24th March, 2014 – This order was passed by the Supreme Court in a special leave petition filed in the case of &lt;em&gt;UIDAI v CBI&lt;/em&gt; &lt;a href="#ftn8"&gt;[8] &lt;/a&gt; wherein UIDAI was asked to UIDAI to share biometric information of all residents of a particular place in Goa to facilitate a criminal investigation involving charges of rape and sexual assault. The Supreme Court restrained UIDAI from transferring any biometric information of an individual without to any other agency without his consent in writing. The Supreme Court also directed all the authorities to modify their forms/circulars/likes so as to not make aadhaar number mandatory.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 16th March, 2015 - The SC took notice of widespread violations of the order passed on September 23rd, 2013 and directed the Centre and the states to adhere to these orders to not make aadhaar compulsory.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Orders of August 11, 2015 – In the first order, the Central Government was directed to publicise the fact that aadhaar was voluntary. The Supreme Court further held that provision of benefits due to a citizen of India would not be made conditional upon obtaining an aadhaar number and restricted the use of aadhaar to the PDS Scheme and in particular for the purpose of distribution of foodgrains, etc. and cooking fuel, such as kerosene and&amp;nbsp; the LPG Distribution Scheme. The Supreme Court also held that information of an individual that was collected in order to issue an aadhaar number would not be used for any purpose except when directed by the Court for criminal investigations. Separately, the status of fundamental right to privacy was contested and accordingly the Supreme Court directed that the issue be taken up before the Chief Justice of India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Orders of October 16, 2015 – The Union of India, the states of Gujarat, Maharashtra, Himachal Pradesh and Rajasthan, and authorities including SEBI, TRAI,&amp;nbsp; CBDT, IRDA , RBI applied for a hearing before the Constitution Bench for modification of&amp;nbsp; the order passed by the Supreme Court on August 11 and allow use of aadhaar number schemes like The Mahatma Gandhi National Rural Employment Guarantee Scheme MGNREGS), National Social Assistance Programme (Old Age Pensions, Widow Pensions, Disability Pensions) Prime Minister's Jan Dhan Yojana (PMJDY) and Employees' Providend Fund Organisation (EPFO). The Bench allowed the use of aadhaar number for these schemes but stressed upon the need to keep aadhaar scheme voluntary until the matter was finally decided.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Status of these orders&lt;br /&gt;The participants discussed the possible impact of the law on the operation of these orders. A participant pointed out that matters in the Supreme Court had not become infructuous because fundamental issues that were being heard in the Supreme Court had not been resolved by the passage of the Act. Several participants believed that the aforementioned orders were effective because the law had not come into force. Therefore, aadhaar number could only be used for purposes specified by the Supreme Court and it could not be made mandatory.&amp;nbsp; Participants also highlighted that when the Act was implemented, it would not nullify the orders of the Supreme Court unless Union of India asked the Supreme Court for it specifically and the Supreme Court sanctioned that.&lt;/p&gt;
&lt;h3 id="3" style="text-align: justify;"&gt;&lt;strong&gt;3. National Identity Projects in Other Jurisdictions&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A panellist had provided a brief overview of similar programs on identification that have been launched in other jurisdictions including Pakistan, United Kingdom, France, Estonia and Argentina in the recent past in the session titled ‘Aadhaar - International Dimensions’. This presentation mainly sought to assess the incentives that drove the governments in these jurisdictions to formulate these projects, mandatory nature of their adoption and their popularity. The Report has reproduced the presentation here.&lt;/p&gt;
&lt;h3 id="31" style="text-align: justify;"&gt;Pakistan&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Second Amendment to the Constitution of Pakistan in 2000 established the National Database and Regulation Authority in the country, which regulates government databases and statistically manages the sensitive registration database of the citizens of Pakistan. It is also responsible for issuing national identity cards to the citizens of Pakistan. Although the card is not legally compulsory for a Pakistani citizen, it is mandatory for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Voting&lt;/li&gt;
&lt;li&gt;Obtaining a passport&lt;/li&gt;
&lt;li&gt;Purchasing vehicles and land&lt;/li&gt;
&lt;li&gt;Obtaining a driver licence&lt;/li&gt;
&lt;li&gt;Purchasing a plane or train ticket&lt;/li&gt;
&lt;li&gt;Obtaining a mobile phone SIM card&lt;/li&gt;
&lt;li&gt;Obtaining electricity, gas, and water&lt;/li&gt;
&lt;li&gt;Securing admission to college and other post-graduate institutes&lt;/li&gt;
&lt;li&gt;Conducting major financial transactions&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Therefore, it is pretty much necessary for basic civic life in the country. In 2012, NADRA introduced the Smart National Identity Card, an electronic identity card, which implements 36 security features. The following information can be found on the card and subsequently the central database: Legal Name, Gender (male, female, or transgender), Father's name (Husband's name for married females), Identification Mark, Date of Birth, National Identity Card Number, Family Tree ID Number, Current Address, Permanent Address, Date of Issue, Date of Expiry, Signature, Photo, and Fingerprint (Thumbprint). NADRA also records the applicant's religion, but this is not noted on the card itself. (This system has not been removed yet and is still operational in Pakistan.)&lt;/p&gt;
&lt;h3 id="32" style="text-align: justify;"&gt;United Kingdom&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Identity Cards Act was introduced in the wake of the terrorist attacks on 11th September, 2001, amidst rising concerns about identity theft and the misuse of public services. The card was to be used to obtain social security services, but the ability to properly identify a person to their true identity was central to the proposal, with wider implications for prevention of crime and terrorism. The cards were linked to a central database (the National Identity Register), which would store information about all of the holders of the cards. The concerns raised by human rights lawyers, activists, security professionals and IT experts, as well as politicians were not to do with the cards as much as with the NIR. The Act specified 50 categories of information that the NIR could hold, including up to 10 fingerprints, digitised facial scan and iris scan, current and past UK and overseas places of residence of all residents of the UK throughout their lives. The central database was purported to be a prime target for cyber attacks, and was also said to be a violation of the right to privacy of UK citizens. The Act was passed by the Labour Government in 2006, and repealed by the Conservative-Liberal Democrat Coalition Government as part of their measures to “reverse the substantial erosion of civil liberties under the Labour Government and roll back state intrusion.”&lt;/p&gt;
&lt;h3 id="33" style="text-align: justify;"&gt;Estonia&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Estonian i-card is a smart card issued to Estonian citizens by the Police and Border Guard Board. All Estonian citizens and permanent residents are legally obliged to possess this card from the age of 15. The card stores data such as the user's full name, gender, national identification number, and cryptographic keys and public key certificates. The cryptographic signature in the card is legally equivalent to a manual signature, since 15 December 2000. The following are a few examples of what the card is used for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;As a national ID card for legal travel within the EU for Estonian citizens&lt;/li&gt;
&lt;li&gt;As the national health insurance card&lt;/li&gt;
&lt;li&gt;As proof of identification when logging into bank accounts from a home computer&lt;/li&gt;
&lt;li&gt;For digital signatures&lt;/li&gt;
&lt;li&gt;For i-voting&lt;/li&gt;
&lt;li&gt;For accessing government databases to check one’s medical records, file taxes, etc.&lt;/li&gt;
&lt;li&gt;For picking up e-Prescriptions&lt;/li&gt;
&lt;li&gt;(This system is also operational in the country and has not been removed)&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="34" style="text-align: justify;"&gt;France&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The biometric ID card was to include a compulsory chip containing personal information, such as fingerprints, a photograph, home address, height, and eye colour. A second, optional chip was to be implemented for online authentication and electronic signatures, to be used for e-government services and e-commerce. The law was passed with the purpose of combating “identity fraud”. It was referred to the Constitutional Council by more than 200 members of the French Parliament, who challenged the compatibility of the bill with the citizens’ fundamental rights, including the right to privacy and the presumption of innocence. The Council struck down the law, citing the issue of proportionality. “Regarding the nature of the recorded data, the range of the treatment, the technical characteristics and conditions of the consultation, the provisions of article 5 touch the right to privacy in a way that cannot be considered as proportional to the meant purpose”.&lt;/p&gt;
&lt;h3 id="35" style="text-align: justify;"&gt;Argentina&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Documento Nacional de Identidad or DNI (which means National Identity Document) is the main identity document for Argentine citizens, as well as temporary or permanent resident aliens. It is issued at a person's birth, and updated at 8 and 14 years of age simultaneously in one format: a card (DNI tarjeta); it's valid if identification is required, and is required for voting. The front side of the card states the name, sex, nationality, specimen issue, date of birth, date of issue, date of expiry, and transaction number along with the DNI number and portrait and signature of the card's bearer. The back side of the card shows the address of the card's bearer along with their right thumb fingerprint. The front side of the DNI also shows a barcode while the back shows machine-readable information. The DNI is a valid travel document for entering Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Paraguay, Peru, Uruguay, and Venezuela. (System still operational in the country)&lt;/p&gt;
&lt;h3 id="4" style="text-align: justify;"&gt;&lt;strong&gt;4. Technologies of Identification and Authentication&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panel in the session titled ‘Aadhaar: Science, Technology, and Security’ explained the technical aspects of use of biometrics and privacy concerns, technology architecture for identification and inadequacy of infrastructure for information security. In this section, we have summarised the presentation and the ensuing discussions on these issues.&lt;/p&gt;
&lt;h3 id="41" style="text-align: justify;"&gt;Use of Biometric Information for Identification and Authentication&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists explained with examples that identification and authentication were different things. Identity provides an answer to the question “who are you?” while authentication is a challenge-response process that provides a proof of the claim of identity. Common examples of identity are User ID (Login ID), cryptographic public keys and ATM or Smart cards while common authenticators are passwords (including OTPs), PINs and cryptographic private keys. Identity is public information but an authenticator must be private and known only to the user. Authentication must necessarily be a conscious process and active participation by the user is a must. It should also always be possible to revoke an authenticator. After providing this understanding of the two processes the panellist then explained if biometric information could be used for identification or authentication under the UID Project. Biometric information is clearly public information and it is questionable if it can be revoked. Therefore it should never be used for authentication, but only for identity verification. There is a possibility of authentication by fingerprints under the UID Project, without conscious participation of the user. One could trace the fingerprints of an individual from any place the individual has been in contact with. Therefore, authentication must certainly be done by other means. The panellist pointed out that there were five kinds of authentication under the UID Project, out of which two-factor authentication and one time password were considered suitable but use of biometric information and demographic information was extremely threatening and must be withdrawn.&lt;/p&gt;
&lt;h3 id="42" style="text-align: justify;"&gt;Architectures of Identification&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists explained the architecture of the UID Project that has been designed for identification purposes, highlighted its limitations and suggested alternatives. His explanations are reproduced below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Under the UID Project, there is a centralised means of identification i.e. the aadhaar number and biometric information stored in one place, Central Identification Data Repository (CIDR). It is better to have multiple means of identification than one (as contemplated under the UID Project) for preservation of our civil liberties. The question is what the available alternatives are. Web of trust is a way for operationalizing distributed identification but the challenge is how one brings people from all social levels to participate in it. There is a need for registrars who will sign keys and public databases for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The aadhaar number functions as a common index and facilitates correlation of data across Government databases. While this is tremendously attractive it raises several privacy concerns as more and more information relating to an individual is available to others and is likely to be abused.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The aadhaar number is available in human readable form. This raises the risk of identification without consent and unauthorised profiling. It cannot be revoked. Potential for damage in case of identity theft increases manifold.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Under the UID Project, for the purpose of information security, Authentication User Agencies (“&lt;strong&gt;AUA&lt;/strong&gt;”) are required to use local identifiers instead of aadhaar numbers but they are also required to map these local identifiers to the aadhaar numbers. Aadhaar numbers are not cryptographically secured; in fact they are publicly available. Hence this exercise for securing information is useless. An alternative would be to issue different identifiers for different domains and cryptographically embed a “master identifier” (in this case, equivalent of aadhaar number) into each local identifier.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;All field devices (for example POS machines) should be registered and must communicate directly with UIDAI. In fact, UIDAI must verify the authenticity (tamper proof) of the field device during run time and a UIDAI approved authenticity certificate must be issued for field devices. This certificate must be made available to users on demand. Further, the security and privacy frameworks within which AUAs work must be appropriately defined by legal and technical means.&lt;/p&gt;
&lt;h3 id="43" style="text-align: justify;"&gt;Security Infrastructure of CIDR&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists also enumerated the security features of the UID Project and highlighted the flaws in these features. These have been summarised below.&lt;/p&gt;
&lt;p&gt;The security and privacy infrastructure of UIDAI has the following main features:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;2048 bit PKI encryption of biometric data in transit&lt;/li&gt;
&lt;li&gt;End-to-end encryption from enrolment/POS to CIDR&lt;/li&gt;
&lt;li&gt;HMAC based tamper detection of PID blocks&lt;/li&gt;
&lt;li&gt;Registration and authentication of AUAs&lt;/li&gt;
&lt;li&gt;Within CIDR only a SHA 1 Hash of Aadhaar number is stored&lt;/li&gt;
&lt;li&gt;Audit trails are stored SHA 1 encrypted. Tamper detection?&lt;/li&gt;
&lt;li&gt;Only hashes of passwords and PINs are stored. (biometric data stored in original form though!)&lt;/li&gt;
&lt;li&gt;Authentication requests have unique session keys and HMAC&lt;/li&gt;
&lt;li&gt;Resident data stored using 100 way sharding (vertical partitioning). First two digits of Aadhaar number as shard keys&lt;/li&gt;
&lt;li&gt;All enrolment and update requests link to partitioned databases using Ref IDs (coded indices)&lt;/li&gt;
&lt;li&gt;All accesses through a hardware security module&lt;/li&gt;
&lt;li&gt;All analytics carried out on anonymised data&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;The panellists pointed out the concerns about information security on account of design flaws, lack of procedural safeguards, openness of the system and too much trust imposed on multiple players. All symmetric and private keys and hashes are stored somewhere within UIDAI.&amp;nbsp; This indicates that trust is implicitly assumed which is a glaring design flaw.&amp;nbsp; There is no well-defined approval procedure for data inspection, whether it is for the purpose of investigation or for data analytics. There is a likelihood of system hacks, insider leaks, and tampering of authentication records and audit trails. The ensuing discussions highlighted that the UIDAI had admitted to these security risks. The enrolment agencies and the enrolment devices cannot be trusted. AUAs cannot be trusted with biometric and demographic data; neither can they be trusted with sensitive user data of private nature. There is a need for an independent third party auditor for distributed key management, auditing and approving UIDAI programs, including those for data inspection and analytics, whitebox cryptographic compilation of critical parts of the UIDAI programs, issue of cryptographic keys to UIDAI programs for functional encryption, challenge-response for run-time authentication and certification of UIDAI programs. The panellist recommended that there was a need to to put a suitable legal framework to execute this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants also discussed that information infrastructure must not be made of proprietary software (possibility for backdoors for US) and there must be a third party audit with a non-negotiable clause for public audit.&lt;/p&gt;
&lt;h3 id="5" style="text-align: justify;"&gt;&lt;strong&gt;5. Aadhaar for Welfare?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Report has summarised the discussions that took place in the sessions on ‘Direct Benefits Transfers’ and ‘Aadhaar: Broad Issues - II’ where the panellists critically analysed the claims of benefits and inclusion of Aadhaar made by the government in light of the ground realities in states where Aadhaar has been adopted for social welfare schemes.&lt;/p&gt;
&lt;h3 id="51" style="text-align: justify;"&gt;Social Welfare: Modes of Access and Exclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Under the Act, a person may be required to authenticate or give proof of the aadhaar number in order to receive subsidy from the government (Section 7). A person is required to punch their fingerprints on POS machines in order to receive their entitlement under the social welfare schemes such as LPG and PDS. It was pointed out in the discussions that various states including Rajasthan and Delhi had witnessed fingerprint errors while doling out benefits at ration shops under the PDS scheme. People have failed to receive their entitled benefits because of these fingerprint errors thus resulting in exclusion of beneficiaries &lt;a href="#ftn9"&gt;[9]&lt;/a&gt;. A panellist pointed out that in Rajasthan, dysfunctional biometrics had led to further corruption in ration shops. Ration shop owners often lied to the beneficiaries about functioning of the biometric machines (POS Machines) and kept the ration for sale in the market therefore making a lot of money at the expense of uninformed beneficiaries and depriving them of their entitlements.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another participant organisation also pointed out similar circumstances in the ration shops in Patparganj and New Delhi constituencies. Here, the dealers had maintained the records of beneficiaries who had been categorized as follows: beneficiaries whose biometrics did not match, beneficiaries whose biometrics matched and entitlements were provided, beneficiaries who never visited the ration shop. It had been observed that there were no entries in the category of beneficiaries whose biometrics did not match however, the beneficiaries had a different story to tell. They complained that their biometrics did not match despite trying several times and there was no mechanism for a manual override. Consequently, they had not been able to receive any entitlements for months. The discussions also pointed out that the food authorities had placed complete reliance on authenticity of the POS machines and claim that this system would weed out families who were not entitled to the benefits. The MIS was also running technical glitches as a result there was a problem with registering information about these transactions hence, no records had been created with the State authority about these problems. A participant also discussed the plight of 30,000 widows in Delhi, who were entitled to pension and used to collect their entitlement from post offices, faced exclusion due to transition problems under the Jan Dhan Yojana (after the Jandhan was launched the money was transferred to their bank accounts in order to resolve the problem of misappropriation of money at the hands of post office officials). These widows were asked to open bank accounts to receive their entitlements and those who did not open these accounts and did not inform the post office were considered bogus.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the discussions, the participants also noted that this unreliability of fingerprints as a means of authentication of an individual’s identity was highlighted at the meeting of Empowered Group of Ministers in 2011 by J Dsouza, a biometrics scientist. He used his wife’s fingerprints to demonstrate that fingerprints may change overtime and in such an event, one would not be able to use the POS machine anymore as the machine would continue to identify the impressions collected initially.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants who had been working in the field had contributed to the discussions by busting the myth that the UID Project helped to identify who was poor and resolve the problem of exclusion due to leakages in the social welfare programs. These discussions have been summarised below.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;It is important to understand that the UID Project is merely an identification and authentication system. It only helps in verifying if an individual is entitled to benefits under a social security scheme. It does not ensure plugging of leakages and reducing corruption in social security schemes as has been claimed by the Government. The reduction in leakage of PDS, for instance, should be attributed to digitization and not UID. The Government claims, that it has saved INR 15000 crore in provision of LPG on identification of 3.34 crore inactive accounts on account of the UID Project. This is untrue because the accounts were weeded by using mechanisms completely unrelated to the UID Project. Consequently, the savings on account of UID are only of INR 120 crore and not 15000 crore.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The UID Project has resulted in exclusion of people either because they do not have an aadhaar number, or they have a wrong identification, or there are errors of classification or wilful misclassification. About 99.7% people who were given aadhaar numbers already had an identification document. In fact, during enrolment a person is required to produce one of 14 identification documents listed under the law in order to get an aadhaar number which makes it very difficult for a person with no identity to become entitled to a social welfare scheme.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;A participant condemned the Government’s claim that the UID Project had helped in removing fake, bogus and duplicate cards and said that these terms could not be used synonymously and the authorities had no clarity about the difference between the meanings of these terms. The UID Project had only helped in removal of duplicate cards but had not helped in combating the use of fake and bogus cards.&lt;/p&gt;
&lt;h3 id="52" style="text-align: justify;"&gt;Financial Inclusion and Direct Benefits Transfer&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants also engaged in the discussions about the impact of the UID project on financial inclusion in India in the sessions titled ‘Aadhaar: Broad Issues - I &amp;amp; II’. We have summarised these discussions below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UID Project seeks to directly transfer money to a bank account in order to combat corruption. The discussions highlighted that this was nothing but introducing a neo liberal thrust in social policy and that it was not feasible for various reasons. First, 95% of rural India did not have functioning banks and banks are quite far away. Second, in order to combat this dearth of banks the idea of business correspondents, who handled banking transactions and helped in opening of bank accounts, had been introduced which had created various problems. The Reserve Bank of India reported that there was dearth of business correspondents as there was very little incentive to become one; their salary is merely INR 4000. Third, there were concerns about how an aadhaar number was considered a valid document for Know Your Customer (KYC) checks. There was a requirement for scrutiny and auditing of documents submitted during the time of enrolment which, in the present scheme of things, could not be verified. Fourth, there were no restrictions on number of bank accounts that could be opened with a single aadhaar number which gave rise to a possibility of opening multiple and shell accounts on a single aadhaar number. Therefore, records only showed transactions when money was transferred from an aadhaar number to another aadhaar number as opposed to an account-to-account transfer. The discussion relied on NPCI data which shows which bank an aadhaar number is associated with but does not show if a transaction by an aadhaar number is overwritten by another bank account belonging to the same aadhaar number.&lt;/p&gt;
&lt;h3 id="6" style="text-align: justify;"&gt;&lt;strong&gt;6. Surveillance and UIDAI&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants had discussed the possibility of an alternative purpose for enrolling Aadhaar in the session titled ‘Privacy, Surveillance, and Ethical Dimensions of Aadhaar’. The discussion traced the history of this project to gain insight on this issue. We have summarised below the key take aways from this discussion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There are claims that the main objective of launching the UID Project is not to facilitate implementation of social security schemes but to collect personal (financial and non-financial) information of the citizens and residents of the country to build a data monopoly. For this purpose, PDS was chosen as a suitable social security scheme as it has the largest coverage. Several participants suggested that numerous reports authored by FICCI, KPMG and ASSOCHAM contained proposals for establishing a national identity authority which threw some light on the commercial intentions behind information collection under the UID Project.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was also pointed out that there was documented proof that information collected under the UID Project might have been shared with foreign companies. There are suggestions about links established between proponents of the UID Project and companies backed by CIA or the French Government which run security projects and deal in data sharing in several jurisdictions.&lt;/p&gt;
&lt;h3 id="7" style="text-align: justify;"&gt;&lt;strong&gt;7. Strategies for Future Action&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The participants laid down a list of measures that must be taken to take the discussions forward. We have enumerated these recommendations below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Prepare and compile an anthology of articles as an output of this workshop. &lt;/li&gt;
&lt;li&gt;Prepare position papers on specific issues related to the UID Project &lt;/li&gt;
&lt;li&gt;Prepare pamphlets/brochures on issues with the UID Project for public consumption &lt;/li&gt;
&lt;li&gt;Prepare counter-advertisements for Aadhaar&lt;/li&gt;
&lt;li&gt;Publish existing empirical evidence on the flaws in Aadhaar.&lt;/li&gt;
&lt;li&gt;Set up an online portal dedicated to providing updates on the UID Project and allows discussions on specific issues related to Aadhaar.&lt;/li&gt;
&lt;li&gt;Use Social Media to reach out to the public. Regularly track and comment on social media pages of relevant departments of the government.&lt;/li&gt;
&lt;li&gt;Create groups dedicated to research and advocacy of specific aspects of the UID Project. &lt;/li&gt;
&lt;li&gt;Create a Coordination Committee preferably based in Delhi which would be responsible for regularly holding meetings and for preparing a coordinated plan of action. Employ permanent to staff to run the Committee.&lt;/li&gt;
&lt;li&gt;Organise an advocacy campaign against use of Aadhaar in collaboration with other organisations and build public domain acceptance. &lt;/li&gt;
&lt;li&gt;The campaign must specifically focus on the unfettered scope of UID and expanse, misrepresentation of the success of Aadhaar by highlighting real savings, technological flaws, status of pilot programs and increasing corruption on account of the UID Project&lt;/li&gt;
&lt;li&gt;Prepare a statement of public concern regarding the UID Project and collect signatures from eminent persons including academics, technical experts, civil society groups and members of parliament.&lt;/li&gt;
&lt;li&gt;Organise events and discussions on issues relating to Aadhaar and invite members og government departments to speak and discuss the issues. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Write to Members of Parliament and Members of Legislative Assemblies raising questions on their or their parties’ support for Aadhaar and silence on the problems created by the UID Project. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Organise public hearings in states like Rajasthan to observe and document ground realities of the UID Project and share these outcomes with the state government and media. &lt;/li&gt;
&lt;li&gt;Plan a national social audit and public hearing on the working of UID Project in the country. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;File Contempt Petitions in the Supreme Court and High Courts against mandatory use of Aadhaar number for services not allowed by the Supreme Court. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reach out to and engage with various foreign citizens and organisations that have been fighting on similar issues. The organisations and individuals who could be approached would include EPIC, Electronic Frontier foundation, David Moss, UK, Roger Clarke, Australia, Prof. Ian Angel, Snowden, Assange and Chomsky.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Work towards increasing awareness about the UID Project and gaining support from the student and research community, student organisations, trade unions, and other associations and networks in the unorganised sector.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="AA" style="text-align: justify;"&gt;&lt;strong&gt;Annexure A – Workshop Agenda&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;May 26, 2016&lt;/h4&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:00-9:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:30-10:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt; 
&lt;em&gt;Self-introduction and expectations of participants&lt;/em&gt;&lt;br /&gt;
Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10:00-11:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 1: Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;
Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;
S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt; &lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:00-11:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:30-13:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 2: Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;
Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a   Bicycle&lt;/em&gt;&lt;br /&gt;
Prof. R. Ramakumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical   analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;
Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13:30-14:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14:30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 3: Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;
Prof. Subashis Banerjee, Dept of Computer Science &amp;amp; Engineering, IIT,   Delhi - &lt;em&gt;Privacy and Security   Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;
Pukhraj Singh, Former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and   Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:00-16:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:30-17:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 4: Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt; 
Joshita Pai, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in Other Parts of the World&lt;/em&gt;&lt;br /&gt;
Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;17:30-18:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4&gt;May 27, 2016&lt;/h4&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:30-11:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 5: Privacy, Surveillance and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;
Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;
Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;
Col Mathew Thomas, Bengaluru - &lt;em&gt;The Deceit of Aadhaar&lt;em&gt;&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:00-11:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;11:30-13:00&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 6: Aadhaar - Broad Issues I&lt;/strong&gt;&lt;br /&gt;
Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;
Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13:00-14:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14:00-15:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 7: Aadhaar - Broad Issues II&lt;/strong&gt;&lt;br /&gt;
Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;
Nikhil Dey, MKSS, Rajasthan - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;
Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15:30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 8: Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:00-18:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Informal Meetings&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="AB" style="text-align: justify;"&gt;&lt;strong&gt;Annexure B – Workshop Participants&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Anjali Bhardwaj, Satark Nagrik Sangathan&lt;/p&gt;
&lt;p&gt;Dr. Anupam Saraph&lt;/p&gt;
&lt;p&gt;Arjun Jayakumar, Software Freedom Law Centre&lt;/p&gt;
&lt;p&gt;Ashok Rao, Delhi Science Forum&lt;/p&gt;
&lt;p&gt;Prof. Chinmayi Arun, National Law University, Delhi&lt;/p&gt;
&lt;p&gt;Prof. Dinesh Abrol, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai&lt;/p&gt;
&lt;p&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties&lt;/p&gt;
&lt;p&gt;Prof. Himanshu, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Japreet Grewal, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Joshita Pai, National Law University, Delhi&lt;/p&gt;
&lt;p&gt;Malini Chakravarty, Centre for Budget and Governance Accountability&lt;/p&gt;
&lt;p&gt;Col. Mathew Thomas&lt;/p&gt;
&lt;p&gt;Prof. MS Sriram, Indian Institute of Management, Bangalore&lt;/p&gt;
&lt;p&gt;Nikhil Dey, Mazdoor Kisan Shakti Sangathan&lt;/p&gt;
&lt;p&gt;Prabir Purkayastha, Knowledge Commons and Free Software Movement of India&lt;/p&gt;
&lt;p&gt;Pukhraj Singh, Bhujang&lt;/p&gt;
&lt;p&gt;Rajiv Mishra, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. R Ramakumar, Tata Institute of Social Sciences, Mumbai&lt;/p&gt;
&lt;p&gt;Dr. Reetika Khera, Indian Institute of Technology, Delhi&lt;/p&gt;
&lt;p&gt;Dr. Ritajyoti Bandyopadhyay, Indian Institute of Science Education and Research, Mohali&lt;/p&gt;
&lt;p&gt;S. Prasanna, Advocate&lt;/p&gt;
&lt;p&gt;Sanjay Kumar, Science Journalist&lt;/p&gt;
&lt;p&gt;Sharath, Software Freedom Law Centre&lt;/p&gt;
&lt;p&gt;Shivangi Narayan, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. Subhashis Banerjee, Indian Institute of Technology, Delhi&lt;/p&gt;
&lt;p&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Dr. Usha Ramanathan, Legal Researcher&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Note: This list is only indicative, and not exhaustive.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="ftn1"&gt;&lt;strong&gt;[1]&lt;/strong&gt;&lt;/a&gt; Civil Appeal No. 4853 of 2014&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn2"&gt;&lt;strong&gt;[2]&lt;/strong&gt;&lt;/a&gt; WP(C) 494/2012&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn3"&gt;&lt;strong&gt;[3]&lt;/strong&gt; &lt;/a&gt;. WP(C) 829/2013&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn4"&gt;&lt;strong&gt;[4]&lt;/strong&gt;&lt;/a&gt; WP(C) 833/2013&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn5"&gt;&lt;strong&gt;[5]&lt;/strong&gt;&lt;/a&gt; WP (C) 37/2015; (Earlier intervened in the Aruna Roy petition in 2013)&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn6"&gt;&lt;strong&gt;[6]&lt;/strong&gt;&lt;/a&gt; WP (C) 932/2015&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn7"&gt;&lt;strong&gt;[7]&lt;/strong&gt;&lt;/a&gt; Transferred from Madras HC 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn8"&gt;&lt;strong&gt;[8]&lt;/strong&gt;&lt;/a&gt; SLP (Crl) 2524/2014 filed against the order of the Goa Bench of the Bombay HC in CRLWP 10/2014 wherein the High Court had directed UIDAI to share biometric information held by them of all residents of a particular place in Goa to help with a criminal investigation in a case involving charges of rape and sexual assault.&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn9"&gt;&lt;strong&gt;[9]&lt;/strong&gt;&lt;/a&gt; See :http://scroll.in/article/806243/rajasthan-presses-on-with-aadhaar-after-fingerprint-readers-fail-well-buy-iris-scanners&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges'&gt;https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal, Vanya Rakesh, Sumandro Chattapadhyay, and Elonnai Hickock</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2019-03-16T04:42:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/3-copyright-tips-for-students-and-educators">
    <title>3 Copyright Tips for Students and Educators</title>
    <link>https://cis-india.org/a2k/blogs/3-copyright-tips-for-students-and-educators</link>
    <description>
        &lt;b&gt;Copyright is a really complicated topic, and when it comes to online use of creative works, accidentally crossing the line between fair use and a copyright violation is easy. How do you know what is copyrighted? Recently Frederico Morando (Creative Commons, Italy) and I presented a training session on understanding copyright policies at Wikimania 2016, which was originally proposed by Wikipedian User:Jim Carter. We covered topics such as fundamentals of copyright, exclusive rights, Berne convention, copyleft, Creative Commons licenses, Public Domain, fair use, and copyfraud.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was &lt;a class="external-link" href="https://opensource.com/education/16/8/3-copyright-tips-students-and-educators"&gt;published by Opensource.com&lt;/a&gt; on August 16, 2016. This got mentioned in Wikipedia's newsletter "&lt;a class="external-link" href="https://en.wikipedia.org/wiki/Wikipedia:Wikipedia_Signpost/Single#In_brief"&gt;The Signpost&lt;/a&gt;". This was mirrored by Wiki Edu on October 5, 2016. The post republished can be &lt;a class="external-link" href="https://wikiedu.org/blog/2016/10/05/blurry-copyright-three-tips-for-students-and-educators/"&gt;read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In this article, I'll look at three copyright tips to keep in mind  when you're thinking about using content—even for academic purposes— you  find online.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;1. Most of what you find on the Internet is copyrighted.&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Except content that clearly indicates the work is released under a  free license, or that the copyright has lapsed and the work is in the &lt;a href="https://en.wikipedia.org/wiki/Public_domain" target="_blank"&gt;Public Domain&lt;/a&gt;, you can assume content is not freely/liberally licensed. A few popular free and &lt;a href="https://opensource.org/licenses/alphabetical" target="_blank"&gt;open licenses&lt;/a&gt; include GNU General Public License (GPL), BSD licenses, Apache License,  Mozilla Public License, and SIL Open Font License. If a work mentions  the license, usually the license is explained or links to terms for  using the work. Spending a little time to find out what license the work  is under beats spending time and money on a copyright infringement case  later.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;2. Fair use can be your friend, but not always.&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://en.wikipedia.org/wiki/Fair_use" target="_blank"&gt;Fair use&lt;/a&gt; means you might be permitted to make limited use of a copyrighted work  without prior permission from the copyright holder. The fair use policy  varies from country to country. As explained in the &lt;a href="http://fairuse.stanford.edu/overview/fair-use/what-is-fair-use/" target="_blank"&gt;Stanford University Libraries site&lt;/a&gt;, commentary/quotes and criticism, and parody are cases that often fall under fair use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Wikipedia article images related to recent music albums, movies, and  even people who are deceased are used under fair use policy. Click on &lt;a href="https://en.wikipedia.org/wiki/File:Ghostbusters_2016_film_poster.jpg" target="_blank"&gt;a recent movie poster&lt;/a&gt; appearing in a Wikipedia article and check the copyright section for an  example explanation of why the use on Wikipedia qualifies as fair use.&lt;/p&gt;
&lt;p class="rtecenter" style="text-align: justify; "&gt;&lt;img alt="Example Wikipedia explanation for fair use of an image." class="attr__field_folder[und]__9404 attr__field_file_image_caption[und][0][format]__panopoly_wysiwyg_text attr__field_file_image_caption[und][0][value]__ attr__field_file_image_title_text[und][0][value]__Example image. an of use fair for explanation Wikipedia attr__field_file_image_alt_text[und][0][value]__Example attr__format__default img__view_mode__default img__fid__320866 attr__typeof__foaf:Image media-image" height="186" src="https://opensource.com/sites/default/files/poster-license.png" title="Example Wikipedia explanation for fair use of an image." width="520" /&gt;&lt;/p&gt;
&lt;p class="rtecenter" style="text-align: justify; "&gt;&lt;sup&gt;Example &lt;a href="https://en.wikipedia.org/wiki/File:Ghostbusters_2016_film_poster.jpg" target="_blank"&gt;Wikipedia explanation&lt;/a&gt; for fair use of an image.&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fair use also gives some freedom to scholars to use copyrighted work  for academic research. To be in a safe side if you are not sure your use  falls under "fair use," reach out to the copyright holder and get  formal permission before using their work.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;3. search.creativecommons.org helps streamline Creative Commons content searches.&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Where do you go to search for images, illustrations, and other  content with Creative Commons licensing? Most images turned up using a  search engine are copyrighted and not licensed liberally, for example. A  better way to search is using &lt;a href="http://search.creativecommons.org/" target="_blank"&gt;search.creativecommons.org&lt;/a&gt;.&lt;/p&gt;
&lt;p class="rtecenter" style="text-align: justify; "&gt;&lt;img alt="Searching with search.creativecommons.org" class="attr__field_folder[und]__9404 attr__field_file_image_caption[und][0][format]__panopoly_wysiwyg_text attr__field_file_image_caption[und][0][value]__ attr__field_file_image_title_text[und][0][value]__Searching search.creativecommons.org with attr__field_file_image_alt_text[und][0][value]__Searching attr__format__default img__view_mode__default img__fid__320871 attr__typeof__foaf:Image media-image" height="288" src="https://opensource.com/sites/default/files/search_creative-commons.png" title="Searching with search.creativecommons.org" width="520" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You can choose Creative Commons-licensed content from several sites,  such as Flickr, Google Images, Wikimedia Commons, and Europeana. You can  also specify whether you want to use the content for commercial  purposes, or to modify, adapt, and build upon work.&lt;/p&gt;
&lt;p class="rtecenter" style="text-align: justify; "&gt;&lt;img alt="Squirrel image cc by 2.0" class="attr__field_folder[und]__9404 attr__field_file_image_caption[und][0][format]__panopoly_wysiwyg_text attr__field_file_image_caption[und][0][value]__ attr__field_file_image_title_text[und][0][value]__Squirrel 2.0 by cc image attr__field_file_image_alt_text[und][0][value]__Squirrel attr__format__default img__view_mode__default img__fid__320876 attr__typeof__foaf:Image media-image" height="345" src="https://opensource.com/sites/default/files/squirrel.png" title="Squirrel image cc by 2.0" width="520" /&gt;&lt;/p&gt;
&lt;p class="rtecenter" style="text-align: justify; "&gt;&lt;sup&gt;Image credit &lt;a href="https://www.flickr.com/photos/thartz00/4848125586/in/photolist-pJ1ZUb-pHZeyg-bHBqWK-qUPGF2-8p2py2-8omhkX-8ESRmV-8opUQb-8omCTF-8Ci9uT-8EW2Z1-aCzjww-8omsBg-egUVB6-8opD3b-pjwoda-egUUB4-5QjZw-afNR9W-8FCKKW-8ESJ1X-8opf3u-8omu6r-8opXVG-rksQLR-iiEtfF-8Fzkvi-kjQiui-6p3zqy-9vDtad-7ThZA-8oppdY-9cuAnT-8CmfVo-98RCtP-8EW259-8ESNoa-8EW1GW-8EVVLW-8ESMRa-8opfg7-8EVV73-8omdHk-8EVUMf-8ESS5x-8ESPaT-8ESSs8-9A3fb1-8omEcp-8EW1o1" target="_blank"&gt;likeaduck&lt;/a&gt;. &lt;a href="https://creativecommons.org/licenses/by/2.0/" target="_blank"&gt;CC BY 2.0&lt;/a&gt; &lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Note that you still will need to check which Creative Commons license the content uses. As explained in &lt;a href="https://opensource.com/law/11/7/trouble-harmony-part-2"&gt;an article by Richard Fontana&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;The Creative Commons suite includes licenses that  implement various policies. Some, like CC BY and CC BY-SA, are  normatively consistent with corresponding permissive and copyleft  families of free software licenses. Others, however, particularly its  “NC” (no commercial use) and “ND” (no derivative works) licenses, are in  conflict with basic principles of free software and free culture. I am  not alone in lamenting the application of the Creative Commons umbrella  brand to cover licenses with such disparate qualities. One consequence  has been a general confusing dilution of the meaning of “openness” in  the context of cultural works. A more specific problem is the evidence  of confusion on the part of content authors interested in applying  Creative Commons licenses to their works, and resulting confusion by  those interested in making use of such works. Too often a work is  labeled as being licensed under “a Creative Commons license”, without  specifying accurately, or specifying at all, which free or nonfree  policy the author sought to apply.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;If you still cannot find content—images, for example—with free  licenses, but you find copyrighted content that fits your academic need,  you can reach out to the content creator or copyright holder for  permission. Often copyright holders allow usage of their work for  non-commercial purposes, such as academic research and publication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Do you have other sources you recommend for finding Creative Commons  or Public Domain content? Let us know about your favorite resources in  the comments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/3-copyright-tips-for-students-and-educators'&gt;https://cis-india.org/a2k/blogs/3-copyright-tips-for-students-and-educators&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-10-07T00:42:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
