<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 61 to 75.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc22-proposed-session-lockdownsandshutdowns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc22-proposed-session-digitisingcrisesremakinghome"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/data-lives-of-humanities-text"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis_odr-report_11-11-20"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/reports/annual-programmatic-report-2018-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/irc22-proposed-session-lockdownsandshutdowns">
    <title>IRC 22 - Proposed Session - #LockdownsAndShutdowns</title>
    <link>https://cis-india.org/raw/irc22-proposed-session-lockdownsandshutdowns</link>
    <description>
        &lt;b&gt;Details of a session proposed for the Internet Researchers' Conference 2022 - #Home.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Internet Researchers' Conference 2022 -&lt;/strong&gt; # &lt;a class="external-link" href="https://cis-india.org/raw/internet-researchers-conference-2022"&gt;Home - Call for Sessions&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session Type:&lt;/strong&gt; Workshop or Collaborative Working Session&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session Plan&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Internet shutdowns are a form of censorship which can have substantial economic and human rights implications. Despite the potential negative consequences, shutdowns are still used across the globe, and many social perspectives on shutdowns remain under-researched and poorly understood. For example, the relationship between internet shutdowns and one’s sense of safety and freedom at home. This connection is pertinent given the COVID19 pandemic and government recommendations to work from home, which emphasised the importance of the internet and the ability to connect with others freely. By connecting with others online, we create a sense of digital community. While many are spending more time at home, shutdowns continued despite the increasing need for online communication. This session aims to understand community perspectives surrounding shutdowns and other forms of censorship, specifically focusing on one’s “home”. Shutdowns are a common tool to curb forms of collective action (such as protests), and some public spaces have had reduced availability due to COVID19. Therefore, the importance of the internet in enabling social movements, like protests, cannot be understated. Thus, this session will touch upon many essential topics and encourage others to think about shutdowns and the increased importance of the internet in allowing social movements from within one’s home.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The session will last a total of 60 minutes. The first 5 minutes will provide an overview of the session’s structure and why this topic is important. We will then move into a semi-structured format consisting of 3 x 15-minute mini-sessions, with each mini-session touching upon a different question. Example questions may cover topics such as the unique role of the internet in enabling online social movements in times of a lockdown or if shutdowns during lockdowns merit a different moral threshold. The prompt questions will encourage interdisciplinary discussion so that participants from diverse backgrounds can make meaningful contributions. We envisage that this session will be organic and open in a large roundtable format. The last 10 minutes of the session will consist of an open-style discussion so that any remaining thoughts, opinions, and reflections from participants may be shared.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Session Team&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Michael Collyer&lt;/strong&gt; is an OTF Senior Fellow in Information Controls and a Doctoral Candidate at the University of Oxford. His research interests are information controls, Bayesian statistics, machine learning, and natural language processing.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Joss Wright &lt;/strong&gt;is the Co-Director of the Oxford EPSRC Cybersecurity Doctoral Training Centre; Co-Director of the Oxford Martin Programme on the Illegal Wildlife Trade; and Senior Research Fellow at the Oxford Internet Institute. His work focuses on computational approaches to social science questions, with a particular focus on technologies that exert, resist, or subvert control over information.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Andreas Tsamados i&lt;/strong&gt;s a doctoral researcher at the Oxford Internet Institute focusing on human control over AI/ML applications within national security and defence. He is also developing the Algorithmic Resistance Cookbook, a guide to using data-driven tools and techniques to practice resistance against intrusive and repressive aspects of present-day algorithmic culture.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Marianne Díaz Hernández &lt;/strong&gt;is a #KeepItOn Fellow at Access Now. Marianne is a Venezuelan lawyer, digital rights activist, and fiction writer, currently based in Santiago, Chile. Her work focuses mainly on issues regarding online freedom of speech, privacy, web filtering, internet infrastructure and digital security. She founded the digital rights NGO Acceso Libre, a volunteer-based organization that documents threats to human rights in the online environment in Venezuela. Before joining Access Now, Marianne worked as a public policy analyst for the Latin American NGO Derechos Digitales. She’s volunteered for Global Voices, particularly for the Advox project, since 2010. She has also published several fiction books, and co-founded the small press Casajena Editoras. In 2019, she was recognized with the “Human Rights Hero” award, granted by Access Now, for her “research and leading advocacy efforts against invasive measures taken by the Maduro government in Venezuela. She’s currently working towards a Master’s Degree in Narrative Writing at Alberto Hurtado University.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Nathan Dobson &lt;/strong&gt;is a Postdoc at the Centre for Socio-Legal Studies, Oxford. He has a PhD in Anthropology from the University of California, Irvine. His current research is on internet shutdowns in relation to elections and violence in Africa. He has a background in African Studies and has worked at the University of Florida, USA, and the University of Birmingham, UK.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc22-proposed-session-lockdownsandshutdowns'&gt;https://cis-india.org/raw/irc22-proposed-session-lockdownsandshutdowns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Proposed Sessions</dc:subject>
    
    
        <dc:subject>IRC22</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    

   <dc:date>2022-05-19T15:05:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc22-proposed-session-digitisingcrisesremakinghome">
    <title>IRC22 - Proposed Session - #DigitisingCrisesRemakingHome</title>
    <link>https://cis-india.org/raw/irc22-proposed-session-digitisingcrisesremakinghome</link>
    <description>
        &lt;b&gt;Details of a session proposed for the Internet Researchers' Conference 2022- #Home.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Internet Researchers' Conference 2022 &lt;/strong&gt;- # &lt;a class="external-link" href="https://cis-india.org/raw/internet-researchers-conference-2022"&gt;Home - Call for Sessions&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Session Type:&lt;/strong&gt; Panel Discussion&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session Plan&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The session is planned as a panel discussion between three scholars on three distinct, interconnected notions of home – specifically the home as a dwelling unit, an administrative unit (such as a municipality, a city, or a state), and a country (or a nation state) in the context of India. We intend to parse these ideas within the context of the ongoing Covid-19 pandemic to discuss notions of ‘safety’, ‘trust’, ‘support’, and ‘access’ by examining the digital turn in all three kinds of ‘home’. The session will open with the scholars speaking to each other, and laying out the central ideas. The conversation between the three scholars will act as provocations to enable a larger discussion with other attendees.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In 2020, when the first Covid-19 lockdowns began, the internet was discussed as a space of solidarity, of meeting, entertainment, work, and of support. But soon it became evident that access to such spaces of solidarity or support was not necessarily equal. While for some it was almost non-existent, for many others it was limited or regulated. In the Indian context these differences only stood out further due to unequal access to infrastructure, healthcare, and even basic necessities such as food that was starkly apparent in the long march of several thousand migrant workers from cities back to their ‘homes’ in rural areas at the height of the Indian summer.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At the national level, the digital response to the pandemic was most palpable. The use of contact tracing through apps such as &lt;em&gt;Aarogya Setu, &lt;/em&gt;the &lt;em&gt;CoWin&lt;/em&gt; portal for vaccinations, and the often arbitrary use of drones, facial recognition, and artificial intelligence have raised questions about surveillance, inclusion, and how useful technology can be in assisting a public health crisis. Often such responses reflected a law and order response to what has been a public health crisis. On the other hand, the establishment of&lt;em&gt; Vande Bharat &lt;/em&gt;missions to bring stranded Indians from around the world ‘back home to India’ presented a very different idea of home.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Administrative units at the state and local levels had differing procedures and interventions. Many attempted to follow the guidelines and interventions laid out by the central government, others introduced their own digital solutions but soon found that these were not enough to actually deliver governance during the pandemic.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This session will explore the ‘how’ and ‘why’ of the digital becoming the default mode of managing the pandemic–or any sort of threat. We ask if the idea of ‘home’ as a ‘safe space’ had ever really been so and whether the pandemic exacerbated existing exploitative mechanisms within a ‘home’ – be it the dwelling, the city, or even one’s country. We also intend to discuss issues of access, surveillance, privacy, vulnerability, the burdens of care-work, the exploitative extraction of data, and divergent understandings of consent frameworks within these three axes of the idea of the ‘home’.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Session Team&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Vidya Subramanian &lt;/strong&gt;is&amp;nbsp;Raghunathan Family Fellow, South Asia Institute, Harvard University. She is&amp;nbsp;an interdisciplinary scholar whose research interests lie at the intersection of technologies and societies. Her current research investigates the changing nature of citizenship in the technological society we now inhabit. Focusing on India, her research is loosely framed by two large issues: the first is the colonisation of the everyday so-called real world by the digital; and the second is how power permeates and is implicated in such technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Kalindi Kokal&lt;/strong&gt; is Post Doctoral Fellow, Centre for Policy Studies, IIT Bombay. She&amp;nbsp;has a doctorate in law from the Martin Luther University, Halle-Wittenberg, Germany. Her doctoral work centred on understanding how non-state actors in dispute processing engage with state law. Her dissertation is an ethnographic study of dispute-processing mechanisms in two rural communities in the states of Maharashtra and Uttarakhand in India. She works on understanding how the manner in which people actually experience state law coupled with their perceptions of dispute resolution and state courts underscore the need to explore broader understandings of law and dispute resolution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Uttara Purandare &lt;/strong&gt;is PhD Researcher, IITB-Monash Research Academy. She is pursuing her PhD in Public Policy under a joint programme offered by IIT Bombay and Monash University. Her area of research is smart cities. Looking specifically at the intersection of technology, gender, and governance, Uttara’s research focuses on how safety and surveillance are constructed by the smart city rhetoric and the role of private sector firms in governing the smart city. The COVID-19 pandemic and the technologies that have been introduced by national governments and smart cities purportedly to curb the spread of the virus have raised interesting questions about privacy and citizens’ rights during a crisis. Uttara is presently exploring some of these questions within the Indian context.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc22-proposed-session-digitisingcrisesremakinghome'&gt;https://cis-india.org/raw/irc22-proposed-session-digitisingcrisesremakinghome&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Proposed Sessions</dc:subject>
    
    
        <dc:subject>IRC22</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    

   <dc:date>2022-04-25T12:23:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge">
    <title>Global Civil Society Coalition launches website to promote Access to Knowledge  </title>
    <link>https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;CIS is a part of a global civil society coalition that is working to promote access to, and use of, knowledge - the Access to Knowledge or A2K coalition. &lt;br /&gt;&lt;br /&gt;Earlier this week, the coalition launched a &lt;a class="external-link" href="https://www.a2k-coalition.org/"&gt;website&lt;/a&gt; articulating its mission and recommendations to reform copyright systems for the benefit of education, research, and cultural heritage. &lt;br /&gt;&lt;br /&gt;Copyright systems pose serious obstacles to quality teaching and learning, researchers’ ability to receive and impart information and to share in scientific advancement and its benefits, and preservation and access of cultural and scientific heritage. The website presents evidence and legal solutions, with a focus on the digital and online dimension to the issues. Three global maps also show the (limited) extent to which copyright limitations and exceptions across the world support online education, text and data mining, and preservation, highlighting the need for global legal eform. &lt;br /&gt;&lt;br /&gt;The &lt;a class="external-link" href="https://www.a2k-coalition.org/about/"&gt;members of the A2K coalition&lt;/a&gt; represent a diverse set of voices such as educators, researchers, students, libraries, archives, museums, other knowledge users and creative communities around the globe. In Asia-pacific, we have ourselves and Open Access India as members presently. &lt;strong&gt;We invite organizations who share a similar vision of a fair and balanced copyright system to join the coalition.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge'&gt;https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Limitations &amp; Exceptions</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>movements</dc:subject>
    

   <dc:date>2022-10-12T12:05:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/data-lives-of-humanities-text">
    <title>Data Lives of Humanities Text</title>
    <link>https://cis-india.org/raw/data-lives-of-humanities-text</link>
    <description>
        &lt;b&gt;The ‘computational turn’ in the humanities has brought with it several questions and challenges for traditional ways of engaging with the ‘text’ as an object of enquiry.  The prevalence of data-driven scholarship in the humanities offers several challenges to traditional forms of work and practice, with regard to theory, tools, and methods. In the context of the digital, ‘text’ acquires new forms and meanings, especially with practices such as distant reading. Drawing upon excerpts from an earlier study on digital humanities in India, this essay discusses how data in the humanities is not a new phenomenon; concerns about the ‘datafication’ of humanities, now seen prominently in digital humanities and related fields is actually reflective of a longer conflict about the inherited separation between humanities and technology. It looks at how ‘data’ in the humanities has become a new object of enquiry as a result of several changes in the media landscape in the past few decades. These include large-scale digitalization and availability of  corpora of materials (digitized and born-digital) in an array of formats and across varied platforms, thus leading to also a steady prevalence of the use of computational methods in working with and studying cultural artifacts today. This essay also explores how reading ‘text as data’ helps understand the role of data in the making of humanities texts and redefines traditional ideas of textuality, reading, and the reader.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;This essay by Puthiya Purayil Sneha was published in &lt;em&gt;Lives of Data: Essays on Computational Cultures from India&lt;/em&gt; (2020) edited by Sandeep Mertia, with a Foreword by Ravi Sundaram as part of the Series on Theory on Demand by Institute of Network Cultures, Amsterdam.&lt;/h4&gt;
&lt;h4&gt;Read the open access book &lt;a href="https://networkcultures.org/blog/publication/lives-of-data-essays-on-computational-cultures-from-india/" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/data-lives-of-humanities-text'&gt;https://cis-india.org/raw/data-lives-of-humanities-text&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2020-12-23T13:07:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal">
    <title>Understanding the Data Gaps on Wikidata Concerning Heritage Structures of West Bengal </title>
    <link>https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal</link>
    <description>
        &lt;b&gt;This is a short study on identifying the data gaps related to heritage structures in West Bengal on Wikidata, and potential strategies to address the same. The report is authored by Bodhisattwa Mandal, with editorial oversight and support by Puthiya Purayil Sneha and external review by Sumandro Chattapadhyay. This is part of a series of short-term studies undertaken by the CIS-A2K team in 2019-2020.
&lt;/b&gt;
        
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Wikidata is a free and open repository of structured and linked data, hosted by the Wikimedia Foundation, built collaboratively[1] by human volunteers and robots from all over the world[2]. This platform, with an initial intention to be used within Wikimedia projects as a high quality secondary database [3], first started by centrally linking Wikipedia articles about the same topics in different languages[4][5][6][7][8], but soon it started linking with external databases.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong id="docs-internal-guid-82468dc9-7fff-a2c3-263c-a0aebac3c1a7"&gt;&lt;br /&gt;&lt;span style="text-align: justify;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong id="docs-internal-guid-82468dc9-7fff-a2c3-263c-a0aebac3c1a7"&gt;Introduction to Wikidata&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="text-align: justify;"&gt;Wikidata is designed to be structured as a Resource Description Framework or RDF model which describes statements in the form of triplets of subject–predicate–object. In Wikidata, subject–predicate–object is termed as item–property–value. Items on Wikidata can represent every possible object, concept or topic in human knowledge which passes a certain threshold of defined &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link"&gt;notability&lt;/a&gt;&lt;span style="text-align: justify;"&gt; and are represented by unique Q numbers. The actual data of an item is called value, which is pre-defined by the data type, be it strings, numbers, dates, url links, coordinates, musical notations etc. or even other items. Properties, represented by unique P numbers, describe the data value of items. The items, properties and values are language independent and thus totally machine-readable, although for human comfort and understanding, one can describe &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://www.wikidata.org/wiki/Help:Items"&gt;items&lt;/a&gt;&lt;span style="text-align: justify;"&gt; in their own languages by adding or translating&lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://www.wikidata.org/wiki/Help:Statements"&gt; labels, descriptions or aliases&lt;/a&gt;&lt;span style="text-align: justify;"&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Due to the machine-readable triplet structure of Wikidata, the database can be easily queried to find answers, which might not be otherwise possible from a list of unstructured contents such as Wikipedia articles. To retrieve and manipulate RDF data formats in triplets, we require a semantic query language for RDF databases named &lt;a class="external-link" href="https://www.w3.org/TR/rdf-sparql-query/"&gt;SPARQL&lt;/a&gt;. Through &lt;a class="external-link" href="https://query.wikidata.org/"&gt;Wikidata query service&lt;/a&gt;, one can use SPARQL and retrieve data and the prevailing gaps on Wikidata and visualize in different ways.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Wikidata in West Bengal, India&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/Wikidata_items_map_with_difference_India_October_2018_to_May_2019.png/image_preview" alt="Wikidata_items_map_with_difference,_India,_October_2018_to_May_2019" class="image-inline image-inline" title="Wikidata_items_map_with_difference,_India,_October_2018_to_May_2019" /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="text-align: left;"&gt;&lt;em&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/File:Wikidata_items_map_with_difference,_India,_October_2018_to_May_2019.png"&gt;Massive imports of coordinates for places in West Bengal happened between October 2018 and May 2019 on Wikidata as reflected by the map generated using Resemble.js&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Wikidata activities around India have been organized around India for almost 4 years under the &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link"&gt;WikiProject India &lt;/a&gt;&lt;span style="text-align: justify;"&gt;umbrella. Targeted approaches to fill data gaps on different topics have been pursued through data-thons and campaigns in these years and community strength has been aimed to increase through workshops and skill sharing initiatives.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Being part of that initiative, the Indian state of West Bengal has seen a lot of activities around Wikidata in recent years.&amp;nbsp; Under the &lt;a class="external-link"&gt;WikiProject umbrella&lt;/a&gt;, Wikidata volunteers have been working together to build data on different topics related to the state, its demographics, culture, heritage, education, health, politics, language etc. As heritage has been the prime focus of the Wikimedia community members of West Bengal, in this essay, we will identify the data gaps related to the topic through SPARQL query and explore reasons for the same, if any, through interviews of active volunteers who have been working on this area for years.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Wikimedia community members have been working on documenting different forms of heritage since 2011, when they organized &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Wikipedia:Wikipedia_Takes_Kolkata"&gt;Wikipedia Takes Kolkata photo-walk&lt;/a&gt;&amp;nbsp;for the first time. Since then, they have organized eight more Wikipedia Takes Kolkata photo-walks, &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Template:Wiki_Exploration"&gt;11 Wiki Exploration projects in 9 districts of the state&lt;/a&gt;, 2 editions of prestigious Wiki Loves Monuments in India&amp;nbsp; &lt;a class="external-link" href="https://commons.wikimedia.org/wiki/Commons:Wiki_Loves_Monuments_2018_in_India"&gt;2018 &lt;/a&gt;and &lt;a class="external-link" href="https://commons.wikimedia.org/wiki/Commons:Wiki_Loves_Monuments_2019_in_India"&gt;2019&lt;/a&gt; and several other documentation projects organized organically or single-handedly and by doing so they have uploaded several thousands of photographs related to heritage structures and GLAM collections on Wikimedia Commons.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;In this essay, we will focus on the photo-walks and explorations which were conducted to document heritage structures of West Bengal. We will focus on two basic types of data which should be there in every dataset on heritage structures, i.e. a) location, and b) image,&amp;nbsp; and we will find out if there is any significant gap there using SPARQL queries.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Photo-walks and Wiki Explorations in West Bengal&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/Map_of_KMC_graded_heritage_buildings_generated_by_Wikidata_SPARQL_query.png/image_preview" alt="Map of KMC" class="image-inline image-inline" title="Map of KMC" /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;em&gt;Map of KMC heritage buildings generated from Wikidata query&amp;nbsp;&lt;a class="external-link" href="https://w.wiki/Tir" rel="nofollow"&gt;https://w.wiki/Tir&lt;/a&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Let’s start with the nine consecutive series of Wikipedia takes Kolkata photo-walks which aims to photo-document heritage buildings and structures of Kolkata. To understand the data gap related to the heritage buildings, we will examine the presence of graded heritage buildings and structures enlisted by &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://www.kmcgov.in/KMCPortal/downloads/Graded_List_of_Heritage_Buildings_Grade_I_IIA_IIB.pdf"&gt;Kolkata Municipal Corporation&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&amp;nbsp;(KMC) on Wikidata through different SPARQL queries. Wikidata now contains &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tit"&gt;923 heritage buildings and structures listed by KMC&lt;/a&gt;&lt;span style="text-align: justify;"&gt;, but out of them 26.65% have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tin"&gt;images&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&amp;nbsp;and only 18.53% have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tir"&gt;coordinates&lt;/a&gt;&lt;span style="text-align: justify;"&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Although 81.47% of the items of the heritage structures were missing coordinates, but they gave fairly good idea about their location, all of the items had municipal wards and streets connected with them, utilizing which, photographers and travellers are expected to explore the sites easily. However, while testing the items of the wards, it was noticed that however all the 144 wards contain coordinates, but they all lack a crucial property which can denote their area of location i.e. the &lt;a class="external-link" href="https://w.wiki/Tix"&gt;geoshape data&lt;/a&gt;. While coordinates can denote the exact location of certain parts of an area, it is misleading when it comes to a larger area, which requires geoshape to better describe the location. While testing the street data, it was found that both geoshape and coordinate data are lacking for the streets, which makes them extremely difficult to &lt;a class="external-link" href="https://w.wiki/V6v"&gt;locate&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;span style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/Map_of_temples_in_West_Bengal_generated_by_Wikidata_SPARQL_query.png/image_preview" alt="Map_of_temples_in_West_Bengal_generated_by_Wikidata_SPARQL_query" class="image-inline image-inline" title="Map_of_temples_in_West_Bengal_generated_by_Wikidata_SPARQL_query" /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;em&gt;&lt;span style="text-align: left;"&gt;Map of temples in West Bengal generated from Wikidata query&amp;nbsp;&lt;/span&gt;&lt;a style="text-align: left;" class="external free" href="https://w.wiki/Tj7" rel="nofollow"&gt;https://w.wiki/Tj7&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="text-align: justify;"&gt;For the last 3 years, Wikimedia volunteers from West Bengal have also been involved in Wiki Exploration projects to remote parts of the state documenting temples, mosques, sculptures etc., many of which have not been documented online before. Few hundreds of heritage structures in 9 districts of the state were documented and thousands of photographs under this project have been uploaded to &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://commons.wikimedia.org/wiki/Category:Wiki_Exploration_Program"&gt;Wikimedia Commons&lt;/a&gt;&lt;span style="text-align: justify;"&gt;. Now, if we test the Wikidata presence of the temples situated in West Bengal, it can be noticed that &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/V6w"&gt;435 temples have items&lt;/a&gt;&lt;span style="text-align: justify;"&gt;, out of which only 196 items have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tj8"&gt;images&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&amp;nbsp;and only 79 have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tj7"&gt;coordinates&lt;/a&gt;&lt;span style="text-align: justify;"&gt;. however 302 of them have their location pin-pointed to the village, ward, town or city level. Similar to the previous case, although there are 40,359 items for villages located in West Bengal, only 0.017% have coordinates while none have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/TjR"&gt;geoshape data.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;From the above two scenarios, it can be easily concluded from the SPARQL queries, that there has been a significant amount of data gap. Both the datasets contain significant lack of location data and images. The second scenario even lacks data on the temples itself.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Challenges of Contributing to Wikidata in/from West Bengal&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Now, to understand why there are huge gaps in the data, we have interviewed four volunteers from West Bengal who are involved in these two kinds of projects, three of them are Wikimedia contributors for five-ten years and one of them is relatively new to the movement. They all upload heritage photographs to Wikimedia Commons and 2 of them contribute to Wikidata. All of them agreed that due to lack of suitable hardware, they could not document the exact coordinate data while photo-documenting heritage structures. GPS devices or full-frame cameras with built-in GPS are expensive and are not affordable to many. Interviewees have also pointed out that due to lack of proper training on how to document heritage structures properly, photographers and amaetur researchers miss out vital points of documentation and thus increase data gaps. Restricted access to private heritage structures like&amp;nbsp; temples maintained by families or private heritage buildings and their documents, lack of proper existing documentation along with analogue and digital metadata, and rapid destruction of built heritage due to lack of maintenance or improper restoration procedures etc. are also the reasons for data gaps. While answering the question about why photographs are not converted fully into data, they point out that it might be a burden for photographers to learn about data entry in Wikidata, as this is out of their area of interest and workflow. As noted by an interviewee, ‘the nature of work for Wikidata does not match with photographers' workflow.’ However, they also stressed on the need to conduct training programmes on Wikidata for photographers and interested people involved in documentation to let them know the importance of structured data in the area of heritage documentation.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Recommendations&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;From the observations of this short study, it is recommended that volunteers working on heritage documentation in West Bengal should be supported with suitable hardware to document coordinates. Frequent training programs should be conducted, preferably by experts, for volunteers on how to document heritage structures in a professional way, so that data gaps remain minimal. Training on Wikidata should be conducted for photographers to let them understand the importance of structured data in the field of heritage documentation. It is also recommended to increase interaction among the Wikidata and Wikimedia Commons volunteers, to understand each other's work flow and strategically modify those to provide optimal results.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;span id="docs-internal-guid-6cb506ac-7fff-3519-c2a4-4b192e13b68b"&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;References&amp;nbsp;&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[1] Vrandečić, Denny (2012).&lt;a href="http://dl.acm.org/citation.cfm?doid=2187980.2188242"&gt; "Wikidata: a new platform for collaborative data collection"&lt;/a&gt;. Proceedings of the 21st international conference companion on World Wide Web - WWW '12 Companion. Lyon, France: ACM Press: 1063.&lt;a href="https://en.wikipedia.org/wiki/Digital_object_identifier"&gt; doi&lt;/a&gt;:&lt;a href="https://doi.org/10.1145%2F2187980.2188242"&gt;10.1145/2187980.2188242&lt;/a&gt;.&lt;a href="https://en.wikipedia.org/wiki/International_Standard_Book_Number"&gt; ISBN&lt;/a&gt; &lt;a href="https://en.wikipedia.org/wiki/Special:BookSources/978-1-4503-1230-1"&gt;978-1-4503-1230-1&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[2] Vrandečić, Denny; Krötzsch, Markus (2014-09-23).&lt;a href="http://dl.acm.org/citation.cfm?doid=2661061.2629489"&gt; "Wikidata: a free collaborative knowledgebase"&lt;/a&gt;. Communications of the ACM. 57 (10): 78–85.&lt;a href="https://en.wikipedia.org/wiki/Digital_object_identifier"&gt; doi&lt;/a&gt;:&lt;a href="https://doi.org/10.1145%2F2629489"&gt;10.1145/2629489&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[3]&amp;nbsp;&amp;nbsp;Vrandečić, Denny (2012).&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[4] Roth, Mathew (30 March 2012). &lt;a href="https://blog.wikimedia.org/2012/03/30/the-wikipedia-data-revolution/"&gt;"The Wikipedia data revolution"&lt;/a&gt;. Wikimedia Foundation Blog.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[5] Pintscher, Lydia (14 January 2013).&lt;a href="http://blog.wikimedia.de/2013/01/14/first-steps-of-wikidata-in-the-hungarian-wikipedia/"&gt; "First steps of Wikidata in the Hungarian Wikipedia"&lt;/a&gt;. Wikimedia Deutschland Blog.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[6] Pintscher, Lydia (30 January 2013).&lt;a href="https://blog.wikimedia.de/2013/01/30/wikidata-coming-to-the-next-two-wikipedias/"&gt;"Wikidata coming to the next two Wikipedias"&lt;/a&gt;. Wikimedia Deutschland Blog.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[7] Pintscher, Lydia (15 February 2013).&amp;nbsp;&lt;a href="https://blog.wikimedia.de/2013/02/13/wikidata-live-on-the-english-wikipedia/"&gt;"Wikidata live on the English Wikipedia"&lt;/a&gt;. Wikimedia Deutschland Blog.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[8] Pintscher, Lydia (6 March 2013). &lt;a href="https://blog.wikimedia.de/2013/03/06/wikidata-now-live-on-all-wikipedias/"&gt;"Wikidata now live on all Wikipedias"&lt;/a&gt;. Wikimedia Deutschland Blog.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[1] The query results were generated during early 2020. The results may vary at the time of publication of this article.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[2] See&lt;a href="https://cis-india.org/A2K-Wikidata-Annexure" class="external-link"&gt; Annexure I&lt;/a&gt; for the interview questionnaire.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[3] Read this report on Wikimedia Meta-Wiki &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Research:Understanding_the_data_gaps_on_Wikidata_concerning_heritage_structures_of_West_Bengal"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/span&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal'&gt;https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Bodhisattwa Mandal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>A2K Research</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2021-05-15T12:31:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis_odr-report_11-11-20">
    <title>CIS_ODR Report_11/11/20</title>
    <link>https://cis-india.org/internet-governance/cis_odr-report_11-11-20</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis_odr-report_11-11-20'&gt;https://cis-india.org/internet-governance/cis_odr-report_11-11-20&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>aman</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-03-22T05:22:55Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data">
    <title>The Wolf in Sheep's Clothing: Demanding your Data</title>
    <link>https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data</link>
    <description>
        &lt;b&gt;The increasing digitalization of the economy and ubiquity of the Internet, coupled with developments in Artificial Intelligence (AI) and Machine Learning (ML) has given rise to transformational business models across several sectors.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This piece was originally published in &lt;a class="external-link" href="https://telecom.economictimes.indiatimes.com/tele-talk/the-wolf-in-sheep-s-clothing-demanding-your-data/4497"&gt;The Economic Times Telecom&lt;/a&gt;, on 8 September, 2020.&lt;span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0"&gt;&lt;/span&gt;&lt;/p&gt;
&amp;nbsp;
&lt;p&gt;The increasing digitalization of the economy and ubiquity of the &lt;a href="https://telecom.economictimes.indiatimes.com/tag/internet"&gt;Internet&lt;/a&gt;, coupled with developments in &lt;a href="https://telecom.economictimes.indiatimes.com/tag/artificial+intelligence"&gt;Artificial Intelligence&lt;/a&gt;
 (AI) and Machine Learning (ML) has given rise to transformational 
business models across several sectors. These developments have changed 
the very structure of existing sectors, with a few dominant firms 
straddling across many sectors. The position of these firms is 
entrenched due to the large amounts of data they have, and usage of 
sophisticated algorithms that deliver very targeted service/content and 
their global nature.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Such data based network businesses 
are generally multi-sided platforms subject to network effects and 
winner takes all phenomena, often, making traditional competition 
regulation inappropriate. In addition, there has been concern that such 
companies hurt competition as they are owners of large amounts of data 
collected globally, the very basis on which new services are predicated.
 Also since users have an inertia to share their data on multiple 
platforms, new companies find it very challenging to emerge. Several of 
the large companies are of US origin. Several regions/countries such as 
EU, UK, India are concerned that while these companies benefit from the 
data of their citizens or their &lt;a href="https://telecom.economictimes.indiatimes.com/tag/devices"&gt;devices&lt;/a&gt;,
 SMEs and other companies in their own countries find it increasingly 
difficult to remain viable or achieve scale. With the objective of 
supporting enterprises, including SMEs in their own countries, Europe, 
UK India are in different stages of data regulation initiatives.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;In India, the &lt;a href="https://telecom.economictimes.indiatimes.com/tag/personal+data+protection"&gt;Personal Data Protection&lt;/a&gt;
 (PDP) Bill, 2019 deals with the framework for collecting, managing and 
transferring of Personal Data of Indian citizens, including mandating 
sharing of anonymized data of individuals and non-personal data for 
better targeting of services or policy making. In addition, the Report 
by the Committee of Experts (CoE) on Non Personal Data (NPD) came up 
with a Framework for Regulating NPD. Since the NPD Report is a more 
recent phenomenon, this articles analyzes some aspects of it.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;According
 to CoE, non-personal data could be of two types. First, data or 
information which was never about an individual (e.g. weather data). 
Second, data or information that once was related to an individual (e.g.
 mobile number) but has now ceased to be identifiable due to the removal
 of certain identifiers through the process of ‘anonymisation’. However,
 it may be possible to recover the personal data from such anonymized 
data and therefore, the distinction between personal and non-personal is
 not clean. In any case, the PDP bill 2019 deals with personal data. If 
the CoE felt that some aspect of personal data (including anonymized 
data) were not adequately dealt with, it should work to strengthen it. 
The current approach of the CoE is bound to create confusion and 
overlapping jurisdiction. Since anonymized data is required to be 
shared, there are disincentives to anonymization, causing greater risk 
to individual privacy.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;A new class of business based on a “&lt;em&gt;horizontal classification cutting across different industry sectors&lt;/em&gt;” is defined. This refers to any business that derives “&lt;em&gt;new or additional economic value from data, by collecting, storing, processing, and managing data&lt;/em&gt;”
 based on a certain threshold of data collected/processed that will be 
defined by the regulatory authority that is outlined in the report. The 
CoE also recommends that “&lt;em&gt;Data Businesses will provide, within India, open access to meta-data and regulated access to the underlying data&lt;/em&gt;” without any remuneration. Further, “&lt;em&gt;By
 looking at the meta-data, potential users may identify opportunities 
for combining data from multiple Data Businesses and/or governments to 
develop innovative solutions, products and services. Subsequently, data 
requests may be made for the detailed underlying data&lt;/em&gt;”.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;With
 increasing digitalization, today almost every business is a data 
business. The problem in such categorization will be with the definition
 of thresholds. It is likely that even a small video sharing app or an 
AR/VR app would store/collect/process/transmit more data than say a 
mid-sized bank in terms of data volumes. Further, with increasing 
embedding of &lt;a href="https://telecom.economictimes.indiatimes.com/tag/iot"&gt;IoT&lt;/a&gt;
 in various aspects of our lives and businesses (smart manufacturing, 
logistics, banking etc), the amount of data that is captured by even 
small entities can be huge.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;The private sector, driven by
 profitability, identifies innovative business models, risks capital and
 finds unique ways of capturing and melding different data sets. In 
order to sustain economic growth, such innovation is necessary. The 
private sector would also like legal protection over these aspects of 
its businesses, including the unique IPR that may be embedded in the 
processing of data or its business processes. But mandating such onerous
 requirements on sharing by the CoE is going to kill any private 
initiative. Any regulatory regime must balance between the need to 
provide a secure environment for protecting data of incumbents and 
making it available to SMEs/businesses.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Meta data 
provides insights to the company’s databases and processes. These are 
source of competitive advantage for any company. Meta data is not 
without a context. The basis of demanding such disclosure is mandated 
with the proposed NPD Regulator who would evaluate such a purpose. In 
practice, purposes are open to interpretation and the structure of 
appeal mechanism etc is going to stall any such sharing. Would such 
mandates of sharing not interfere with the existing Intellectual 
Property Rights? Or the freedom to contract? Any innovation could easily
 be made available to a competitor that front-ends itself with a 
start-up. To mandate making such data available would not be fair. 
Further, how would the NPD regulator even ensure that such data is used 
for the purpose (which the proposed regulator is supposed to evaluate) 
that it is sought for? In Europe, where such &lt;a href="https://telecom.economictimes.indiatimes.com/tag/data+sharing"&gt;data sharing&lt;/a&gt;
 mandates are being considered, the focus is on public data. For private
 entities, the sharing is largely based on voluntary contributions. 
Compulsory sharing is mandated only under restricted situations where 
market failure situations are not addressed through Competition Act and 
provided legitimate interest of the data holder and existing legal 
provisions are taken into account.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Further, the 
compliance requirements for such Data Businesses is very onerous and 
makes a mockery of “minimum government” framework of the government. The
 CoE recommends that all Data Businesses, whether government NGO, or 
private “&lt;em&gt;to disclose data elements collected, stored and processed, and data-based services offered&lt;/em&gt;”. As if this was not enough, the CoE further recommends that “&lt;em&gt;Every
 Data Business must declare what they do and what data they collect, 
process and use, in which manner, and for what purposes (like disclosure
 of data elements collected, where data is stored, standards adopted to 
store and secure data, nature of data processing and data services 
provided). This is similar to disclosures required by pharma industry 
and in food products&lt;/em&gt;”. Such disclosures are necessary in these 
industries as the companies in this sector deal with critical aspects of
 human life. But are such requirements necessary for all activities and 
businesses? As long as organizations collect and process data, in a 
legal manner, within the sectoral regulation, why should such 
information have to be “reported”? Further, such bureaucratic processes 
and reporting requirements are only going to be a burden to existing 
legitimate businesses and give rise to a thriving regulatory license 
raj.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Further questions that arise are: How is any 
compliance agency going to make sure that all the underlying metadata is
 made available in a timely manner? As companies respond to a dynamic 
environment, their analysis and analytical tools change and so does the 
metadata. This inherent aspect of businesses raises the question: At 
what point in time should companies make their meta-data available? How 
will the compliance be monitored?&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Conclusion: The CoE 
needs to create an enabling and facilitating an environment for data 
sharing. The incentives for different types of entities to participate 
and contribute must be recognized. Adequate provisions for risks and 
liabilities arising out data sharing need to be thought through. 
National initiatives on data sharing should not create an onerous 
reporting regime, as envisaged by the CoE, even if digital.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p class="article-disclaimer"&gt;&lt;em&gt;DISCLAIMER:
 The views expressed are solely of the author and ETTelecom.com does not
 necessarily subscribe to it. ETTelecom.com shall not be responsible for
 any damage caused to any person/organisation directly or indirectly.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data'&gt;https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rekha Jain</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2020-11-10T17:44:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/reports/annual-programmatic-report-2018-2019">
    <title>Annual Programmatic Report 2018-2019</title>
    <link>https://cis-india.org/about/reports/annual-programmatic-report-2018-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/reports/annual-programmatic-report-2018-2019'&gt;https://cis-india.org/about/reports/annual-programmatic-report-2018-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-11-10T10:56:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india">
    <title>Investigating Encrypted DNS Blocking in India</title>
    <link>https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india</link>
    <description>
        &lt;b&gt;We find that encrypted DNS protocols are not blocked in India and share our test methodology.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This report was edited and reviewed by Gurshabad Grover and Simone Basso.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Domain Name System (DNS) translates human-readable web addresses, like ‘cis-india.org’, into machine-readable IP addresses, such as ‘172.67.211.18’, that the routers that comprise the internet can understand and direct traffic to. This basic function of the web has historically operated unencrypted — allowing intermediaries that facilitate access to the internet, like coffee shop Wi-Fi operators and internet service providers (ISPs), to view what websites we visit. This gap in privacy is being exploited by both public and private entities to &lt;a href="https://arxiv.org/abs/1912.08590"&gt;censor&lt;/a&gt; access to the web and &lt;a href="https://bits.blogs.nytimes.com/2015/02/18/atts-offer-share-your-data-for-personalized-ads-or-pay-more/?_r=0"&gt;surveil&lt;/a&gt; our browsing habits.&lt;/p&gt;
&lt;p&gt;New &lt;a href="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+-+The+Solutions"&gt;internet protocols&lt;/a&gt; are being deployed that attempt to encrypt connections to DNS providers. Through the use of these methods, the contents of DNS queries are hidden from network intermediaries and eavesdroppers and are only visible to the DNS provider chosen by an individual or a default one assigned to them by their ISP or web browser. While there are &lt;a href="https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites"&gt;other ways&lt;/a&gt; of censoring web traffic, encrypted DNS protocols prevent censors from using their older DNS-based methods. In response to these new protocols, states like Iran are trying to &lt;a href="https://ooni.org/post/2020-iran-dot/"&gt;block&lt;/a&gt; them entirely, to maintain the status quo.&lt;/p&gt;
&lt;p&gt;In this report, we investigate and find that encrypted DNS protocols, specifically the &lt;a href="https://tools.ietf.org/html/rfc8484"&gt;DNS over HTTPS&lt;/a&gt; (DoH) and &lt;a href="https://tools.ietf.org/html/rfc8310"&gt;DNS over TLS&lt;/a&gt; (DoT) standards, are accessible through major Indian ISPs, and describe the technical details of our testing methodology.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Test Setup&lt;/h4&gt;
&lt;p dir="ltr"&gt;We compiled a &lt;a href="https://gist.github.com/d1vyank/5f03302fdf961f0260175acc807d4942"&gt;list&lt;/a&gt; of publicly accessible DNS resolvers that support the encrypted DoH and DoT protocols and tested access to them from four popular Indian ISPs, namely Airtel, Atria Convergence Technologies (ACT), Reliance Jio, and Vodafone. Together, these cover a large majority (roughly 95%, as &lt;a href="https://web.archive.org/web/20200803100152/https://trai.gov.in/sites/default/files/PIR_30062020.pdf"&gt;reported&lt;/a&gt; by TRAI) of the Indian internet subscriber base.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To test connectivity, we used the Open Observatory for Network Interference (OONI) &lt;a href="https://github.com/ooni/probe-engine"&gt;probe engine&lt;/a&gt; (version &lt;a href="https://github.com/ooni/probe-engine/releases/tag/v0.18.0"&gt;0.18.0&lt;/a&gt;). Specifically, the ‘miniooni’ command-line interface tool bundled with it. Instructions on how to install this can be found &lt;a href="https://github.com/ooni/probe-engine#building-miniooni"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;Test methodology&lt;/h4&gt;
&lt;p dir="ltr"&gt;To test whether DNS providers are reachable over encrypted communication protocols, the tool performs a DNS query using the specified one (either DoH or DoT). If the connection is successful and we receive a response from the DNS server, we conclude that the protocol is not blocked. Failing to query a specific DNS server over DoT or DoH does not necessarily mean that it has been censored. To understand whether a failure could be censorship, rather than a transient error, we would correlate measurements from many users within the same ISP and country and use an alternate network, such as a VPN, to access the possibly blocked service from another country.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In Iran, where DNS over TLS is &lt;a href="https://ooni.org/post/2020-iran-dot/"&gt;reported&lt;/a&gt; to be blocked, it was found that censorship occurs by interfering with the TLS handshake. Traffic corresponding to DNS over TLS is easier to identify and block as it communicates over a unique port and a distinctive ALPN, while DNS over HTTPS traffic is harder to block effectively as the HTTPS standard is widely used on the web and interference would lead to &lt;a href="https://en.wikipedia.org/wiki/Collateral_freedom"&gt;collateral censorship&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;Results&lt;/h4&gt;
&lt;p dir="ltr"&gt;The tests were run on each ISP in early October 2020 using the following command:&lt;/p&gt;
&lt;div&gt;&lt;code&gt;$ ./miniooni --file=./resolvers.txt dnscheck&lt;/code&gt;&lt;/div&gt;
&lt;div&gt;&lt;code&gt;&lt;br /&gt;&lt;/code&gt;&lt;/div&gt;
&lt;p dir="ltr"&gt;The raw results in the OONI &lt;a href="https://github.com/ooni/spec/tree/master/data-formats"&gt;data format&lt;/a&gt; can be found &lt;a href="https://gist.github.com/d1vyank/be47bbcb90c1964c9279c9170b1c2ce0"&gt;here&lt;/a&gt;. A summary of the observations are as follows:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;All DNS resolvers tested were accessible over both DoH and DoT protocols from all ISPs tested.&lt;/li&gt;&lt;li&gt;IPv6 addresses were not reachable through ACT broadband. This limitation was independently confirmed using the &lt;a href="https://test-ipv6.com/"&gt;Test-IPv6 tool&lt;/a&gt; and has also been discussed on &lt;a href="https://www.reddit.com/r/bangalore/comments/gs2ibd/act_fibernet_ipv6/"&gt;Reddit&lt;/a&gt;.
&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Limitations&lt;/h4&gt;
&lt;p dir="ltr"&gt;As our &lt;a href="https://cis-india.org/internet-governance/blog/how-india-censors-the-web"&gt;previous research&lt;/a&gt; by the Centre for Internet and Society indicates, censorship practices vary across ISPs. While we find no evidence of encrypted DNS protocols being blocked on these four major ISPs, there may be others implementing such blocking.&lt;/p&gt;
&lt;p&gt;The second limitation is that these tests were run on a handful of connections from a couple of locations (Delhi and Bangalore). Web censorship mechanisms may vary by location within the country.&lt;/p&gt;
&lt;p&gt;Finally, the results only indicate the accessibility of encrypted DNS resolvers at a particular point in time. We have not put in place any continuous monitoring of the censorship of encrypted DNS protocols.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Conclusion&lt;/h4&gt;
&lt;p dir="ltr"&gt;Broadly, the legal framework of web censorship in India allows the Government and courts to ask ISPs to block access to online resources. The precise technical details of how to implement the censorship are left to the ISPs.&lt;/p&gt;
&lt;p&gt;Because of net neutrality obligations, ISPs are not supposed to arbitrarily block resources. Coupled with the fact that the use of encrypted DNS protocols is not related to any particular content/website deemed unlawful, it might be expected that ISPs are not blocking encrypted DNS protocols. However, previous evidence of arbitrary blocking by ISPs motivated us to study whether any major ISP was blocking the use of these protocols or preventing access to any third-party DNS server.&lt;/p&gt;
&lt;p&gt;As part of this exercise, we also contributed code to the OONI probe engine, making it easier for other researchers to test connectivity to multiple DNS providers.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india'&gt;https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-10-27T11:21:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra">
    <title>Mapping GLAM in Maharashtra</title>
    <link>https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra</link>
    <description>
        &lt;b&gt;This is a short study on mapping the digital transition in selected Galleries, Libraries, Archives and Museums (GLAM) institutions in Maharashtra, India, and exploring possibilities and challenges for collaborations with Wikimedia projects. Research was undertaken by Aaryaa Joshi, Dnyanada Gadre-Phadke, Kalyani Kotkar and Subodh Kulkarni; the report has been authored by Subodh Kulkarni with editorial oversight and support by Puthiya Purayil Sneha, and external review by Sumandro Chattapadhyay. This is part of a series of short-term studies undertaken by the CIS-A2K team in 2019–2020. &lt;/b&gt;
        
&lt;h2 dir="ltr"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The digital turn has been an important development for the cultural heritage sector in India, especially in the last decade, where access to internet and multimedia technologies has led to several advancements in the Galleries, Libraries, Archives and Museums (GLAM) space. This has also encouraged a multiplicity of uses of cultural content in diverse contexts. Several efforts have been undertaken in this space over the last decade, including state initiatives like the&amp;nbsp;&lt;a class="external-link" href="http://museumsofindia.gov.in/repository/"&gt;National Museum Collections digital repository&lt;/a&gt;, archival efforts at universities such as &lt;a href="http://www.jaduniv.edu.in/"&gt;Jadavpur University&lt;/a&gt; and private and individual initiatives such as the &lt;a href="https://ruralindiaonline.org/"&gt;People’s Archive of Rural India (PARI)&lt;/a&gt; and &lt;a href="https://indiancine.ma/"&gt;Indiancine.ma&lt;/a&gt;. Apart from developments in preservation, curation and content sharing there remain continued concerns related to access, infrastructure and linguistic barriers in this sector. Intellectual property rights, open access and privacy issues have also emerged as important issues for cultural institutions looking to open up their collections to a wider public.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Collaboration with open knowledge production spaces like &lt;a href="https://wikimediafoundation.org/"&gt;Wikimedia&lt;/a&gt; and &lt;a href="https://openglam.org/"&gt;OpenGLAM&lt;/a&gt; then offer important insights into possibilities now available with the digital turn for better public access to cultural content, but also in terms of the development of collaborative&amp;nbsp; archival efforts. Efforts such as &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:GLAM"&gt;GLAM-Wiki&lt;/a&gt; have been crucial in bridging the gap between cultural institutions and initiatives in the free knowledge movement. There is still however lack of documentation and research on the various kinds of existing collections and archival efforts afoot in India, and how they may benefit from better access through platforms like Wikimedia. This study maps a few of such GLAM institutions in Maharashtra, India, and reviews their collections, challenges and limitations to explore possibilities for better collaboration between cultural and public memory institutions through GLAM-Wiki initiatives.&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Research Questions and Method&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The study was framed by the following questions:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How has the digital transition in the GLAM sector in Maharashtra, India, impacted the process of creation and access to cultural content?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What are possible collaborations with open knowledge efforts like GLAM-Wiki?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The mapping of GLAM institutions was undertaken through questionnaires/surveys conducted with six GLAM institutions working in Pune district and one in Kolhapur district of Maharashtra state. The institutions were identified through existing networks established by &lt;a href="https://meta.wikimedia.org/wiki/User:Subodh_(CIS-A2K)"&gt;Subodh Kulkarni&lt;/a&gt;, &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K"&gt;CIS-A2K&lt;/a&gt; Programme Officer associated with Wikimedia projects working in this area and snowball sampling. The questionnaires were focused on the nature, objective and scope of the collections, funding, provenance, offline and online workflows (including acquiring, preservation, accessioning, digitisation and metadata standards), human resources, infrastructure, IPR policies and public outreach efforts. The questionnaires were administered with the help of the Programme Officer and volunteers working in this language community. The questionnaire with Marathi translation is given in &lt;a href="https://cis-india.org/GLAM-Mapping-Report-A2K" class="external-link"&gt;Annexure I.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The mapping helped to produce a set of recommendations for possible GLAM-Wiki collaborations in the Indian context. This was done through field visits to these institutions, review of the material, and interviews with key resource persons (administrators, faculty and students, archivists, librarians, developers etc.) who manage the collections of cultural content.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The following seven GLAM institutions were visited during the period November 2019 to February 2020. Further visits were cancelled due to the COVID-19 pandemic situation. Three Wikimedians — &lt;a href="https://mr.wikipedia.org/wiki/User:%E0%A4%9C%E0%A5%8D%E0%A4%9E%E0%A4%BE%E0%A4%A8%E0%A4%A6%E0%A4%BE_%E0%A4%97%E0%A4%A6%E0%A5%8D%E0%A4%B0%E0%A5%87-%E0%A4%AB%E0%A4%A1%E0%A4%95%E0%A5%87"&gt;User:ज्ञानदा गद्रे-फडके&lt;/a&gt;, &lt;a href="https://mr.wikipedia.org/wiki/User:%E0%A4%86%E0%A4%B0%E0%A5%8D%E0%A4%AF%E0%A4%BE_%E0%A4%9C%E0%A5%8B%E0%A4%B6%E0%A5%80"&gt;User:आर्या जोशी&lt;/a&gt; &amp;amp; &lt;a href="https://mr.wikipedia.org/wiki/User:%E0%A4%95%E0%A4%B2%E0%A5%8D%E0%A4%AF%E0%A4%BE%E0%A4%A3%E0%A5%80_%E0%A4%95%E0%A5%8B%E0%A4%A4%E0%A4%95%E0%A4%B0"&gt;User:कल्याणी कोतकर&lt;/a&gt; uploaded&amp;nbsp; images of these collections on &lt;a href="https://commons.wikimedia.org/wiki/Category:GLAM_Mapping_in_Maharashtra"&gt;Wikimedia Commons&lt;/a&gt;, and added/expanded five related articles on Marathi Wikipedia — &lt;a href="https://mr.wikipedia.org/wiki/%E0%A4%B0%E0%A4%BE%E0%A4%9C%E0%A4%BE_%E0%A4%A6%E0%A4%BF%E0%A4%A8%E0%A4%95%E0%A4%B0_%E0%A4%95%E0%A5%87%E0%A4%B3%E0%A4%95%E0%A4%B0_%E0%A4%B8%E0%A4%82%E0%A4%97%E0%A5%8D%E0%A4%B0%E0%A4%B9%E0%A4%BE%E0%A4%B2%E0%A4%AF"&gt;राजा दिनकर केळकर संग्रहालय&lt;/a&gt;, &lt;a href="https://mr.wikipedia.org/wiki/%E0%A4%AA%E0%A5%81%E0%A4%A3%E0%A5%87_%E0%A4%A8%E0%A4%97%E0%A4%B0_%E0%A4%B5%E0%A4%BE%E0%A4%9A%E0%A4%A8_%E0%A4%AE%E0%A4%82%E0%A4%A6%E0%A4%BF%E0%A4%B0"&gt;पुणे नगर वाचन मंदिर&lt;/a&gt;, &lt;a href="https://mr.wikipedia.org/wiki/%E0%A4%B8%E0%A4%BE%E0%A4%B0%E0%A5%8D%E0%A4%B5%E0%A4%9C%E0%A4%A8%E0%A4%BF%E0%A4%95_%E0%A4%B5%E0%A4%BE%E0%A4%9A%E0%A4%A8%E0%A4%BE%E0%A4%B2%E0%A4%AF,_%E0%A4%B0%E0%A4%BE%E0%A4%9C%E0%A4%97%E0%A5%81%E0%A4%B0%E0%A5%81%E0%A4%A8%E0%A4%97%E0%A4%B0"&gt;सार्वजनिक वाचनालय, राजगुरुनगर&lt;/a&gt;, and &lt;a href="https://mr.wikipedia.org/wiki/%E0%A4%86%E0%A4%AA%E0%A4%9F%E0%A5%87_%E0%A4%B5%E0%A4%BE%E0%A4%9A%E0%A4%A8_%E0%A4%AE%E0%A4%82%E0%A4%A6%E0%A4%BF%E0%A4%B0"&gt;आपटे वाचन मंदिर&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Observations about Research Method&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The study was done with the help of three active Wikimedians, Aaryaa Joshi (Username:आर्या जोशी), Dnyanada Gadre-Phadke (Username:ज्ञानदा गद्रे-फडके) &amp;amp; Kalyani Kotkar (Username:कल्याणी कोतकर) interested in GLAM related activities. The questionnaire was developed with their participation. Orientation sessions were conducted to discuss the research design, process and outputs. The potential areas for bringing content into various Wikimedia projects were explained. While these Wikimedians conducted the visits for this mapping voluntarily, the actual expenses on travel, refreshments etc. were reimbursed. These volunteers had to carve out time slots from their regular jobs to complete the task. The timings at institutions and availability of key persons also needed to be considered while planning the visits. Sometimes the volunteers had to take leave from their regular work, which also led to some difficulties.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The first visit was to establish an association with the institution and the persons. The meeting with the authorities at the institution was essential to get the consent forms signed and complete other such formalities, including permissions to conduct interviews. This process delayed the work slightly, but is an important learning in terms of the need to establish a rapport with institutions for such research. The questionnaire was translated into Marathi (the local language) to facilitate the discussions. It was felt that to cover the basic aspects of the collections at an institution, at least 4–5 visits are required with a little gap between visits. This regular frequency will help to build relationships as well as maintain the work flow. The sample size for the present study was small due to some unforeseen constraints such as getting enough number of interested volunteer Wikimedians to undertake some of the research, multiple visits required for each institution which extended the duration of fieldwork, lack of positive responses from the GLAM institutions as well as eventual restrictions due to the COVID-19 pandemic.&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Survey of GLAM in Maharashtra&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;To identify the major institutions in Maharashtra and prepare the list of major GLAM institutions in the state, various government and private official websites as well as publications were studied. It was realised that no website or publication has created a comprehensive district or statewide list of&amp;nbsp; institutions. Information about a few institutions is available online, but these are helpful largely from a tourism point of view. There is no proper selection or thematic categorisation which considers researchers, students, or other communities of interest. The popular tourist routes are given importance. Therefore, there is a need to document all the GLAMs category-wise on platforms freely accessible to the public. Some of the websites are listed in &lt;a href="https://cis-india.org/GLAM%20Mapping%20Report%20A2K" class="external-link"&gt;Annexure II&lt;/a&gt;&lt;a href="https://cis-india.org/GLAM%20Mapping%20Report%20A2K" class="external-link"&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Description of Surveyed Institutions&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;strong style="text-align: justify;"&gt;Apte Vachan Mandir, Ichalkaranji&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/Art_gallery_at_Apte_vachan_mandir_Ichalkaranji.jpg/image_preview" title="Art_gallery_at_Apte_vachan_mandir,_Ichalkaranji" align="middle" height="300" width="550" alt="Art_gallery_at_Apte_vachan_mandir,_Ichalkaranji" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp; &lt;em&gt;&amp;nbsp;Art Gallery at Apte Vachan Mandir, Ichalkaranji. By&amp;nbsp;&lt;a href="https://commons.wikimedia.org/wiki/User:%E0%A4%9C%E0%A5%8D%E0%A4%9E%E0%A4%BE%E0%A4%A8%E0%A4%A6%E0%A4%BE_%E0%A4%97%E0%A4%A6%E0%A5%8D%E0%A4%B0%E0%A5%87-%E0%A4%AB%E0%A4%A1%E0%A4%95%E0%A5%87"&gt;ज्ञानदा गद्रे-फडके&lt;/a&gt;,&amp;nbsp;&lt;a href="https://commons.wikimedia.org/wiki/File:Art_gallery_at_Apte_vachan_mandir,_Ichalkaranji.jpg"&gt;Art gallery at Apte vachan mandir, Ichalkaranji&lt;/a&gt;,&amp;nbsp;&lt;a href="https://creativecommons.org/licenses/by-sa/4.0/legalcode"&gt;CC BY-SA 4.0&lt;/a&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;
&lt;a href="http://www.aptewachan.org/"&gt;Apte Vachan Mandir&lt;/a&gt; is a 150 year old library in a small city named Ichalkaranji in Kolhapur district of Maharashtra. The authorities are very cooperative and eager to start digitization of the old/rare books and art gallery. They also need help regarding digitisation and preservation of the century old paintings. The institute is ready to scan the books if equipment and training is provided to their staff. The officials have given the list of 400+ rare books which they are planning to digitise. The official communication has&amp;nbsp; started with the secretary of the institution. The further process stalled due to the COVID-19 pandemic.&lt;/p&gt;
&lt;p&gt;&lt;strong style="text-align: justify;"&gt;Iravati Karve Anthropological Museum, Pune&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.unipune.ac.in/dept/mental_moral_and_social_science/anthropology/antropology_webfiles/Musium.htm"&gt;Iravati Karve Anthropological Museum&lt;/a&gt;&lt;span style="text-align: justify;"&gt; is located in the Savitribai Phule Pune University campus, Pune. The initial visit was conducted and permission was sought for further documentation. The curator and authorities have extended all possible cooperation regarding open knowledge access to the museum collections urther visits could not be undertaken due to the restrictions as a result of the COVID-19 pandemic.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span style="text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Joshi’s Museum of Miniature Railways&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="https://www.minirailways.com/"&gt;Joshi’s Museum of Miniature Railways&lt;/a&gt; was founded in 1998 by B. S. Joshi in Pune city. It houses different models of trains, railway stations, tracks with signals, bridges, streets in the cities, circus etc. Light and sound shows are also arranged here. This is a unique collection in India. One can get an experience of scientific concepts, handicraft, technology, history, amusement related artifacts at one place. The authorities of this museum do not feel the need of digitization as it is a live show which gives the best experience. However the documentation of the development process regarding railway models present in the museum is important. They wish to increase the outreach through publicity of the museum on free knowledge platforms to attract visitors to increase the footfall. As it is a privately owned museum, it is getting difficult to maintain it or add new things to it. So, there is scope for some kind of engagement with this museum.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Museum in College of Military Engineering, Pune&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="https://www.irfca.org/gallery/Heritage/CME-Museum/"&gt;College of Military Engineering&lt;/a&gt; is a premier institute for army training in India established in 1943. The museum houses vintage engineering equipment from the pre-World War I era, which is displayed over a large landscape. The archives of the corps are also maintained in the library section. Permission for an initial visit was received late due to administrative procedures. Further visits for interviews with the key officials were planned but cancelled due to the lockdown following the COVID-19 pandemic. But there is scope to document the rare machinery, engineering structures, military vehicles etc. as it is openly accessible to the public. The institute is also keen to spread this knowledge to young generations.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Pune Nagar Vachan Mandir&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;strong&gt;&lt;img src="https://cis-india.org/a2k/blogs/copy_of______4.jpg/image_preview" title="Pune nagar  vachan" height="300" width="550" alt="Pune nagar  vachan" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;span id="docs-internal-guid-ce138273-7fff-3e8c-3337-8f071744d5e6"&gt;&lt;em&gt;Pune Nagar Vachan Mandir Library. By &lt;a href="https://commons.wikimedia.org/wiki/User:%E0%A4%A6%E0%A4%BF%E0%A4%AA%E0%A4%95_%E0%A4%95%E0%A5%8B%E0%A4%A4%E0%A4%95%E0%A4%B0"&gt;दिपक कोतकर&lt;/a&gt;, &lt;a href="https://commons.wikimedia.org/wiki/File:%E0%A4%AA%E0%A5%81%E0%A4%A3%E0%A5%87%20%E0%A4%A8%E0%A4%97%E0%A4%B0%20%E0%A4%B5%E0%A4%BE%E0%A4%9A%E0%A4%A8%20%E0%A4%AE%E0%A4%82%E0%A4%A6%E0%A4%BF%E0%A4%B0%20%E0%A4%97%E0%A5%8D%E0%A4%B0%E0%A4%82%E0%A4%A5%E0%A4%BE%E0%A4%B2%E0%A4%AF%204.jpg"&gt;पुणे नगर वाचन मंदिर ग्रंथालय 4&lt;/a&gt;, &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/legalcode"&gt;CC BY-SA 4.0&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="http://www.punenagarvachan.org/"&gt;Pune Nagar Vachan Mandir&lt;/a&gt; is a historic library in Pune founded in 1848. The library houses a rich collection with rare books in various languages from the 17th century. It also possesses historical manuscripts and valuable diaries. The library management is very up to date on new developments in the field&amp;nbsp; and has already adopted web technologies for catering to members. The catalogues are made available online in &lt;a href="https://koha-community.org/"&gt;Koha&lt;/a&gt;. They have started digitisation efforts to some extent but need inputs and support. The authorities are eager to collaborate on larger projects to make their resources freely available. The authorities are ready to give the database of books for further integration with Wikimedia projects.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong id="docs-internal-guid-313b0f93-7fff-7fc2-0133-57e2a7f9c8df"&gt;Raja Dinkar Kelkar Museum&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="http://rajakelkarmuseum.org/about.html"&gt;Raja Dinkar Kelkar Museum&lt;/a&gt; was founded in 1920 by Dinkar Kelkar in Pune city. This museum houses 22,000 rare artifacts from different historical times. The thematic galleries have been developed thoughtfully. The museum has published 8 catalogues on these themes. More details of this museum can be seen on the official website.&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;img src="https://cis-india.org/a2k/blogs/copy_of__.jpg/image_preview" title="Mastani mahal" height="300" width="550" alt="Mastani mahal" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;span id="docs-internal-guid-c7c43d70-7fff-a710-c0ff-28420cb2098f"&gt;&lt;em&gt;Mastani Mahal restored at Raja Dinkar Kelkar Museum,Pune. By &lt;a href="https://commons.wikimedia.org/wiki/User:%E0%A4%86%E0%A4%B0%E0%A5%8D%E0%A4%AF%E0%A4%BE_%E0%A4%9C%E0%A5%8B%E0%A4%B6%E0%A5%80"&gt;आर्या जोशी&lt;/a&gt;, &lt;a href="https://commons.wikimedia.org/wiki/File:%E0%A4%AE%E0%A4%B8%E0%A5%8D%E0%A4%A4%E0%A4%BE%E0%A4%A8%E0%A5%80%20%E0%A4%AE%E0%A4%B9%E0%A4%BE%E0%A4%B2.jpg"&gt;मस्तानी महाल&lt;/a&gt;, &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/legalcode"&gt;CC BY-SA 4.0&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;span id="docs-internal-guid-89a616fd-7fff-dc9d-d9c3-37b139766c1d"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This museum is partially funded by the State Government for some regular maintenance. The funds for development, upgradation, conservation and promotion are to be raised by the institution. A digitisation project has been&amp;nbsp; planned by the museum authorities, and it is progressing as the resources are being arranged. The museum officials are open to share information digitally in the public domain. They believe that they can reach interested masses through Wikimedia Projects. They have given permission to photograph the objects and the various conservation practices in their laboratory. They have expressed their readiness to give free access to libraries and museums for Wikimedians visiting the institution for purposes of research.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Rajgurunagar Public Library, Rajgurunagar&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Rajgurunagar Public Library is a 150 plus year old Public access library with a competitive examination center. The special features are rare books from the 19th century and manuscripts. The management was not aware of Wikimedia projects, Open source cataloging, Unicode data entry systems etc. But after the visit, the officials responded very positively to start digitisation of 25 rare books in collaboration with the Access to Knowledge programme, Centre for Internet and Society and &lt;a href="http://vigyanashram.com/"&gt;Vigyan Ashram, Pabal&lt;/a&gt;. The task was completed and these books were digitised and uploaded on Wikimedia Commons by creating a &lt;a href="https://commons.wikimedia.org/wiki/Category:Books_with_Public_Library,_Rajgurunagar_published_before_1900"&gt;separate category&lt;/a&gt;. As the manuscripts and other material is getting degenerated, this collection&amp;nbsp; needs to be digitised at the earliest.&lt;/p&gt;
&lt;h2&gt;Observations&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;strong style="text-align: justify;"&gt;Target audience&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The GLAM institutions, especially&amp;nbsp; museums and libraries&amp;nbsp; are facing a decrease in footfall in recent times. The officials feel that uploading material on the web under free licenses will further aid this trend. At the same time they also express their interest and ideas to attract a new generation to engage with these collections through promotional mobile apps. There are however persistent anxieties about public access to these materials on the web. Some institutions possess unique or rare material such as antiquities, manuscripts, live models or books. The officials fear that the institutions will lose their points of attraction if they are projected on the web with descriptions. On the other hand, the researchers and interested communities are unaware of such treasures with these institutions.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;Sustainability&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Sustenance of the institutions is another important point and obstacle in digitisation of collections. The publications of the museums are a source of revenue for them. As the entry fees or subscription charges need to be kept minimal for the visitors, the priced material sold at the counters is the only income source for these institutions. Hence, there is a limitation of online availability and&amp;nbsp; promotion of this material. Finding a sustainable model which also allows for open access to content is a difficult task for a large number of organisations. The financial support to these institutions is not a priority area for Government agencies or philanthropic organisations. Some institutions have successfully attempted for corporate social responsibility (CSR) funding. They need professional inputs for fundraising campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Technical challenges&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;There are also technical challenges with the digitisation process itself. Some of the libraries have not adopted a universal cataloging system. Therefore it is difficult to analyse the data of books according to copyright status and physical conditions. The authorities are eager to dispose of decaying material after digitisation. Some of them have approached State Government departments for funds but got no response. This may be because standard digitisation policies are not in place at a national level, and a lot of institutions are unaware of existing benchmarks and policies. Another hindrance is that the books will not be permitted to be taken outside the institution for scanning because of the physical condition. Awareness and training in archival and records management is a key requirement in these conditions.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Capacity building&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The awareness and capacity building of the personnel at the institutions in the area of free knowledge and digitisation skills is to be enhanced before starting any project. The terminologies and case studies of some projects in local languages are necessary for better understanding of concepts as well as best practices. Some of the good archive projects in Marathi completed by various organisations include digitisation of the complete works of &lt;a href="http://www.vinoba.in/#/books"&gt;Vinoba Bhave&lt;/a&gt;, &lt;a href="http://prabodhankar.org/samagra-sahitya"&gt;Prabodhankar Thakeray&lt;/a&gt; and &lt;a href="https://www.savarkarsmarak.com/downloadbooks.php"&gt;Vinayak Savarkar&lt;/a&gt;. The language department of the State Government of Maharashtra has also digitised and uploaded 129 old books and 555 old magazines on their &lt;a href="https://rmvs.marathi.gov.in/books"&gt;website&lt;/a&gt;. The other &lt;a href="https://sahitya.marathi.gov.in/%E0%A4%87-%E0%A4%AC%E0%A5%81%E0%A4%95-%E0%A4%A1%E0%A4%BE%E0%A4%8A%E0%A4%A8%E0%A4%B2%E0%A5%8B%E0%A4%A1"&gt;website of the literature &amp;amp; culture department&lt;/a&gt; has made available 434 books in PDF, epub and mobi format.&lt;/p&gt;
&lt;br /&gt;
&lt;h2&gt;Recommendations&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;These recommendations are based on the interactions with the Wikimedians involved in the process, the interviews with key persons from seven GLAM institutions and previous experiences of working with such institutions. The important learnings from this research study are captured in the observations stated above. As the focus of the discussions remained limited to the access to cultural content and possible collaborations regarding Wikimedia Projects, the content creation aspect was not touched upon in detail. The recommendations emerging&amp;nbsp; from this study provide some guidelines for action points for the&amp;nbsp; near future. However, for designing broader strategies for the GLAM sector,&amp;nbsp; a sizable number of institutions in different regions of the state need to be mapped to provide a more comprehensive picture of the sector and its possibilities&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The recommendations regarding various stakeholders in the mapping process are stipulated below -&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;For Wikimedians&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Orientation sessions for Wikimedians visiting the institute regarding GLAM related Wikimedia projects, copyright issues, Creative commons licenses and basics of library science should be conducted. The availability of resource material on these topics in local languages will be useful in the interview process.&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;For replicating this mapping&amp;nbsp; activity across one state or several states, the selection of Wikimedia volunteers is crucial. The provision for reasonable honorarium per visit should be made for time bound as well as qualitative execution of tasks.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;For GLAM institutions&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It was observed that the GLAM institutions are not well aware about the free knowledge platforms like &lt;a href="https://wikimediafoundation.org/our-work/wikimedia-projects/"&gt;Wikimedia projects&lt;/a&gt; or &lt;a href="https://archive.org/"&gt;Internet archive&lt;/a&gt;. They are aware about copyright and intellectual property rights, but not about &lt;a href="https://creativecommons.org/"&gt;Creative Commons&lt;/a&gt; or other licenses available. They wish to make their resources available across the world but are not clear about the methods. The collaboration regarding these aspects is highly appreciated.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Old libraries have a good collection of rare old books. They are finding difficulties in preservation of books as well as facing space constraints. Also for these books, readership is also negligible. Hence there is a need to digitise this valuable reference material before it degenerates.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;For CIS (or other implementing agency)&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A comprehensive list of GLAM institutions in the state, with further categorisation into geographical &amp;amp; thematic aspects is to be developed and be made freely accessible for the public at large.&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Training in universal metadata structures and unicode systems like Koha is to be arranged for the staff and management members at these institutions. At least the cataloging in universal format should be done on priority to analyse the metadata for copyright free status. A central repository is needed to avoid duplication in scanning. CIS-A2K needs to design strategic plan for this activity.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;For in-depth case studies of potential GLAM-Wiki institutions, &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Wikimedian_in_residence"&gt;Wikimedian in Residence (WiR)&lt;/a&gt;&amp;nbsp;programme should be adopted.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Interactions with concerned State and Central Government departments would facilitate the research activity and further collaborations. The findings of the research could be shared with such agencies along with concrete project proposals designed in collaboration with concerned institutions.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;As illustrated by the observations of this study, the digital turn has brought about significant changes in the cultural heritage sector, but a large part of these still pertain to concerns around access to cultural content. The role of digital technologies and free knowledge platforms like Wikipedia in addressing these issues of access and outreach, and importantly in content creation therefore remains to be explored, through a more comprehensive study of the sector. Further, the study has also been indicative of the potential of collaborative work, and efforts needed towards the same, which may be helpful in also contributing towards a broader strategy for GLAM work with Wikimedia projects in Indian languages.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Read this report on Wikimedia Meta-Wiki &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Research:Mapping_GLAM_in_Maharashtra,_India"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra'&gt;https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Subodh Kulkarni</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>A2K Research</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2021-05-15T12:30:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf">
    <title>Artificial Intelligence: A Full-Spectrum Regulatory Challenge (Working Draft) PDF</title>
    <link>https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf'&gt;https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-08-04T06:07:47Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging">
    <title>The State of Secure Messaging</title>
    <link>https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging</link>
    <description>
        &lt;b&gt;A look at the protections provided by and threats posed to secure communication online.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This blogpost was edited by Gurshabad Grover and Amber Sinha.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The current benchmark for secure communication online is 
end-to-end encrypted messaging. It refers to a method of encryption 
wherein the contents of a message are only readable by the devices of 
the individuals, or endpoints, participating in the communication. All 
other Internet intermediaries such as internet service providers, 
internet exchange points, undersea cable operators, data centre 
operators, and even the messaging service providers themselves cannot 
read them. This is achieved through cryptographic &lt;a href="https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange"&gt;mechanisms&lt;/a&gt;
 that allow independent devices to establish a shared secret key over an
 insecure communication channel, which they then use to encrypt and 
decrypt messages. Common examples of end-to-end encrypted messaging are 
applications like Signal and WhatsApp.&lt;/p&gt;
&lt;p dir="ltr"&gt;This post attempts to give at-risk individuals, concerned 
citizens, and civil society at large a more nuanced understanding of the
 protections provided and threats posed to the security and privacy of 
their communications online.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Threat Model&lt;/h4&gt;
&lt;p dir="ltr"&gt;The first step to assessing security and privacy is to 
identify and understand actors and risks. End-to-end encrypted messaging
 applications consider the following threat model:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Device compromise: Can happen physically through loss or 
theft, or remotely. Access to an individual’s device could be gained 
through technical flaws or coercion (&lt;a href="https://www.eff.org/wp/digital-privacy-us-border-2017"&gt;legal&lt;/a&gt;, or &lt;a href="https://xkcd.com/538/"&gt;otherwise&lt;/a&gt;). It can be temporary or be made persistent by installing &lt;a href="https://citizenlab.ca/2019/10/nso-q-cyber-technologies-100-new-abuse-cases/"&gt;malware&lt;/a&gt; on the device.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Network monitoring and interference: Implies access to data
 in transit over a network. All Internet intermediaries have such 
access. They may either actively interfere with the communication or 
passively &lt;a href="https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/"&gt;observe&lt;/a&gt; traffic.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Server compromise: Implies access to the web server hosting
 the application. This could be achieved through technical flaws, 
insider access such as an employee, or through coercion (&lt;a href="https://en.wikipedia.org/wiki/Investigatory_Powers_Act_2016"&gt;legal&lt;/a&gt;, or otherwise).&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;End-to-end encrypted messaging aims to offer complete 
message confidentiality and integrity in the face of server and network 
compromise, and some protections against device compromise. These are 
detailed below.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Protections Provided&lt;/h4&gt;
&lt;p dir="ltr"&gt;Secure messaging services guarantee certain properties. For
 mature services that have received adequate study from researchers, we 
can assume them to be sound, barring implementation flaws which are 
described later.&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Confidentiality: The contents of a message are kept private and the ciphers used are &lt;a href="https://pthree.org/2016/06/19/the-physics-of-brute-force/"&gt;practically&lt;/a&gt; unbreakable by adversaries.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Integrity: The contents of a message cannot be modified in transit.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Deniability: Aims to mimic unrecorded real-world 
conversations where an individual can deny having said something. 
Someone in possession of the chat transcript cannot &lt;em&gt;cryptographically&lt;/em&gt;
 prove that an individual authored a particular message. While some 
applications feature such off-the-record messaging capabilities, the 
legal applicability of such mechanisms is &lt;a href="https://debian-administration.org/users/dkg/weblog/104"&gt;debatable&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Forward and Future Secrecy: These properties aim to limit 
the effects of a temporary compromise of credentials on a device. 
Forward secrecy ensures messages collected over the network, which were 
sent before the compromise, cannot be decrypted. Future secrecy ensures 
messages sent post-compromise are protected. These mechanisms are easily
 circumvented in practice as past messages are usually stored on the 
device being compromised, and future messages can be obtained by gaining
 persistent access during compromise. These properties are meant to 
protect individuals &lt;a href="https://hal.inria.fr/hal-01966560/document"&gt;aware&lt;/a&gt; of these limitations in exceptional situations such as a journalist crossing a border.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h4 dir="ltr"&gt;Shortcomings&lt;/h4&gt;
&lt;p dir="ltr"&gt;While secure messaging services offer useful protections 
they also have some shortcomings. It is useful to understand these and 
their mitigations to minimise risk.&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Metadata: Information about a communication such as &lt;strong&gt;who&lt;/strong&gt; the participants are, &lt;strong&gt;when&lt;/strong&gt; the messages are sent, &lt;strong&gt;where&lt;/strong&gt; the participants are located, and &lt;strong&gt;what&lt;/strong&gt;
 the size of a message is can offer important contextual information 
about a conversation. While some popular messaging services &lt;a href="https://signal.org/blog/sealed-sender/"&gt;attempt&lt;/a&gt;
 to minimize metadata generation, metadata leakage, in general, is still
 considered an open problem because such information can be gleaned by 
network monitoring as well as from server compromise. Application 
policies around whether such data is stored and for how long it is 
retained can improve privacy. There are also &lt;a href="https://ricochet.im/"&gt;experimental&lt;/a&gt; approaches that use techniques like onion routing to hide metadata.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Authentication: This is the process of asserting whether an
 individual sending or receiving a message is who they are thought to 
be. Current messaging services trust application servers and cell 
service providers for authentication, which means that they have the 
ability to replace and impersonate individuals in conversations. 
Messaging services offer advanced features to mitigate this risk, such 
as notifications when a participant’s identity changes, and manual 
verification of participants’ security keys through other communication 
channels (in-person, mail, etc.).&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Availability: An individual’s access to a messaging service
 can be impeded. Intermediaries may delay or drop messages resulting in 
what is called a denial of service attack. While messaging services are 
quite resilient to such attacks, governments may censor or completely 
shut down Internet access.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Application-level gaps: Capabilities offered by services in
 addition to messaging, such as contact discovery, online status, and 
location sharing are often &lt;a href="https://www.forbes.com/sites/thomasbrewster/2017/01/22/whatsapp-facebook-backdoor-government-data-request/"&gt;not covered&lt;/a&gt;
 by end-to-end encryption and may be stored by the application server. 
Application policies around how such information is gathered and 
retained affect privacy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Implementation flaws and backdoors: Software or hardware 
flaws (accidental or intentional) on an individual’s device could be 
exploited to circumvent the protections provided by end-to-end 
encryption. For mature applications and platforms, accidental flaws are 
difficult and &lt;a href="https://arstechnica.com/information-technology/2019/09/for-the-first-time-ever-android-0days-cost-more-than-ios-exploits/"&gt;expensive&lt;/a&gt; to exploit, and as such are only accessible to Government or other 
powerful actors who typically use them to surveil individuals of 
interest (and not for mass surveillance). Intentional flaws or backdoors
 introduced by manufacturers may also be present. The only defence 
against these is security researchers who rely on manual inspection to 
examine software and network interactions to detect them.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h4 dir="ltr"&gt;Messaging Protocols and Standards&lt;/h4&gt;
&lt;p dir="ltr"&gt;In the face of demands for exceptional access to encrypted 
communication from governments, and risks of mass surveillance from both
 governments and corporations, end-to-end encryption is important to 
enable secure and private communication online. The signal protocol, 
which is open and adopted by popular applications like WhatsApp and 
Signal, is considered a success story as it brought end-to-end 
encryption to over a billion users and has become a de-facto standard.&lt;/p&gt;
&lt;p dir="ltr"&gt;However, it is unilaterally developed and controlled by a single organisation. Messaging Layer Security (or &lt;a href="https://datatracker.ietf.org/wg/mls/about/"&gt;MLS&lt;/a&gt;)
 is a working group within the Internet Engineering Task Force (IETF) 
that is attempting to standardise end-to-end encryption through 
participation of individuals from corporations, academia, and civil 
society. The draft protocol offers the standard security properties 
mentioned above, except for deniability which is still being considered.
 It incorporates novel research that allows it to scale efficiently for 
large groups up to thousands of participants, which is an improvement 
over the signal protocol. MLS aims to increase adoption further by 
creating open standards and implementations, similar to the Transport 
Layer Security (TLS) protocol used to encrypt much of the web today. 
There is also a need to look beyond end-to-end encryption to address its
 shortcomings, particularly around authentication and metadata leakage.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging'&gt;https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>IETF</dc:subject>
    

   <dc:date>2020-07-17T08:12:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability">
    <title>Response to the ‘Call for Comments’ on The Santa Clara Principles on Transparency and Accountability</title>
    <link>https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability</link>
    <description>
        &lt;b&gt;The Santa Clara Principles on Transparency and Accountability, proposed in 2018, provided a robust framework of transparency reporting for online companies dealing with user-generated content. In 2020, the framework underwent a period of consultation "to determine whether the Santa Clara Principles should be updated for the ever-changing content moderation landscape." 

In lieu of this, we presented our responses, which are in-line with our previous research and findings on transparency reporting of online companies, especially in context of the Indian digital space.&lt;/b&gt;
        
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;The authors would like to thank Gurshabad Grover for his editorial suggestions. A PDF version of the responses is also available &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/Submissions-SCP"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;-------&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;1. Currently the Santa Clara Principles focus on the need for numbers, notice, and appeals around content moderation. This set of questions will address whether these categories should be expanded, fleshed out further, or revisited.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;a. The first category sets the standard that companies should publish the numbers of posts removed and accounts permanently or temporarily suspended due to violations of their content guidelines. Please indicate any specific recommendations or components of this category that should be revisited or expanded.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;While the Principles provide a robust framework for content moderation practices carried out by the companies itself, we believe that the framework could be expanded significantly to include more detailed metrics on government requests for content takedown, as well as for third-party requests. For government requests, this information should include the number of takedown requests received, the number of requests granted (and the nature of compliance - including full, partial or none), the number of items identified in these requests for takedown, and the branch of the government that the request originated from (either from an executive agency or court-sanctioned).&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Information regarding account restrictions, with similar levels of granularity, must also form a part of this vertical. These numbers must be backed with further details on the reasons ascertained by the government for demanding takedowns, i.e.&amp;nbsp; the broad category under which content was flagged. For third party requests, similar metrics should be applied wherever appropriate.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, for companies owning multiple platforms, information regarding both internal content moderation and moderation at the behest of external requests (either by the state or third-parties), must be broken down platform-wise. Alternatively, they should publish separate transparency reports for each platform they own.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;b. The second category sets the standard that companies should provide notice to each user whose content is taken down or account is suspended about the reason for the removal or suspension. Please indicate any specific recommendations or components of this category that should be revisited or expanded.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;While this category envisages companies to provide notice to its users across removals related to all categories of content, additional research reveals that oftentimes, &lt;a href="https://help.twitter.com/en/rules-and-policies/twitter-legal-faqs"&gt;companies&lt;/a&gt; create further categorization of ‘exceptional circumstances’, where it may hold the discretion for not sending a notice, including for CSAM or threats to life. While the intent behind such categorization might be understandable, we believe that any list of exceptional circumstances should not be ideally left to company discretions, and must be prepared in a collaborative fashion. Accordingly, we recommend that the Principles be expanded to identify a limited set of exceptional circumstances, where not sending a notice to a user would be permissible, and would not count as a violation of the Principles.&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, while the current framework provides requirements for granular details in the notice in case of content flagged by the company’s internal moderation standards, we believe a similar model should also be emulated for content removals at the behest of the state. When a piece of content has been identified as illegal by a government takedown request, then the notice issued by the company to the user should be as granular as possible, within the permissible limits of the law under which the takedown request was issued in the first place. Such granularity must include, among other things, the exact legal provision under which the content has been flagged, and the reasons that the government has given in implementing this flagging.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;c. The third category sets the standard that companies should provide a meaningful opportunity for timely appeal of any content removal or account suspension. Please indicate any specific recommendations or components of this category that should be revisited or expanded.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Currently, the category of ‘appeals’ in the Santa Clara Principles is focussed on having accountability processes in places, and emphasize on the need of having meaningful review. The framework of the Principles also currently envisage only internal review processes carried out by the company. However, in light of Facebook unveiling its plans for an &lt;a href="https://www.nytimes.com/2020/05/06/opinion/facebook-oversight-board.html"&gt;Oversight&lt;/a&gt; &lt;a href="https://about.fb.com/wp-content/uploads/2020/01/Bylaws_v6.pdf"&gt;Board&lt;/a&gt;, a structurally independent body, which would arbitrate select appeal cases of content moderation, these pre-existing principles might need revisiting.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;While the Oversight Board is a relatively novel concept, given the important precedence it sets, setting certain fundamental principles of transparent disclosures and accountable conduct around it, might allow researchers and regulators alike to gauge the efficacy of this initiative. Accordingly, the Principles should consider some base-level disclosures that the company must make when it is referring a select category of cases for independent external review. This might include a statement of reasons explaining why certain cases were prioritized for independent review, and in the instance that the decision hinges on a public interest question, then the proceedings of the independent review might also be required to be made public (with due recourse paid to security issues and the confidentiality of the parties involved).&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;2. Do you think the Santa Clara Principles should be expanded or amended to include specific recommendations for transparency around the use of automated tools and decision-making (including, for example, the context in which such tools are used, and the extent to which decisions are made with or without a human in the loop), in any of the following areas:&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Content moderation (the use of artificial intelligence to review content and accounts and determine whether to remove the content or accounts; processes used to conduct reviews when content is flagged by users or others)&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Companies have begun to rely on a variety of automated tools to aid their content removal processes, across a variety of content, including &lt;a href="https://www.theverge.com/2019/3/15/18266974/facebook-instagram-revenge-porn-ai-filter"&gt;revenge porn&lt;/a&gt;, &lt;a href="https://www.facebook.com/notes/mark-zuckerberg/a-blueprint-for-content-governance-and-enforcement/10156443129621634/"&gt;terrorist content&lt;/a&gt; and &lt;a href="https://www.newamerica.org/oti/reports/everything-moderation-analysis-how-internet-platforms-are-using-artificial-intelligence-moderate-user-generated-content/the-limitations-of-automated-tools-in-content-moderation/"&gt;CSAM&lt;/a&gt;. Research however, has shown that the tools deployed often have their limitations, which include &lt;a href="https://juliareda.eu/2017/09/when-filters-fail/"&gt;over-removal&lt;/a&gt;, and &lt;a href="https://reclaimthenet.org/instagram-fact-checks-ruining-memes/"&gt;censorship&lt;/a&gt; of perfectly &lt;a href="https://edri.org/trilogues-on-terrorist-content-upload-or-re-upload-filters-eachy-peachy/"&gt;legitimate&lt;/a&gt; &lt;a href="https://www.eff.org/tossedout/tumblr-ban-adult-content"&gt;speech&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;We recommend that the Principles should accordingly be expanded to &lt;a href="https://www.ivir.nl/publicaties/download/Transparency_MacCarthy_Feb_2020.pdf"&gt;include&lt;/a&gt; content removed by automatic flagging, the error rates encountered by the tools, and the rate at which wrongly taken down content is being reinstated. There should also be a qualitative aspect to the information presented by these companies, and therefore, there should be a clearer disclosure of the kind of automated tools they use. Such disclosure must, of course, be &lt;a href="https://www.ivir.nl/publicaties/download/Transparency_MacCarthy_Feb_2020.pdf"&gt;balanced&lt;/a&gt; against interests of&amp;nbsp; the security of the platform and the necessity to ensure that information disclosed is not used by malicious third-party actors to circumvent legitimate moderation.&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, with specific reference to ‘extremist content’, several online companies have collaborated to form the Global Internet Forum to Counter Terrorism (GIFCT), with the intent of facilitating better moderation. The GIFCT uses a hash-based technology of a shared database of ‘terrorist’ content for filtering content on their platforms. However, as it has already been &lt;a href="https://www.eff.org/wp/caught-net-impact-extremist-speech-regulations-human-rights-content"&gt;noted&lt;/a&gt;, this initiative provides very little information regarding how it functions, and operates without any collaboration with civil society or human rights groups, and without any law enforcement oversight.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Such similar collaborative measures going forward, for deployment of varied forms of automated tools to filter out various forms of content, without any transparency or accountability, can be problematic, since it makes information regarding the efficacy of these tools scarce, research into the processes difficult, and ultimately, any reformative suggestions impossible.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Accordingly, the Principles must emphasize that collaborative efforts to the effect of using automated tools in content moderation must be done with sufficient consideration to the basic principles of transparency and accountability. This might include sharing information about processes with a select list of civil society and human rights groups, and in the transparency reports, separately presenting information about the accuracy rates of the tools.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Content ranking and downranking (the use of artificial intelligence to promote certain content over others such as in search result rankings, and to downrank certain content such as misinformation or clickbait)&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Ranking and downranking algorithms have been deployed by companies for various purposes and across different services they offer. For the purposes of our discussion, we would restrict ourselves to two chief use-cases of these processes: search engines and internet platforms.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Search engines&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The algorithms that have been developed to find accurate results for query are oftentimes not perfect, and they have been accused of being &lt;a href="https://www.vox.com/recode/2020/2/18/21121286/algorithms-bias-discrimination-facial-recognition-transparency"&gt;biased&lt;/a&gt;, including being politically non-partisan and &lt;a href="https://www.wired.com/story/free-speech-is-not-the-same-as-free-reach/"&gt;burying&lt;/a&gt; certain ideologies. Similarly, in the case of automated systems to downrank misinformation, accuracy is not guaranteed as such systems can identify accurate information as misinformation. Since the algorithm is constantly learning and &lt;a href="https://www.newamerica.org/oti/reports/rising-through-ranks/search-ranking"&gt;updating&lt;/a&gt;, it becomes difficult to know exactly why certain content may be made less visible.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;As case-studies of several search engines &lt;a href="https://www.newamerica.org/oti/reports/rising-through-ranks/search-ranking/"&gt;indicate&lt;/a&gt;, a company’s ranking processes often use a combination of algorithms and human moderators. Requirement for transparency therefore, can mandate disclosure of the training materials for these human moderators. For instance, Google has a scheme of ‘&lt;a href="https://support.google.com/websearch/answer/9281931?hl=en"&gt;Search Quality Raters&lt;/a&gt;’, which comprises a group of third-party individuals responsible for giving feedback regarding search results. The guidelines on which their feedback is based on, are &lt;a href="https://static.googleusercontent.com/media/guidelines.raterhub.com/en//searchqualityevaluatorguidelines.pdf"&gt;publicly available&lt;/a&gt;. The Principles can therefore call for similar disclosure of other companies that deploy human help for their ranking processes.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Internet platforms&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;For social media platforms, ranking algorithms are utilized for &lt;a href="https://www.newamerica.org/oti/reports/rising-through-ranks/news-feed-ranking"&gt;curation&lt;/a&gt; of news-feeds: dashboards showing content to the user that the algorithm thinks are relevant. The algorithm makes these decisions based on different signals that it is trained with. Information around these algorithms is hard to come by, and even if it is, the algorithms are often blackboxes, with their decisions not &lt;a href="https://eandt.theiet.org/content/articles/2020/03/google-faces-challenge-of-brittle-and-opaque-ai-says-internet-pioneer/"&gt;explainable&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr"&gt;There are however, ways by which transparency around these algorithms can be improved without compromising the security and integrity of the platform. This might include companies &lt;a href="https://www.ivir.nl/publicaties/download/Transparency_MacCarthy_Feb_2020.pdf"&gt;informing&lt;/a&gt; users, in an accessible manner, “(i) how they rank, organize and present user generated content.”, and &lt;a href="https://www.ivir.nl/publicaties/download/Transparency_MacCarthy_Feb_2020.pdf"&gt;updating&lt;/a&gt; the data in a timely manner, allowing researchers and regulators the appropriate opportunity to utilize this information while it is still relevant.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Companies should also have an easy-to-access policy that &lt;a href="https://rankingdigitalrights.org/wp-content/uploads/2019/07/Best-Practices_-Algorithms-machine-learning-and-automated-decision-making.pdf"&gt;outlines&lt;/a&gt; how it plans to manage the human rights risks arising out of the system(s) it deploys. The human rights impacts assessment must additionally consider the broad social contexts within which the algorithm system is used.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Ad targeting and delivery (the use of artificial intelligence to segment and target specific groups of users and deliver ads to them)&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Companies such as Facebook and Google collect a wide variety of data from its audience, using a variety of data points (including age, location, race) which is used to deliver personalised advertisements by the advertisers affiliated with the company. Methods like &lt;a href="https://www.eff.org/wp/behind-the-one-way-mirror"&gt;activity tracking and browser-fingerprinting&lt;/a&gt; are employed to track users, with or without explicit notice. Since a user’s &lt;a href="https://www.makeuseof.com/tag/targeted-ads-threat-privacy/"&gt;privacy&lt;/a&gt; is greatly affected by such tracking, more transparency is needed where user data is collected by companies and where they are processed using the company’s algorithms to target and deliver ads. Additionally, targeted advertising, especially in the context of political advertising, result in segmenting groups of people and subjecting them to advertising campaigns. This, in turn may have drastic &lt;a href="https://apnews.com/eef44be313efdefa959ec7d7200474cc"&gt;consequences&lt;/a&gt;, since they seem to deepen divisiveness over critical issues.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Notice&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Principles should identify metrics of a meaningful notice that companies must give users when their data is collected for delivering advertisements. Among others, such notice should specify all kinds of data the company is collecting regarding the user, and the categories across which they have been segmented or categorized for advertising.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Disclosure&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Companies should also strive to disclose how data is collected and processed, specifically to segment users and deliver advertisements, in detail. This might include disclosing all the &lt;a href="https://www.propublica.org/datastore/dataset/facebook-ad-categories"&gt;categories&lt;/a&gt; made available to advertisers by the company, and the names and identities of third parties (both advertisers and data-brokers) with whom such data is shared. CNBC, for instance, in 2019 &lt;a href="https://www.nbcnews.com/tech/social-media/mark-zuckerberg-leveraged-facebook-user-data-fight-rivals-help-friends-n994706"&gt;reported &lt;/a&gt;that Facebook selectively shared user data with select partners while denying rival companies from accessing the data. Additionally, companies that allow users to opt out of their data being wholly or partly should disclose this option and make it easy to access. For Example, Facebook lets users turn off data being used for advertising in &lt;a href="https://www.digitaltrends.com/social-media/turned-off-facebook-ad-tracking-personalized-privacy/"&gt;three different categories&lt;/a&gt;. Facebook Ad Preferences menu hidden in a user’s settings is detailed. However, barring a &lt;a href="https://about.fb.com/news/2019/07/understand-why-youre-seeing-ads/"&gt;public post&lt;/a&gt; that attempts to explain how and why users see certain ads on Facebook, which has one line at the end that directs users to their Ad Preference settings to “View and use” their controls, the company does not have any public document explaining users their choices. Amazon, on the other hand allows users to turn off personalized ads completely and has a dedicated &lt;a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=202075050"&gt;page&lt;/a&gt; that explains how a user’s data is used for personalizing advertisements and options to disable it.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Content recommendations and auto-complete (the use of artificial intelligence to recommend content such as videos, posts, and keywords to users based on their user profiles and past behavior)&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Algorithms and recommendation systems are designed to suggest content that a user is likely to interact with, on the basis of their browsing behaviour and interaction on the platform. These algorithms are constantly updated to be more accurate. Popular examples include &lt;a href="https://instagram-engineering.com/powered-by-ai-instagrams-explore-recommender-system-7ca901d2a882?gi=fb3d603e81a2"&gt;Instagram&lt;/a&gt; and &lt;a href="https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45530.pdf"&gt;YouTube&lt;/a&gt;. It is interesting to note that these systems have been documented to often suggest &lt;a href="https://www.nytimes.com/interactive/2019/06/08/technology/youtube-radical.html"&gt;radical content&lt;/a&gt; to users, and upon user-interaction with such content, continuously amplify them. YouTube’s algorithm, for instance, has been previously accused of pushing users towards &lt;a href="https://www.nytimes.com/2018/03/10/opinion/sunday/youtube-politics-radical.html"&gt;extremist or inflammatory&lt;/a&gt; ideologies.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Studying how recommendation algorithms function however, and &lt;a href="https://www.wired.com/story/creating-ethical-recommendation-engines/"&gt;why&lt;/a&gt; certain extremist content are being recommended to users, have been difficult, due to one, the complexity of the current &lt;a href="https://www.ivir.nl/publicaties/download/AI-Llanso-Van-Hoboken-Feb-2020.pdf"&gt;information ecosystem&lt;/a&gt;, and two, because of the lack of information around these algorithms. The Santa Clara Principles can, by way of an expansion of scope, look to address the second difficulty, by urging companies to be more transparent with their internal processes.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Sharing of data or open-sourcing algorithms&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;With due recourse paid to the security and integrity of the platform, we recommend that the code for the algorithm used for recommendations should be open-source and publicly available online. &lt;a href="https://www.newamerica.org/oti/reports/rising-through-ranks/news-feed-ranking"&gt;Reddit&lt;/a&gt;, for instance, publishes its code for curation of news feeds in an open-source format.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Another way of doing this, as has been &lt;a href="https://www.ivir.nl/publicaties/download/AI-Llanso-Van-Hoboken-Feb-2020.pdf"&gt;studied&lt;/a&gt;, is to consider a two-pronged method of sharing data. In the first count, datasets identified as ‘sensitive’, are shared in partnerships with certain institutions, under non-disclosure agreements. In the second count, more non-sensitive data is shared in an anonymized format publicly, and made available for any researcher to access.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;This idea, however, must be taken with a few caveats. One, sharing of datasets may not always fulfill the public-facing model of transparency and accountability that the Santa Clara Principles envisage. Two, this might be a particularly onerous obligation for smaller and medium enterprises, and without sufficient economic data, it might be difficult to implement this. And three, any framework adopting this must consider the privacy aspect of such sharing. At this juncture, therefore, we do not recommend this as a compulsory binding obligation that any company adopting the Principles must abide by. Rather, we hope and encourage for more conversations to be held around this concept, so that the aforementioned competing interests are accommodated optimally.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Qualitative transparency&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The other mode of ensuring more clarity into the recommendation system should be by asking companies to publish user-facing, clearly accessible policies and explainers that outline how the company uses algorithms to recommend content to users. This can also include &lt;a href="https://www.wired.com/story/creating-ethical-recommendation-engines/"&gt;creation&lt;/a&gt; of a visible list of topics, which the company has chosen ‘not to amplify’ (for instance, topics such as self-harm, eating disorders), and updated regularly.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;3. Do you feel that the current Santa Clara Principles provide the correct framework for or could be applied to intermediate restrictions (such as age-gating, adding warnings to content, and adding qualifying information to content). If not, should we seek to include these categories in a revision of the principles or would a separate set of principles to cover these issues be better?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Santa Clara Principles, as they had been originally envisaged, adhered to the commonly adopted binary of take down/leave up in content moderation, where a piece of unlawful, or problematic content (or an account), was either censored from public view or allowed to continue. However, since then, platforms dealing with user-generated content have resorted to a variety of novel and intermediate techniques to moderate and regulate speech which fall outside the aforementioned binary. With adoption of such steps therefore, it is also important for the Principles to evolve and take into consideration the expanded scope of content moderation. In light of that, we recommend the following steps to be taken in the intermediate areas of regulation:&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Adding warnings, qualifying information to content&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;As mentioned above, in recent past, online intermediaries have resorted to more intermediate restrictions to deal with ‘harmful’ content online. These measures have seen an added boost in light of the Covid-19 outbreak, where there has been a massive &lt;a href="https://www.who.int/docs/default-source/coronaviruse/situation-reports/20200202-sitrep-13-ncov-v3.pdf"&gt;increase&lt;/a&gt; in misleading information and conspiracy theories online. These measures have included, among others, &lt;a href="https://about.fb.com/news/2020/04/covid-19-misinfo-update/"&gt;connecting&lt;/a&gt; users who have interacted with misinformation to verified, debunked information and introducing a &lt;a href="https://blog.twitter.com/en_us/topics/product/2020/updating-our-approach-to-misleading-information.html"&gt;spectrum&lt;/a&gt; of actions based on the degree of harm posed by the content, which includes adding labels, warning, and finally, removal. Such intermediate measures currently are not accommodated within the framework of the Santa Clara Principles, for reasons enumerated above, and going forward, it may become important for the Principles to look at the learnings from these measures and adopt them, wherever appropriate, into the framework.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, as conversations around the instance of Twitter adding a fact-check to Donald Trump’s tweet show, the application of these intermediate measures are often &lt;a href="https://www.theatlantic.com/ideas/archive/2020/05/twitter-cant-change-who-the-president-is/612133/"&gt;ad-hoc&lt;/a&gt;, since there is often no explanation why certain items receive the moderation treatment, while other, similarly misleading content from same &lt;a href="https://www.nytimes.com/2020/06/03/us/politics/trump-twitter-fact-check.html"&gt;sources&lt;/a&gt;, continue to stay online. Accordingly, it is difficult to ascertain the exact reasoning process behind these steps. Therefore, adoption of principles related to measures of adding labels or warnings to information online must also require companies to be transparent with their decision-making processes.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Fact-checking&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;In recent years, with the proliferation of misinformation on online platforms, several companies have either begun to &lt;a href="https://www.facebook.com/journalismproject/programs/third-party-fact-checking/selecting-partners"&gt;collaborate&lt;/a&gt; with fact-checkers, or deploy their own in-house &lt;a href="https://www.reuters.com/article/us-twitter-factcheck/with-fact-checks-twitter-takes-on-a-new-kind-of-task-idUSKBN2360U0"&gt;teams&lt;/a&gt;. While these initiatives should be appreciated, it should also be noted that the term ‘fact checking’ assumes a partisan meaning in certain circumstances, including when sources of &lt;a href="https://newscentral24x7.com/opindia-international-fact-checking-network-fake-news/"&gt;misinformation&lt;/a&gt; themselves offer this service. Accordingly, it becomes important that the fact-checking initiatives adopted by companies adhere to some standards of international best practices, and the decisions made are not riddled with biases, either political or ideological.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Santa Clara Principles are useful to ascertain the transparency of any fact-checking initiatives, and can be applied across both collaborations between companies and fact-checkers, as well as for in-house fact checking initiatives.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;For any manner of collaborations, companies must disclose, in clear terms, the names and identities of the fact-checking organizations that they are teaming up with (this &lt;a href="https://en-gb.facebook.com/business/help/182222309230722"&gt;example&lt;/a&gt; from Facebook divides this list of names country-wise) and the nature of this collaboration, which must include details of whether the organization stands to any monetary gains, and what is the level of access to the platform and its dashboards given by the company to the fact-checking organization.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;For in-house initiatives, the Santa Clara Principles must require companies to disclose information regarding any training programs carried out and the background of the fact-checkers, and this might also include a statement regarding the objectivity and non-partisanship of the initiative.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Lastly, comprehensive information about fact-checking must be presented in a clearly accessible format in the company’s regular transparency reports, which should include data on how many pieces of content got fact-checked in the reporting period, the nature of the content (text, photos, videos, multimedia), the nature of misinformation that was being perpetuated (health, communal etc.), and the number of times the said piece of content was shared before it could be fact-checked.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Age-gating&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Digital Economy Act of 2017, proposed by the UK Government (and since dropped in 2019) serves as an early model of the legislature around the world to regulate the process of putting in place age-restrictions. By the application of that &lt;a href="https://www.wired.co.uk/article/porn-block-uk-wired-explains"&gt;law&lt;/a&gt;, any websites offering pornography would have to show a landing page to any user with an UK IP address, which would not go away till the user is able to show that they are over the age of eighteen years. However, the government had left the exact technical method of implementing the age-gate upto the website, which meant that websites were free to adopt any methods they deem fit for verifying age, which might also include &lt;a href="https://arstechnica.com/tech-policy/2019/10/australia-wants-to-use-face-recognition-for-porn-age-verification/"&gt;facial recognition&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr"&gt;However, learnings from the UK Model, and several other models of attempted age-gating have shown that there are often easy &lt;a href="https://web.archive.org/web/20110606044855/http://www.newstatesman.com/200607310047"&gt;methods&lt;/a&gt; of &lt;a href="https://www.theguardian.com/society/2019/apr/19/uks-porn-age-verification-rules-can-be-circumvented-in-minutes"&gt;circumvention&lt;/a&gt; and the information collected in lieu of implementation of these methods goes on to raise &lt;a href="https://www.theguardian.com/culture/2019/oct/16/uk-drops-plans-for-online-pornography-age-verification-system"&gt;privacy concerns&lt;/a&gt;. It is our understanding that the regulation of age-restrictions is currently in a flux, and setting principled guidelines at this stage may not be completely evidence-based. In such light, it is our recommendation that the Santa Clara Principles should not be expanded to include age-gates. Separate consultations and discussions on the merits of the various forms of age-gating should precede any principles in this subject.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;4. How have you used the Santa Clara Principles as an advocacy tool or resource in the past? In what ways? If you are comfortable with sharing, please include links to any resources or examples you may have.&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;In 2019, we developed specific methodologies to analyse information relating to government requests for content takedown and user information, from transparency reports made available by online companies for India. For creating our methodology for government requests for content takedown, we relied significantly on some of the metrics of the Santa Clara Principles, and utilized them to expand our scope of analysis. Our methodology comprised of the following metrics adopted from the Principles:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Numbers: We utilized this metric, and further clarified that the numbers should include a numerical breakdown of the requests received under different laws on content takedown.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Sources: The Santa Clara Principles recommend that the intermediary identify the source of the flagging. Under the intermediary liability regime in India, content takedown requests can be sent by the executive, the courts, or third parties. We accordingly argued that transparency reports must classify the received requests into these three categories.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Notice: We also utilized this metric for our methodology.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;The full version of our methodology and the results from our analysis can be found &lt;a href="https://cis-india.org/internet-governance/files/A%20collation%20and%20analysis%20of%20government%20requests%20for%20user%20data%20%20and%20content%20removal%20from%20non-Indian%20intermediaries%20.pdf"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;5. How can the Santa Clara Principles be more useful in your advocacy around these issues going forward?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;We intend to apply this methodology for future editions of the report as well, and build up a considerable body of work on transparency reporting practices in the Indian context.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;6. Do you think that the Santa Clara Principles should apply to the moderation of advertisements, in addition to the moderation of unpaid user-generated content? If so, do you think that all or only some of them should apply?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Moderation of advertisements in the recent years have become an interesting point of contention, be it advertisements that &lt;a href="https://play.google.com/about/monetization-ads/ads/#!?zippy_activeEl=disruptive#disruptive"&gt;violate&lt;/a&gt; the companies policies on disruptive ads policies, or advertisements with more nefarious undertones, including &lt;a href="https://www.theverge.com/platform/amp/2020/6/16/21293285/google-ads-bans-the-federalist-zero-hedge-racist-content-discrimination-demonetization?utm_campaign=theverge&amp;amp;utm_content=chorus&amp;amp;utm_medium=social&amp;amp;utm_source=twitter&amp;amp;__twitter_impression=true"&gt;racist language&lt;/a&gt; and associations to &lt;a href="https://www.nbcnews.com/tech/tech-news/facebook-removes-trump-ads-violating-organized-hate-policy-n1231468"&gt;Nazi symbols&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Several companies already have various &lt;a href="https://business.twitter.com/en/help/ads-policies.html"&gt;moderation&lt;/a&gt; &lt;a href="https://www.blog.google/technology/ads/upcoming-update-housing-employment-and-credit-advertising-policies/"&gt;policies&lt;/a&gt; for these kinds of harmful advertisements and other content that advertisers can promote, and these are often public. Based on this, we think that the Santa Clara Principles can be expanded to include the moderation of advertisements, and the metrics contained within would be applicable across this vertical, wherever appropriate.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;7. Is there any part of the Santa Clara Principles which you find unclear or hard to understand?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;N/A.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;8. Are there any specific risks to human rights which the Santa Clara Principles could better help mitigate by encouraging companies to provide specific additional types of data? (For example, is there a particular type of malicious flagging campaign which would not be visible in the data currently called for by the SCPs, but would be visible were the data to include an additional column.)&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;N/A.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;9. Are there any regional, national, or cultural considerations that are not currently reflected in the Santa Clara Principles, but should be?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;While utilizing the Principles for the purposes of our research, we found that the nature of information that some of these online companies make available for users residing in the USA, is very different from the information they make available for users residing in other countries, including in India. For instance, Amazon’s transparency reports regarding government requests for content removal, till the first half of &lt;a href="https://d1.awsstatic.com/certifications/Information_Request_Report_June_2018.pdf"&gt;2018&lt;/a&gt;, was restricted only to the US, despite the company having a considerably large presence in India (during our &lt;a href="https://cis-india.org/internet-governance/files/A%20collation%20and%20analysis%20of%20government%20requests%20for%20user%20data%20%20and%20content%20removal%20from%20non-Indian%20intermediaries%20.pdf"&gt;research&lt;/a&gt;, Alexa Rank showed Amazon.com to be the 14th most visited website in India).&lt;/p&gt;
&lt;p dir="ltr"&gt;A public commitment to uphold Santa Clara Principles (as several companies have undertaken, see EFF’s recent Who Has Your Back? &lt;a href="https://www.eff.org/wp/who-has-your-back-2019#santa-clara-principles"&gt;report&lt;/a&gt;) would mean nothing if these commitments do not extend to all the markets in which the company is operating. Accordingly, we believe that it must be emphasized that the adoption of these Principles into the transparency reporting practices of the company must be consistent across markets, and the information made available should be as uniform as it is legally permissible.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;10. Are there considerations for small and medium enterprises that are not currently reflected in the Santa Clara Principles, but should be?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Our understanding at this current juncture is that not enough data exists around the economic costs of setting up the transparency and accountability structures. Accordingly, at the end of this Consultation period, should the Principles be expanded to include more intermediate restrictions and develop accountability structures around algorithmic use, we recommend that a separate consultation be held with small and medium enterprises to identify a) whether or not there would be any economic costs of adoption and how best the Principles can accommodate them, and b) what are the basic minimum guidelines that these enterprises would be able to adopt as a starting point.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;11. What recommendations do you have to ensure that the Santa Clara Principles remain viable, feasible, and relevant in the long term?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Given the dynamic nature of developments in the realm of content moderation, periodical consultations, in the vein of the current one, would ensure that the stakeholders are able to raise novel issues at the end of each period, allow the Principles to take stock of the same, and incorporate changes to that effect. We believe that this would allow for the Principles to continue to be aware of the realities of content moderation, and allow for evidence-based policy-making.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;12. Who would you recommend to take part in further consultation about the Santa Clara Principles? If possible, please share their names and email addresses.&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;N/A.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;13. If the Santa Clara Principles were to call for a disclosure about the training or cultural background of the content moderators employed by a platform, what would you want the platforms to say in that disclosure? (For example: Disclosing what percentage of the moderators had passed a language test for the language(s) they were moderating or disclosing that all moderators had gone through a specific type of training.)&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;By now, there have been well documented &lt;a href="https://www.vice.com/en_in/article/43z7gj/how-facebook-trains-content-moderators"&gt;accounts of&lt;/a&gt; human moderators, by independent investigations or admissions by companies. For instance, this &lt;a href="https://www.facebook.com/notes/mark-zuckerberg/a-blueprint-for-content-governance-and-enforcement/10156443129621634/"&gt;blogpost&lt;/a&gt; authored in 2018 by Mark Zuckerberg documented the percentage of human moderators who were trained in the Burmese language, in reference to moderating content on the platform in Myanmar. Comprehensive information about linguistic and cultural backgrounds of human moderators is a useful tool to contextualize the decisions made by the platform, and also useful in pushing more effective reforms.&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, it has also been seen that a company’s public facing moderation norms often differ from its internal guidelines, which are shared with its team of human moderators. For instance, TikTok’s internal norms had &lt;a href="https://theintercept.com/2020/03/16/tiktok-app-moderators-users-discrimination/"&gt;asked&lt;/a&gt; its moderators to ‘suppress’ content from users perceived to be ‘poor’ and ‘ugly’. The gaps in these norms means that there are surreptitious forms of censorship behind-the-scenes, and it is difficult to ascertain the reasonableness and appropriateness of these decisions.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;We would also like to emphasize more stringent disclosure requirements from companies regarding the nature of engagement with which they employ their human moderators. As &lt;a href="https://www.theverge.com/2019/2/25/18229714/cognizant-facebook-content-moderator-interviews-trauma-working-conditions-arizona"&gt;investigations&lt;/a&gt; have &lt;a href="https://www.livemint.com/news/india/inside-the-world-of-india-s-content-mods-11584543074609.html"&gt;revealed&lt;/a&gt;, the task of human moderation is often outsourced by these companies to third-party firms, and the working conditions in which the moderators make their decisions are inhospitable. Additionally, more often than not, there are no publicly available methods to ascertain whether the company in question is doing enough to ensure the well-being and safety of these moderators.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Therefore, alongside disclosure regarding the nature of training given to the human moderators and their internal moderation norms, we also recommend that the Principles recognize certain fundamental ethical guidelines with relation to their human moderators that companies must adopt. This might include providing identifying information of the third-party firms to which the company outsources its moderation and assurances of sufficient number of counsellors for the moderators.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;14. Do you have any additional suggestions?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;While the Santa Clara Principles provide a granular and robust framework of reporting, currently it stands to only cover aspects of quantitative transparency - concerning numbers and items. As we have indicated throughout this submission, and in our previous research, there are also need for companies to adhere to more norms focussing on qualitative transparency - in the form of material disclosure of the policies, processes and structures they associate with, or make use of. Aside from the suggestions in the previous sections, in this section we highlight two additional recommendations that we think can help achieve this.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Material regarding local laws&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;One of our preliminary findings regarding the way these intermediaries report data for other regions (including India) has been that most of the time, the information is incomplete, especially with regards to material regarding the local laws. Compared to the US, for which most of these companies dedicate separate sections, other regions feature relatively fewer times in their reports. Each country in which the company functions, there would be various laws governing content removal, different authorities empowered to issue orders, and varied procedural and substantive requirements of a valid request. For the empowerment of users, we believe that the exact metrics and requirements of these laws must be presented by the intermediaries, in a clear and readable format.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Accessibility of policies&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;On the topic of empowerment of users, we also believe that the basic information and policies regarding these requests should be placed at one place, for maximum accessibility by users. During our research, we discovered that the disclosures made in lieu of the Principles were spread over different policies, some of which were not easily accessible. While it is not possible at this juncture to predict a comprehensively objective way of making all this information accessible, we believe it would be a useful step if the basic information regarding the intermediary's transparency reporting policies were presented in the same manner as the company's Terms and Services and Privacy Policy. Additionally, we believe that these disclosures should be translated into major languages in which the company operates, for further accessibility.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;15. Have current events like COVID-19 increased your awareness of specific transparency and accountability needs, or of shortcomings of the Santa Clara Principles?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Covid-19 pandemic proves to be a watershed moment for the history of the internet, inasmuch in the manner of proliferation of various forms of misinformation and conspiracy theories, as well as the way in which companies have stepped up to remove said content from their platforms. This has included companies like &lt;a href="https://gadgets.ndtv.com/internet/news/google-india-announces-steps-to-help-combat-covid-19-misinformation-2211357"&gt;Google&lt;/a&gt;, &lt;a href="https://blog.twitter.com/en_us/topics/company/2020/An-update-on-our-continuity-strategy-during-COVID-19.html"&gt;Twitter&lt;/a&gt; and &lt;a href="https://about.fb.com/news/2020/03/combating-covid-19-misinformation/"&gt;Facebook&lt;/a&gt;, who have sought to increasingly rely on automated tools for rapid moderation of harmful content&amp;nbsp; related to the pandemic.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;These practices reaffirm the need for having strong requirements for transparency disclosures, both qualitative and quantitative, especially around the use of automated tools for content takedown. This is because of two main reasons.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;One, the speed of removal would never tell us &lt;a href="https://cis-india.org/internet-governance/blog/torsha-sarkar-november-30-2019-a-deep-dive-into-content-takedown-timeframes"&gt;anything&lt;/a&gt; about the accuracy of the measure. A platform can say that in one reporting period, it took down 1000 pieces of content; this would not mean that its actions were always accurate, or fair or reasonable, since there is no publicly available information to ascertain so. This phenomenon, aggregated with the heightened &lt;a href="https://meity.gov.in/writereaddata/files/advisory_to_curb_false_news-misinformation_on_corona_virus.pdf"&gt;pressure&lt;/a&gt; to remove misinformation related to the pandemic, may contribute to firstly, erroneous removals (as YouTube has &lt;a href="https://youtube-creators.googleblog.com/2020/03/protecting-our-extended-workforce-and.html"&gt;warned&lt;/a&gt; in blogs), and secondly, towards deepening the information asymmetry regarding accurate data around removals.&lt;/p&gt;
&lt;p dir="ltr"&gt;Two, given the novel and diverse forms of misleading information related to the pandemic, this offers a critical time to &lt;a href="https://cdt.org/insights/covid-19-content-moderation-research-letter/"&gt;study&lt;/a&gt; the relation between online information and the outcomes of a public health crisis. However, these efforts would be thwarted if reliable information around removals relating to the pandemic continue to be unavailable.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability'&gt;https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Torsha Sarkar and Suhan S</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-07-01T05:56:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4">
    <title>Brindaalakshmi.K - Gendering of Development Data in India - Beyond the Binary #4</title>
    <link>https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4'&gt;https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-30T10:34:03Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3">
    <title>Brindaalakshmi.K - Gendering of Development Data in India - Beyond the Binary #3</title>
    <link>https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3'&gt;https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-30T09:48:48Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
